Abstract: Simultaneous transmission of data from one sender to multiple receivers is called multicasting.
Several widely used applications require multicasting at least at the logical level. Examples include audio video
teleconferencing, real time video streaming and the maintenance of distributed databases. In many cases it is
advantageous to implement multicasting at the level of the routing algorithm (other approaches would be oneto-all
unicast or the implementation of multicasting at the application layer). In this paper we are presenting a
comparative analysis on various multicast routing protocols in adhoc networks.
Keywords: multicasting, multicast protocols,dynamic core, performance evaluation,Qos Parameters
ENERGY EFFICIENT MULTICAST ROUTING IN MANET ijac journal
In this paper, we have presented the Modified Multicasting through Time Reservation using Adaptive
Control for Excellent Energy efficiency (MMC-TRACE). It is a real time multicasting architecture for
Mobile Ad-Hoc networks to make their work an energy efficient one .MMC-TRACE is a cross layer design
where the network layer and medium access control layer functionality are done in a single integrated
layer design. The basic design of the architecture is to establish and maintain an active multicast tree
surrounded by a passive mesh within a mobile ad hoc network. Energy efficiency is maximized by enabling
the particular node from sleep to awake mode while the remaining nodes of the same path are maintained
at sleep mode. Energy efficiency too achieved by eliminating most of the redundant data receptions across
nodes. The performance of MMC-TRACE are evaluated with the help of ns-2 simulations and comparisons
are made with its predecessor such as MC-TRACE. The results show that the MMC-TRACE provides
superior energy efficiency, competitive QoS performance and bandwidth efficiency.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
ADAPTIVE AODV ROUTING PROTOCOL FOR MOBILE ADHOC NETWORKSijasuc
Enhancing route request broadcasting efficiency in protocols constitutes a substantial part of research in
Mobile Adhoc NETwork (MANET) routing. We suggest a novel approach to constrain route request
broadcast based on mobility of nodes. This technique is best suited for networks where the movement of
the nodes is with different random velocities in different random directions. This protocol adapts itself
automatically to two mobility conditions i.e. moderate and high speed. Intuition behind this technique is
that the nodes moving with higher mobility rates will have better recent routes compared to slow moving
nodes which may not be aware of the drastic changes happening in the network .In this approach we
select the neighbourhood nodes for broadcasting route requests based on their mobility rate and recent
involvement in routing so that blind flooding of the route request in the network can be avoided.
Our contributions include: (i) Two new enhancement technique to reduce route request broadcast for
reactive ad hoc routing protocols; (ii) Implementation of Enhanced Ad-hoc On-demand Distance Vector
routing 1 (EAODV1) for moderate speed of node movement;(iii) Implementation of Enhanced Ad-hoc Ondemand Distance Vector routing 2 (EAODV2) for high speed of node movement; (iv) Implementation of
Adaptive AODV (AAODV) which automatically switches over between EAODV1 and EAODV2 based on
the mobility of the nodes. (v) An extensive simulation study of EAODV1, EAODV2 and AAODV using
Glomosim showing significant improvement in overhead, packet delivery ratio and the end-to-end delay
Adaptive QoS Multicast Routing with Mobility Prediction in MANETs ijasuc
A Mobile Ad hoc NETwork (MANET) is a collection of wireless mobile hosts that form a temporary network
without a centralized administration or wired infrastructure. Due to the high mobility of nodes, the network
topology of MANETs changes very fast, making it more difficult to find the routes that message packets use.
Network control with Quality of Service (QoS) support is a key issue for multimedia applications in MANET.
Most of the real time applications have stringent requirements on bandwidth, delay, delay-jitter, packet loss
ratio, cost and other QoS metrics. This paper proposes a Multi-constrained QoS routing with mobility
prediction protocol. If the node has enough resources to transmit data packets, it uses the Global
Positioning System (GPS) to get the location information of the mobile nodes and selects the routing path
with the maximum Route Expiration Time (RET). A set of static and mobile agents are used to find the
multicast routes and transmit the packets. Extensive simulations have been conducted to evaluate the
performance of MC_MAODV using Network Simulator (NS-2). The simulation results show that the
proposed protocol achieves good performance in terms of improving packet delivery ratio and minimizing
end-to-end delay.
QUALITY OF SERVICE STABILITY BASED MULTICAST ROUTING PROTOCOL FOR MANETScseij
Mobile Ad Hoc Networking Does Not Own Any Fixed Infrastructure And Hence, Stable Routing Is The
Major Problem. The Mobility Nature Of Manet’s Node Facilitates Rediscovery Of A New Path To
Organizing A Routing. In Order To Intensify The Quality Of Service And Routing Stability In Manet, We
Propose A Dynamic Quality Of Service Stability Based Multicast Routing Protocol By Modifying The
Cuckoo Search Algorithm Through A Modernizing Mechanism Which Is Derived From The Differential
Evolution Algorithm. Tuned Csa Is A Combined Feature Of Csa And De Algorithms. Periodically, Each
Node In The Network Creates Neighbour Stability And Qos Database At Every Node By Calculating The
Parameters Like Node And Link Stability Factor, Bandwidth Availability, And Delays. Finally, Multicast
Path Constructs Route Request And Route Reply Packets, Stability Information And Performing Route
Maintenance.
A MANET is an autonomous collection of mobile users that communicate over relatively bandwidth constrained wireless links. When designing mobile ad hoc networks, several interesting and difficult problems arise because of the shared nature of the wireless medium, limited transmission power (range) of wireless devices, node mobility, and battery limitations. This paper aims at providing a new schema to improve Dynamic Source Routing (DSR) Protocol. The aim
behind the proposed enhancement is to find the best route in acceptable time limit without having broadcast storm. Moreover, O-DSR enables network not only to overcome congestion but also maximize the lifetime of mobile nodes. Some simulations results show that the Route Request (RREQ) and the Control Packet Overhead decrease by 15% when O-DSR is used, consequently. Also the global energy consumption in O-DSR is lower until to 60 % , which leads to a long lifetime of the network.
ENERGY EFFICIENT MULTICAST ROUTING IN MANET ijac journal
In this paper, we have presented the Modified Multicasting through Time Reservation using Adaptive
Control for Excellent Energy efficiency (MMC-TRACE). It is a real time multicasting architecture for
Mobile Ad-Hoc networks to make their work an energy efficient one .MMC-TRACE is a cross layer design
where the network layer and medium access control layer functionality are done in a single integrated
layer design. The basic design of the architecture is to establish and maintain an active multicast tree
surrounded by a passive mesh within a mobile ad hoc network. Energy efficiency is maximized by enabling
the particular node from sleep to awake mode while the remaining nodes of the same path are maintained
at sleep mode. Energy efficiency too achieved by eliminating most of the redundant data receptions across
nodes. The performance of MMC-TRACE are evaluated with the help of ns-2 simulations and comparisons
are made with its predecessor such as MC-TRACE. The results show that the MMC-TRACE provides
superior energy efficiency, competitive QoS performance and bandwidth efficiency.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
ADAPTIVE AODV ROUTING PROTOCOL FOR MOBILE ADHOC NETWORKSijasuc
Enhancing route request broadcasting efficiency in protocols constitutes a substantial part of research in
Mobile Adhoc NETwork (MANET) routing. We suggest a novel approach to constrain route request
broadcast based on mobility of nodes. This technique is best suited for networks where the movement of
the nodes is with different random velocities in different random directions. This protocol adapts itself
automatically to two mobility conditions i.e. moderate and high speed. Intuition behind this technique is
that the nodes moving with higher mobility rates will have better recent routes compared to slow moving
nodes which may not be aware of the drastic changes happening in the network .In this approach we
select the neighbourhood nodes for broadcasting route requests based on their mobility rate and recent
involvement in routing so that blind flooding of the route request in the network can be avoided.
Our contributions include: (i) Two new enhancement technique to reduce route request broadcast for
reactive ad hoc routing protocols; (ii) Implementation of Enhanced Ad-hoc On-demand Distance Vector
routing 1 (EAODV1) for moderate speed of node movement;(iii) Implementation of Enhanced Ad-hoc Ondemand Distance Vector routing 2 (EAODV2) for high speed of node movement; (iv) Implementation of
Adaptive AODV (AAODV) which automatically switches over between EAODV1 and EAODV2 based on
the mobility of the nodes. (v) An extensive simulation study of EAODV1, EAODV2 and AAODV using
Glomosim showing significant improvement in overhead, packet delivery ratio and the end-to-end delay
Adaptive QoS Multicast Routing with Mobility Prediction in MANETs ijasuc
A Mobile Ad hoc NETwork (MANET) is a collection of wireless mobile hosts that form a temporary network
without a centralized administration or wired infrastructure. Due to the high mobility of nodes, the network
topology of MANETs changes very fast, making it more difficult to find the routes that message packets use.
Network control with Quality of Service (QoS) support is a key issue for multimedia applications in MANET.
Most of the real time applications have stringent requirements on bandwidth, delay, delay-jitter, packet loss
ratio, cost and other QoS metrics. This paper proposes a Multi-constrained QoS routing with mobility
prediction protocol. If the node has enough resources to transmit data packets, it uses the Global
Positioning System (GPS) to get the location information of the mobile nodes and selects the routing path
with the maximum Route Expiration Time (RET). A set of static and mobile agents are used to find the
multicast routes and transmit the packets. Extensive simulations have been conducted to evaluate the
performance of MC_MAODV using Network Simulator (NS-2). The simulation results show that the
proposed protocol achieves good performance in terms of improving packet delivery ratio and minimizing
end-to-end delay.
QUALITY OF SERVICE STABILITY BASED MULTICAST ROUTING PROTOCOL FOR MANETScseij
Mobile Ad Hoc Networking Does Not Own Any Fixed Infrastructure And Hence, Stable Routing Is The
Major Problem. The Mobility Nature Of Manet’s Node Facilitates Rediscovery Of A New Path To
Organizing A Routing. In Order To Intensify The Quality Of Service And Routing Stability In Manet, We
Propose A Dynamic Quality Of Service Stability Based Multicast Routing Protocol By Modifying The
Cuckoo Search Algorithm Through A Modernizing Mechanism Which Is Derived From The Differential
Evolution Algorithm. Tuned Csa Is A Combined Feature Of Csa And De Algorithms. Periodically, Each
Node In The Network Creates Neighbour Stability And Qos Database At Every Node By Calculating The
Parameters Like Node And Link Stability Factor, Bandwidth Availability, And Delays. Finally, Multicast
Path Constructs Route Request And Route Reply Packets, Stability Information And Performing Route
Maintenance.
A MANET is an autonomous collection of mobile users that communicate over relatively bandwidth constrained wireless links. When designing mobile ad hoc networks, several interesting and difficult problems arise because of the shared nature of the wireless medium, limited transmission power (range) of wireless devices, node mobility, and battery limitations. This paper aims at providing a new schema to improve Dynamic Source Routing (DSR) Protocol. The aim
behind the proposed enhancement is to find the best route in acceptable time limit without having broadcast storm. Moreover, O-DSR enables network not only to overcome congestion but also maximize the lifetime of mobile nodes. Some simulations results show that the Route Request (RREQ) and the Control Packet Overhead decrease by 15% when O-DSR is used, consequently. Also the global energy consumption in O-DSR is lower until to 60 % , which leads to a long lifetime of the network.
The International Journal of Engineering & Science is aimed at providing a platform for researchers, engineers, scientists, or educators to publish their original research results, to exchange new ideas, to disseminate information in innovative designs, engineering experiences and technological skills. It is also the Journal's objective to promote engineering and technology education. All papers submitted to the Journal will be blind peer-reviewed. Only original articles will be published.
The papers for publication in The International Journal of Engineering& Science are selected through rigorous peer reviews to ensure originality, timeliness, relevance, and readability.
A New Efficient Cache Replacement Strategy for Named Data NetworkingIJCNCJournal
The Information-Centric Network (ICN) is a future internet architecture with efficient content retrieval and distribution. Named Data Networking (NDN) is one of the proposed architectures for ICN. NDN’s innetwork caching improves data availability, reduce retrieval delays, network load, alleviate producer load, and limit data traffic. Despite the existence of several caching decision algorithms, the fetching and distribution of contents with minimum resource utilization remains a great challenge. In this paper, we introduce a new cache replacement strategy called Enhanced Time and Frequency Cache Replacement strategy (ETFCR) where both cache hit frequency and cache retrieval time are used to select evicted data chunks. ETFCR adds time cycles between the last two requests to adjust data chunk’s popularity and cache hits. We conducted extensive simulations using the ccnSim simulator to evaluate the performance of ETFCR and compare it to that of some well-known cache replacement strategies. Simulations results show that ETFCR outperforms the other cache replacement strategies in terms of cache hit ratio, and lower content retrieval delay.
IMPROVING PACKET DELIVERY RATIO WITH ENHANCED CONFIDENTIALITY IN MANETijcsa
In Mobile Ad Hoc Network (MANET), the collection of mobile nodes gets communicated without the need of any customary infrastructure. In MANET, repeated topology changes and intermittent link breakage
causes the failure of existing path. This leads to rediscovery of new route by broadcasting RREQ packet.The number of RREQ packet in the network gets added due to the increased amount of link failures. This result in increased routing overhead which degrades the packet delivery ratio in MANET. While designing
routing protocols for MANET, it is indispensable to reduce the overhead in route discovery. In our previous
work[17], routing protocol based on neighbour details and probabilistic knowledge is utilized, additionally
the symmetric cipher AES is used for securing the data packet. Through this protocol, packet delivery ratio
gets increased and confidentiality is ensured. But there is a problem in secure key exchange among the
source and destination while using AES. To resolve that problem, hybrid cryptographic system i.e.,
combination of AES and RSA is proposed in this paper. By using this hybrid cryptographic scheme and the
routing protocol based on probability and neighbour knowledge, enhanced secure packet delivery is
ensured in MANET
Performance comparison of mobile ad hoc network routing protocolsIJCNCJournal
Mobile Ad-hoc Network (MANET) is an infrastructure less and decentralized network which need a robust
dynamic routing protocol. Many routing protocols for such networks have been proposed so far to find
optimized routes from source to the destination and prominent among them are Dynamic Source Routing
(DSR), Ad-hoc On Demand Distance Vector (AODV), and Destination-Sequenced Distance Vector (DSDV)
routing protocols. The performance comparison of these protocols should be considered as the primary
step towards the invention of a new routing protocol. This paper presents a performance comparison of
proactive and reactive routing protocols DSDV, AODV and DSR based on QoS metrics (packet delivery
ratio, average end-to-end delay, throughput, jitter), normalized routing overhead and normalized MAC
overhead by using the NS-2 simulator. The performance comparison is conducted by varying mobility
speed, number of nodes and data rate. The comparison results show that AODV performs optimally well
not the best among all the studied protocols.
Improved Good put using Harvest-Then-Transmit Protocol for Video TransferEswar Publications
In multiple wireless networks, large end-to-end delay and packet losses can decrease meaningfully the traffic flow goodput due to path irregularity and multiplicity. To report these problems, current methods are proposed by using management of queue and decision making process. Hence, this paper proposesa Harvest-Then-Transmit (HTT) Protocol which selects an energy efficient path based on multiple parameters i.e. energy, delay, transmission time and perform transmission of video to handle number of video packets. A multipath environment is establishing where a server performs transferring of video along the energy efficient path of wireless network. Simulation shows the proposed protocol improves the overall goodput up to 10%, increases packet delivery rate up to 12%, and reduces end-to-end delay up to 3%, compared to existing system.
Rough set based QoS enabled multipath source routing in MANET IJECEIAES
The single constrained Quality of Service (QoS) routing in Mobile Ad-hoc NETwork (MANET) is disastrous in consideration of MANET characteristics, inference, collision and link failure as it maintains a single path. The QoS enabled routing yields better packet delivery and maintains consistency among nodes in the network by incorporating multi-constrained and multipath routing. The Dynamic Source Routing (DSR) is best suited source routing algorithm to maintain multipath information at the source node, but performance degrades with larger number of mobile nodes. Multilayer mechanism should be incorporated to maintain QoS metric information spreads across multiple layers of TCP/IP protocol stack. The proposed multipath QoS enabled source routing provides balanced routing by making use of all these features. The imprecise decision making strategy called Rough Set Theory (RST) is used at destination node for decision making. The Route REQuest (RREQ) messages coming from different routes are filtered by considering the QoS metrics of each and every route by making use of RST. The Route REPly (RREP) messages are generated and delivered to the source node for filtered RREQ messages. The proposed routing algorithm will reduce load on the network by reducing number of control messages exchanged for route establishment. This will evenly distribute load among all the nodes and it also avoid the scenarios like few nodes starved for resources. Finally, multipath routing always provides alternate routing option in case of route failure.
PERFORMANCE ANALYSIS OF BROADCASTING IN MOBILE AD HOC NETWORKS USING CLUSTER ...ijasuc
Broadcasting is a fundamental service in Mobile Ad hoc Networks (MANETs). Cluster based approach
are proposed in literature to reduce the network collision, to reduce delay of packet transmission, to
reduce the energy consumption and improves the throughput. In this paper, a cluster- based
infrastructure is proposed for broadcasting in MANETs. The backbone of the network takes advantage of
the cluster structure and only requires cluster- heads and some selected gateways to forward the
broadcast packet. Each cluster head selects some gateways to forward the packet when it sends the
packet to all the cluster heads in its coverage set. Cluster structures have been simulated using mobile
simulator Glomosim 2.03, which gives better performance to reduce the network collision, to reduce
delay of packet transmission, to reduce the energy consumption and improves the throughput.
Novel Routing Protocol Based on Periodic Route Discovery for Mobile Adhoc Net...IJERA Editor
A group of mobile devices called as nodes, without any centralized network, communicates with each other over multi-hop links is called as an Ad-hoc Network (MANET). The military battle-field scenarios, Post-disaster rescue efforts, sensor networks, and entrepreneurs in a conference are some of the examples of mobile ad-hoc networks. Since there is no infrastructure in the network, the routing should be handled at every node. To improve the life time of network different routing protocols are consider. In present routing protocols of ad hoc networks, routing is an act of moving information from a source to destination in an internetwork. Route is selected in the route discovery phase until all the packets are sent out. Due to the continuous flow of packets in a selected route leads to the route failure. In order to reduce this problem we consider PRD-based MMBCR and considering the percentage of the optimum value for periodic route discovery. In our research we are going to analyze the performance of different routing protocols like DSR, MMBCR to get maximum optimum value using Network Simulator Software.
Optimized Traffic Flow over Multipath in Optical Networkspaperpublications3
Abstract: In optical networks, the delivery of a traffic flow with a certain bandwidth demand over a single network path is either not possible or not cost-effective. In these cases, it is very often possible to improve the network's bandwidth utilization by splitting the traffic flow over multiple efficient paths. While using multiple paths for the same traffic flow increases the efficiency of the network, it consumes expensive forwarding resources from the network nodes such as wavelengths/light paths of optical networks. The problem of reducing forwarding cost can be defined in two cases such as Routing with Minimum Overhead and Decomposition with Minimum Overhead. For Routing with Minimum Overhead only the traffic demand must be given and for Decomposition with Minimum Overhead both the traffic demand and network flow will be given. For both the problems forwarding cost can be minimized by measuring the number of paths and the number of nodes traversed by these paths.
IMPROVING THE PERFORMACE OF DATA AGGREGATION IN WIRELESS SENSOR NETWORKEditor IJMTER
In this paper data aggregation using multipath routing is proposed. In existing system, under hybrid scheme, it each sensor nodes generates information by sensing its physical environment and transmit to sink by multi hop communication. In network aggregation computation intermediate forwarding nodes can substantially increase the network life time but amount of data contained in single packet and make the system vulnerability to packet loss. Instead of retransmission it takes the additional time. Ad hoc On Demand Distance Vector routing protocol is used to improving the performance of data aggregation due to avoiding these problems.
Bandwidth aware on demand multipath routing in manetsijwmn
Mobile Ad-hoc Networks (MANETs) are self configuring, decentralized and dynamic nature wireless
networks which have no infrastructure. These offer a number of advantages, however the demand of high
traffic flows in MANETs increases rapidly. For these demands, limited bandwidth of wireless network is the
important parameter that restrains the development of real time multimedia applications. In this work, we
propose a solution to utilize available bandwidth of the channel for on demand multiple disjoint paths. The
approximate bandwidth of a node is used to find the available bandwidth of the path. The source chooses
the primary route for data forwarding on the basis of path bandwidth. The simulation results show that the
proposed solution reduces the frequency of broadcast and performs well in improving the end to end
throughput, packet delivery ratio, and the end to end delay.
ENERGY LOCATION AWARE ROUTING PROTOCOL (ELARP) FOR WIRELESS MULTIMEDIA SENSOR...ijcsit
Wireless Sensor Networks (WSNs)have sensor nodes that sense and extract information from surrounding
environment, processing information locally then transmit it to sink wirelessly. Multimedia data is larger in
volume than scalar data, thus transmitting multimedia data via Wireless Multimedia Sensor Networks
(WMSNs) requires stick constraints on quality of services in terms of energy, throughput and end to end
delay.Multipath routing is to discover multipath during route discovery from source to sink. Discover
multipath and sending data via these different paths improve the bandwidth and decrease the end to end
delay. This paper introduces an Energy Location Aware Routing Protocol (ELARP) which is reactive
multipath routing protocol establishing three paths with awareness of node’s residual energy and distance.
ELARP has experimented with NS2 simulator. The simulation results show that ELARP enhances QoS for
multimedia data in terms of end to end delay and packet delivery ratio.
Optimized Link State Routing (OLSR) protocol is a proactive type of routing protocol that uses Multipoint
Relay (MPR) set as the virtual backbone structure. The existing literature has identified various issues with
respect to its backbone structure and has accordingly proposed improvements. In this paper, the focus is on
improving the OLSR protocol by employing a Connected Dominating Set (CDS) based virtual backbone
structure that is dynamically adaptable to rapid topology changes. A new Dynamically Adaptable Improved
Optimized Link State Routing (DA-IOLSR) protocol is proposed that uses the local topology information to
adapt the virtual backbone to topology changes. This assumes significance especially in networks that
experience very high mobility. Changes in the network topology caused by node additions, node deletions
and node mobility are taken care of. Simulations are carried out to assess the performance of DA-IOLSR
protocol and OLSR protocol. Packet delivery achieved by both the protocols is examined under varying
mobility by using various combinations of node speed and pause time values. It is found that DA-IOLSR
protocol provides better packet delivery as compared to OLSR protocol, under varying mobility conditions.
Survey on Routing in Opportunistic Networks
this paper basically overviews and disused those potential methods and Techniques to select next hop to forward the packets (message) to destination.
A Study of Routing Techniques in Intermittently Connected MANETsIJORCS
A Mobile Ad hoc Network (MANET) is a self-configuring infrastructure less network of mobile devices connected by wireless. These are a kind of wireless Ad hoc Networks that usually has a routable networking environment on top of a Link Layer Ad hoc Network. The routing approach in MANET includes mainly three categories viz., Reactive Protocols, Proactive Protocols and Hybrid Protocols. These traditional routing schemes are not pertinent to the so called Intermittently Connected Mobile Ad hoc Network (ICMANET). ICMANET is a form of Delay Tolerant Network, where there never exists a complete end – to – end path between two nodes wishing to communicate. The intermittent connectivity araise when network is sparse or highly mobile. Routing in such a spasmodic environment is arduous. In this paper, we put forward the indication of prevailing routing approaches for ICMANET with their benefits and detriments
Exploring Values and Value Streams by BPM method solved by Lean Management toolIOSR Journals
This paper suggests a continuous improvement plan that can satisfy customer’s value and eliminate
waste in the enterprise business process. In order to explore the applicability of lean management principles in
the enterprise business process, the five fundamental concepts (specify value, identify the value stream, flow,
pull, and perfection) of lean management are being used as a stable and proved approach. In addition, Business
Process Management is applied as a new method to constantly improve the elimination of waste in the
enterprise business process. This can be accomplished by the lean management concept. Moreover business
process problems, such as overlapping work, redoing work, communication gaps, inflexible processes, and
obscure processes, have the possibility of being solved by lean management.
Lean management has traditionally been adopted by manufacturing industries to improve operations through
the identification and elimination of all forms of waste basically. The construction industry has also adopted this
philosophy, primarily in the field of projects. In order to increase an organization’s competitiveness and
productivity, lean management is needed in the any business process as well as in the field. The intent of this
work is to explore a method of introducing lean management which continuously improves any business
processes. The five fundamental concepts (specify value, identify the value stream, flow, pull, and perfection) of
lean management as an approach are being adapted in this project to improve quality of the processes. Hence
the main objective of this paper to apply the tool of lean and six sigma management to improve the elimination
of waste in the enterprises business process. Followed by a literature review which provides a brief summary of
lean thinking and six sigma along with challenges might face while implementing. A case study follows that
demonstrates how; Business Process Management is applied as a tool, method to constantly improve the
business process.
A Survey of Agent Based Pre-Processing and Knowledge RetrievalIOSR Journals
Abstract: Information retrieval is the major task in present scenario as quantum of data is increasing with a
tremendous speed. So, to manage & mine knowledge for different users as per their interest, is the goal of every
organization whether it is related to grid computing, business intelligence, distributed databases or any other.
To achieve this goal of extracting quality information from large databases, software agents have proved to be
a strong pillar. Over the decades, researchers have implemented the concept of multi agents to get the process
of data mining done by focusing on its various steps. Among which data pre-processing is found to be the most
sensitive and crucial step as the quality of knowledge to be retrieved is totally dependent on the quality of raw
data. Many methods or tools are available to pre-process the data in an automated fashion using intelligent
(self learning) mobile agents effectively in distributed as well as centralized databases but various quality
factors are still to get attention to improve the retrieved knowledge quality. This article will provide a review of
the integration of these two emerging fields of software agents and knowledge retrieval process with the focus
on data pre-processing step.
Keywords: Data Mining, Multi Agents, Mobile Agents, Preprocessing, Software Agents
A Comparative Study of Tourism Industry in North-Eastern States of IndiaIOSR Journals
Despite of so many unique and natural beauties the North-eastern region of India is still place of least visited in India. Though the Government of India has been providing the financial assistance for development of tourist Infrastructure and promotion and marketing, the performances and development of the tourism in states is totally different. In this context, the present paper examines the tourism in North-eastern states of India. Major findings are the inflows of tourists are higher in Assam state and lower in Nagaland. Tourism sectors share in Gross State Domestic Product (GSDP) is high in Assam. As for the growth rate of tourists’ influx is concerned, the growth rate in Arunachal Pradesh is much higher with 55 percent compared to other states. Further, the Density of Tourist Population (DTP) and The Percapita Tourist arrival (PCT) is high in Sikkim with 101.57 and 1.19 respectively and lowest in Nagaland with 1.35 and 0.01. The major constraints of North-east tourism development and uneven performance among states are insufficient funds, lack of infrastructure, transportation, lack of alternatives means of transport, Marketing, boundary issues, terror effect and permit period. Steps should be taken to wipe-out the constraints for tourism development.
Effect of Internal and External Environment of Human Capital Development (Emp...IOSR Journals
This study uses object manufacturing companies going public in Indonesia, with a sample of 12 companies that tedaftar in Indonesia Stock Exchange. Each sample of 10 companies was taken at the level of managers and staff. This study sought to test and analyze whether the internal and external environment influence the development of human capital through intervening variables planning and human resource management, employee improvement, education and training, and recognition of employee performance and employee satisfaction . Results of this study indicate that first, the external environment has a positive and significant impact on the planning and management of human resources, education and training, and the development of human capital, but has no effect on the increase in employees, employee performance and recognition, and employee satisfaction. Second, the internal environment has a positive and significant impact on the planning and management of human resources, employee improvement, education and training, employee performance and recognition, employee satisfaction, and the development of human capital. Third, planning and human resource management, employee improvement, education and training, employee performance and recognition, employee satisfaction has a positive and significant impact on the development of Human Capital. Testing also proved that the development of human capital such as intellectual capital, emotional capital, social capital, fortitude capital, moral capital and health capital can be increased through the use of the external environment and internal environment, and improve the planning and management of human resources, employee improvement, education and training, performance and employee recognition and employee satisfaction.
The International Journal of Engineering & Science is aimed at providing a platform for researchers, engineers, scientists, or educators to publish their original research results, to exchange new ideas, to disseminate information in innovative designs, engineering experiences and technological skills. It is also the Journal's objective to promote engineering and technology education. All papers submitted to the Journal will be blind peer-reviewed. Only original articles will be published.
The papers for publication in The International Journal of Engineering& Science are selected through rigorous peer reviews to ensure originality, timeliness, relevance, and readability.
A New Efficient Cache Replacement Strategy for Named Data NetworkingIJCNCJournal
The Information-Centric Network (ICN) is a future internet architecture with efficient content retrieval and distribution. Named Data Networking (NDN) is one of the proposed architectures for ICN. NDN’s innetwork caching improves data availability, reduce retrieval delays, network load, alleviate producer load, and limit data traffic. Despite the existence of several caching decision algorithms, the fetching and distribution of contents with minimum resource utilization remains a great challenge. In this paper, we introduce a new cache replacement strategy called Enhanced Time and Frequency Cache Replacement strategy (ETFCR) where both cache hit frequency and cache retrieval time are used to select evicted data chunks. ETFCR adds time cycles between the last two requests to adjust data chunk’s popularity and cache hits. We conducted extensive simulations using the ccnSim simulator to evaluate the performance of ETFCR and compare it to that of some well-known cache replacement strategies. Simulations results show that ETFCR outperforms the other cache replacement strategies in terms of cache hit ratio, and lower content retrieval delay.
IMPROVING PACKET DELIVERY RATIO WITH ENHANCED CONFIDENTIALITY IN MANETijcsa
In Mobile Ad Hoc Network (MANET), the collection of mobile nodes gets communicated without the need of any customary infrastructure. In MANET, repeated topology changes and intermittent link breakage
causes the failure of existing path. This leads to rediscovery of new route by broadcasting RREQ packet.The number of RREQ packet in the network gets added due to the increased amount of link failures. This result in increased routing overhead which degrades the packet delivery ratio in MANET. While designing
routing protocols for MANET, it is indispensable to reduce the overhead in route discovery. In our previous
work[17], routing protocol based on neighbour details and probabilistic knowledge is utilized, additionally
the symmetric cipher AES is used for securing the data packet. Through this protocol, packet delivery ratio
gets increased and confidentiality is ensured. But there is a problem in secure key exchange among the
source and destination while using AES. To resolve that problem, hybrid cryptographic system i.e.,
combination of AES and RSA is proposed in this paper. By using this hybrid cryptographic scheme and the
routing protocol based on probability and neighbour knowledge, enhanced secure packet delivery is
ensured in MANET
Performance comparison of mobile ad hoc network routing protocolsIJCNCJournal
Mobile Ad-hoc Network (MANET) is an infrastructure less and decentralized network which need a robust
dynamic routing protocol. Many routing protocols for such networks have been proposed so far to find
optimized routes from source to the destination and prominent among them are Dynamic Source Routing
(DSR), Ad-hoc On Demand Distance Vector (AODV), and Destination-Sequenced Distance Vector (DSDV)
routing protocols. The performance comparison of these protocols should be considered as the primary
step towards the invention of a new routing protocol. This paper presents a performance comparison of
proactive and reactive routing protocols DSDV, AODV and DSR based on QoS metrics (packet delivery
ratio, average end-to-end delay, throughput, jitter), normalized routing overhead and normalized MAC
overhead by using the NS-2 simulator. The performance comparison is conducted by varying mobility
speed, number of nodes and data rate. The comparison results show that AODV performs optimally well
not the best among all the studied protocols.
Improved Good put using Harvest-Then-Transmit Protocol for Video TransferEswar Publications
In multiple wireless networks, large end-to-end delay and packet losses can decrease meaningfully the traffic flow goodput due to path irregularity and multiplicity. To report these problems, current methods are proposed by using management of queue and decision making process. Hence, this paper proposesa Harvest-Then-Transmit (HTT) Protocol which selects an energy efficient path based on multiple parameters i.e. energy, delay, transmission time and perform transmission of video to handle number of video packets. A multipath environment is establishing where a server performs transferring of video along the energy efficient path of wireless network. Simulation shows the proposed protocol improves the overall goodput up to 10%, increases packet delivery rate up to 12%, and reduces end-to-end delay up to 3%, compared to existing system.
Rough set based QoS enabled multipath source routing in MANET IJECEIAES
The single constrained Quality of Service (QoS) routing in Mobile Ad-hoc NETwork (MANET) is disastrous in consideration of MANET characteristics, inference, collision and link failure as it maintains a single path. The QoS enabled routing yields better packet delivery and maintains consistency among nodes in the network by incorporating multi-constrained and multipath routing. The Dynamic Source Routing (DSR) is best suited source routing algorithm to maintain multipath information at the source node, but performance degrades with larger number of mobile nodes. Multilayer mechanism should be incorporated to maintain QoS metric information spreads across multiple layers of TCP/IP protocol stack. The proposed multipath QoS enabled source routing provides balanced routing by making use of all these features. The imprecise decision making strategy called Rough Set Theory (RST) is used at destination node for decision making. The Route REQuest (RREQ) messages coming from different routes are filtered by considering the QoS metrics of each and every route by making use of RST. The Route REPly (RREP) messages are generated and delivered to the source node for filtered RREQ messages. The proposed routing algorithm will reduce load on the network by reducing number of control messages exchanged for route establishment. This will evenly distribute load among all the nodes and it also avoid the scenarios like few nodes starved for resources. Finally, multipath routing always provides alternate routing option in case of route failure.
PERFORMANCE ANALYSIS OF BROADCASTING IN MOBILE AD HOC NETWORKS USING CLUSTER ...ijasuc
Broadcasting is a fundamental service in Mobile Ad hoc Networks (MANETs). Cluster based approach
are proposed in literature to reduce the network collision, to reduce delay of packet transmission, to
reduce the energy consumption and improves the throughput. In this paper, a cluster- based
infrastructure is proposed for broadcasting in MANETs. The backbone of the network takes advantage of
the cluster structure and only requires cluster- heads and some selected gateways to forward the
broadcast packet. Each cluster head selects some gateways to forward the packet when it sends the
packet to all the cluster heads in its coverage set. Cluster structures have been simulated using mobile
simulator Glomosim 2.03, which gives better performance to reduce the network collision, to reduce
delay of packet transmission, to reduce the energy consumption and improves the throughput.
Novel Routing Protocol Based on Periodic Route Discovery for Mobile Adhoc Net...IJERA Editor
A group of mobile devices called as nodes, without any centralized network, communicates with each other over multi-hop links is called as an Ad-hoc Network (MANET). The military battle-field scenarios, Post-disaster rescue efforts, sensor networks, and entrepreneurs in a conference are some of the examples of mobile ad-hoc networks. Since there is no infrastructure in the network, the routing should be handled at every node. To improve the life time of network different routing protocols are consider. In present routing protocols of ad hoc networks, routing is an act of moving information from a source to destination in an internetwork. Route is selected in the route discovery phase until all the packets are sent out. Due to the continuous flow of packets in a selected route leads to the route failure. In order to reduce this problem we consider PRD-based MMBCR and considering the percentage of the optimum value for periodic route discovery. In our research we are going to analyze the performance of different routing protocols like DSR, MMBCR to get maximum optimum value using Network Simulator Software.
Optimized Traffic Flow over Multipath in Optical Networkspaperpublications3
Abstract: In optical networks, the delivery of a traffic flow with a certain bandwidth demand over a single network path is either not possible or not cost-effective. In these cases, it is very often possible to improve the network's bandwidth utilization by splitting the traffic flow over multiple efficient paths. While using multiple paths for the same traffic flow increases the efficiency of the network, it consumes expensive forwarding resources from the network nodes such as wavelengths/light paths of optical networks. The problem of reducing forwarding cost can be defined in two cases such as Routing with Minimum Overhead and Decomposition with Minimum Overhead. For Routing with Minimum Overhead only the traffic demand must be given and for Decomposition with Minimum Overhead both the traffic demand and network flow will be given. For both the problems forwarding cost can be minimized by measuring the number of paths and the number of nodes traversed by these paths.
IMPROVING THE PERFORMACE OF DATA AGGREGATION IN WIRELESS SENSOR NETWORKEditor IJMTER
In this paper data aggregation using multipath routing is proposed. In existing system, under hybrid scheme, it each sensor nodes generates information by sensing its physical environment and transmit to sink by multi hop communication. In network aggregation computation intermediate forwarding nodes can substantially increase the network life time but amount of data contained in single packet and make the system vulnerability to packet loss. Instead of retransmission it takes the additional time. Ad hoc On Demand Distance Vector routing protocol is used to improving the performance of data aggregation due to avoiding these problems.
Bandwidth aware on demand multipath routing in manetsijwmn
Mobile Ad-hoc Networks (MANETs) are self configuring, decentralized and dynamic nature wireless
networks which have no infrastructure. These offer a number of advantages, however the demand of high
traffic flows in MANETs increases rapidly. For these demands, limited bandwidth of wireless network is the
important parameter that restrains the development of real time multimedia applications. In this work, we
propose a solution to utilize available bandwidth of the channel for on demand multiple disjoint paths. The
approximate bandwidth of a node is used to find the available bandwidth of the path. The source chooses
the primary route for data forwarding on the basis of path bandwidth. The simulation results show that the
proposed solution reduces the frequency of broadcast and performs well in improving the end to end
throughput, packet delivery ratio, and the end to end delay.
ENERGY LOCATION AWARE ROUTING PROTOCOL (ELARP) FOR WIRELESS MULTIMEDIA SENSOR...ijcsit
Wireless Sensor Networks (WSNs)have sensor nodes that sense and extract information from surrounding
environment, processing information locally then transmit it to sink wirelessly. Multimedia data is larger in
volume than scalar data, thus transmitting multimedia data via Wireless Multimedia Sensor Networks
(WMSNs) requires stick constraints on quality of services in terms of energy, throughput and end to end
delay.Multipath routing is to discover multipath during route discovery from source to sink. Discover
multipath and sending data via these different paths improve the bandwidth and decrease the end to end
delay. This paper introduces an Energy Location Aware Routing Protocol (ELARP) which is reactive
multipath routing protocol establishing three paths with awareness of node’s residual energy and distance.
ELARP has experimented with NS2 simulator. The simulation results show that ELARP enhances QoS for
multimedia data in terms of end to end delay and packet delivery ratio.
Optimized Link State Routing (OLSR) protocol is a proactive type of routing protocol that uses Multipoint
Relay (MPR) set as the virtual backbone structure. The existing literature has identified various issues with
respect to its backbone structure and has accordingly proposed improvements. In this paper, the focus is on
improving the OLSR protocol by employing a Connected Dominating Set (CDS) based virtual backbone
structure that is dynamically adaptable to rapid topology changes. A new Dynamically Adaptable Improved
Optimized Link State Routing (DA-IOLSR) protocol is proposed that uses the local topology information to
adapt the virtual backbone to topology changes. This assumes significance especially in networks that
experience very high mobility. Changes in the network topology caused by node additions, node deletions
and node mobility are taken care of. Simulations are carried out to assess the performance of DA-IOLSR
protocol and OLSR protocol. Packet delivery achieved by both the protocols is examined under varying
mobility by using various combinations of node speed and pause time values. It is found that DA-IOLSR
protocol provides better packet delivery as compared to OLSR protocol, under varying mobility conditions.
Survey on Routing in Opportunistic Networks
this paper basically overviews and disused those potential methods and Techniques to select next hop to forward the packets (message) to destination.
A Study of Routing Techniques in Intermittently Connected MANETsIJORCS
A Mobile Ad hoc Network (MANET) is a self-configuring infrastructure less network of mobile devices connected by wireless. These are a kind of wireless Ad hoc Networks that usually has a routable networking environment on top of a Link Layer Ad hoc Network. The routing approach in MANET includes mainly three categories viz., Reactive Protocols, Proactive Protocols and Hybrid Protocols. These traditional routing schemes are not pertinent to the so called Intermittently Connected Mobile Ad hoc Network (ICMANET). ICMANET is a form of Delay Tolerant Network, where there never exists a complete end – to – end path between two nodes wishing to communicate. The intermittent connectivity araise when network is sparse or highly mobile. Routing in such a spasmodic environment is arduous. In this paper, we put forward the indication of prevailing routing approaches for ICMANET with their benefits and detriments
Exploring Values and Value Streams by BPM method solved by Lean Management toolIOSR Journals
This paper suggests a continuous improvement plan that can satisfy customer’s value and eliminate
waste in the enterprise business process. In order to explore the applicability of lean management principles in
the enterprise business process, the five fundamental concepts (specify value, identify the value stream, flow,
pull, and perfection) of lean management are being used as a stable and proved approach. In addition, Business
Process Management is applied as a new method to constantly improve the elimination of waste in the
enterprise business process. This can be accomplished by the lean management concept. Moreover business
process problems, such as overlapping work, redoing work, communication gaps, inflexible processes, and
obscure processes, have the possibility of being solved by lean management.
Lean management has traditionally been adopted by manufacturing industries to improve operations through
the identification and elimination of all forms of waste basically. The construction industry has also adopted this
philosophy, primarily in the field of projects. In order to increase an organization’s competitiveness and
productivity, lean management is needed in the any business process as well as in the field. The intent of this
work is to explore a method of introducing lean management which continuously improves any business
processes. The five fundamental concepts (specify value, identify the value stream, flow, pull, and perfection) of
lean management as an approach are being adapted in this project to improve quality of the processes. Hence
the main objective of this paper to apply the tool of lean and six sigma management to improve the elimination
of waste in the enterprises business process. Followed by a literature review which provides a brief summary of
lean thinking and six sigma along with challenges might face while implementing. A case study follows that
demonstrates how; Business Process Management is applied as a tool, method to constantly improve the
business process.
A Survey of Agent Based Pre-Processing and Knowledge RetrievalIOSR Journals
Abstract: Information retrieval is the major task in present scenario as quantum of data is increasing with a
tremendous speed. So, to manage & mine knowledge for different users as per their interest, is the goal of every
organization whether it is related to grid computing, business intelligence, distributed databases or any other.
To achieve this goal of extracting quality information from large databases, software agents have proved to be
a strong pillar. Over the decades, researchers have implemented the concept of multi agents to get the process
of data mining done by focusing on its various steps. Among which data pre-processing is found to be the most
sensitive and crucial step as the quality of knowledge to be retrieved is totally dependent on the quality of raw
data. Many methods or tools are available to pre-process the data in an automated fashion using intelligent
(self learning) mobile agents effectively in distributed as well as centralized databases but various quality
factors are still to get attention to improve the retrieved knowledge quality. This article will provide a review of
the integration of these two emerging fields of software agents and knowledge retrieval process with the focus
on data pre-processing step.
Keywords: Data Mining, Multi Agents, Mobile Agents, Preprocessing, Software Agents
A Comparative Study of Tourism Industry in North-Eastern States of IndiaIOSR Journals
Despite of so many unique and natural beauties the North-eastern region of India is still place of least visited in India. Though the Government of India has been providing the financial assistance for development of tourist Infrastructure and promotion and marketing, the performances and development of the tourism in states is totally different. In this context, the present paper examines the tourism in North-eastern states of India. Major findings are the inflows of tourists are higher in Assam state and lower in Nagaland. Tourism sectors share in Gross State Domestic Product (GSDP) is high in Assam. As for the growth rate of tourists’ influx is concerned, the growth rate in Arunachal Pradesh is much higher with 55 percent compared to other states. Further, the Density of Tourist Population (DTP) and The Percapita Tourist arrival (PCT) is high in Sikkim with 101.57 and 1.19 respectively and lowest in Nagaland with 1.35 and 0.01. The major constraints of North-east tourism development and uneven performance among states are insufficient funds, lack of infrastructure, transportation, lack of alternatives means of transport, Marketing, boundary issues, terror effect and permit period. Steps should be taken to wipe-out the constraints for tourism development.
Effect of Internal and External Environment of Human Capital Development (Emp...IOSR Journals
This study uses object manufacturing companies going public in Indonesia, with a sample of 12 companies that tedaftar in Indonesia Stock Exchange. Each sample of 10 companies was taken at the level of managers and staff. This study sought to test and analyze whether the internal and external environment influence the development of human capital through intervening variables planning and human resource management, employee improvement, education and training, and recognition of employee performance and employee satisfaction . Results of this study indicate that first, the external environment has a positive and significant impact on the planning and management of human resources, education and training, and the development of human capital, but has no effect on the increase in employees, employee performance and recognition, and employee satisfaction. Second, the internal environment has a positive and significant impact on the planning and management of human resources, employee improvement, education and training, employee performance and recognition, employee satisfaction, and the development of human capital. Third, planning and human resource management, employee improvement, education and training, employee performance and recognition, employee satisfaction has a positive and significant impact on the development of Human Capital. Testing also proved that the development of human capital such as intellectual capital, emotional capital, social capital, fortitude capital, moral capital and health capital can be increased through the use of the external environment and internal environment, and improve the planning and management of human resources, employee improvement, education and training, performance and employee recognition and employee satisfaction.
Recapitulating the development initiatives of a robust information security s...IOSR Journals
Abstract: Most current information security systems performance vary with the nature of the filed its being
operating. With an increased emphasizes on the adoption of security tools and technologies, the anomalies and
intrusion are mostly said defined to be detected on system's algorithm, when most systems have well defined
mechanism for rapid reaction and identification of intrusions. However, despite this support for anomaly
detection, this is usually limited and often require a full recompilation of the system to deploy a comprehensive
framework of security governance, strategies and practices employing the policies in implementation.
As a result, the absence of a robust security framework securing both the education and corporate
resources has heightened the tension for a strategic information security solutions which might ends with cost,
complexities and cumbersome to develop. This paper thereby presents an alternative comprehensive system
namely RITS-B which accommodates both the nature of education and organizations without a need to for a
further modification. Implication of the proposed approach at real time depicts its suitability in the arena of
concern.
Keywords: Information Security, Governance, Strategies, Practices, Regional Cultures and Believes.
Evaluation of Wash and Light Fastness of Some Selected Printed FabricsIOSR Journals
Abstract: The printed fabrics were subjected to ISO2, ISO3, and ISO4 wash fastness test and assessed for
change in colour and staining using the grey scale. The change in colour of the tested specimen and the staining
of the adjacent undyed cloths were assessed with the appropriate grey scales. The fabrics were also tested for
light fastness property. The specimen and the blue standard were exposed behind a glass and inserted into the
light fastness testing machine. Exposure was carried out for 48 hours. Based on the research carried out, it was
found that the selected foreign fabrics show a higher wash and light fastness property as compared to the local
fabrics which also show high wash and light fastness property.
Establishment of A Small Scale Non-Woven Tissue Processing IndustryIOSR Journals
Abstract: A study was made to establish a site for the tissue manufacturing industry. The industry is proposed to
be located in the Northern part of Nigeria. It will be situated on a 615,204 square meters area, which is to
be acquired prior to erection of building and other infrastructure. The major raw materials include
obsolete/waste paper, carton and chipboards. The types, of machines to be used are pulper machines,
chester machine, tissue recycling machine, culling machine and slicing machine. The in i t i a l capital outlay
for the plant is N75 million for a start. The product will generate a total revenue over a period of three years
of N97 mill io n with a net fixed asset of N54.S million. Thus, the project is feasible even at an annual discount
of 10%.
Heat Capacity of BN and GaN binary semiconductor under high Pressure-Temperat...IOSR Journals
In this paper, we have calculated the molar heat capacity for cubic zinc blende (cZB) BN and GaN binary semiconductors at high pressure-temperature (PT). For the calculation of heat capacity, we firstly obtained the Debye temperature (ϴD) variation with temperature and at higher temperature it becomes constant with temperature in quasi-harmonic approximation limits. We have also calculated the static Debye temperature (ϴD) from elastic constant for the both BN and GaN binary semiconductors. The elastic constants are calculated from the energy-strain relation using plane wave method in DFT approach. All the calculated results are well consistence with experimental and reported data
Supplier ranking and selection in a bakeryIOSR Journals
Supplier evaluation and selection is a fundamental problem in supply chain management. Many
companies may not know how to evaluate proposed suppliers to integrate the different criteria upon which they
want to make their decision. A number of techniques have been employed to solve this problem but were not
able tosufficiently incorporate qualitative criteria into consideration for estimation of their alternatives.
A multi-criteria decision-making (MCDM) methodology, the Analytical Hierarchy Process (AHP), which takes
into consideration both quantitative and qualitative criteria, was used to evaluate three suppliers of improvers
(a major ingredient) for bread production in a bakery,UIB, in southwest Nigeria. This method uses a ranking
scale when comparing alternatives. A consistency ratio is estimated when data have been collected to check for
the consistency of judgments to ensure an accurate result is obtained with the method.
It was discovered that Supplier C adds more value to UIB because it had the highest priority weight of 0.346,
although it was keenly followed by suppliers B and C with weights 0.336 and 0.317 respectively.
Results showed that each supplier fared well under one criteria or the other and there was a generally
good performance from all suppliers.
Sisal and its Potential for Creating Innovative Employment Opportunities and ...IOSR Journals
The tremendous potential of sisal (Agave sp.) as an important plant resource has not so far been fully
exploited in our country. Sisal leaves yield quality fibres, which are utilized for conventional purposes like
ropes, anchors, cordage and handicrafts. The superior engineering properties of sisal makes it an excellent
green material for its application in major sectors like marine, automotive, construction and renewable energy
etc. Preliminary investigations indicate that there is a great scope for the development of sisal based
technologies for rural and engineering applications. The sisal fibre and its allied activities could augment
employment opportunities for income generation in rural sector, whereas its engineering applications can
generate substantial employment potential in semi-urban and urban areas. New opportunities for the use of
sisal fibre as a reinforcing fibre in commodity papers potentially offers large markets and employment
generation for rural area people in India
Computer aided environment for drawing (to set) fill in the blank from given ...IOSR Journals
Abstract: In this paper, we present Development of computer aided environment for drawing (to set) fill in the
blanks that can generate for given paragraph. The System finds fill in the blanks, blanking key generates from
the selected statement. Syntactic and lexical features are used in this process. NLP parser is used, part of speech
taggers are applied on each of these sentences to encode necessary information.
We present our work in designing and implementing the system which generate the blanks. The System is
developed in Java using JDBC which is open source.
Keyword: Natural Language Processing NLP, Key selection, POS tagging, Sentence selection
Non Revenue Water Reduction- A Tool for Achiving 24x7 Water SupplyIOSR Journals
The availability of water at cheaper rates promotes the wasteful use of water. People give little or no
attention towards conservation of water. For sustenance of any water supply scheme it is essential that
revenue collected should be sufficient to maintain O & M cost and further development activities. Presently
there is major portion of Non Revenue Water (NRW) in the developing countries and there is urgent need to
curb it for efficient functioning of water supply schemes
Modeling and Analysis of Support Pin for Brake Spider Fixture by Fem Using An...IOSR Journals
Abstract: A fixture is designed and built to hold, support and locate every component to ensure that each is
drilled or machined with accuracy and manufactured individually. A fixture can be designed for a particular
job. A brake spider includes a spider body with a central opening and a slot for receiving a camshaft and
bracket assembly. The brake spider is attached to axle housing via the central opening. The form to be used
depends on the shape and requirement of the work piece to be machined. In the existing fixture, used for
modeling brake spider component, only five components were machined per hour. In the present work, detailed
study of brake spider component is carried out and design is modified to increase the productivity. The new
fixture design is carried out by using CATIA V5 modeling software and it is critically evaluated for the failure of
support pin component, by finite element method (FEM) using ANSYS software. This modified design is adapted
in the fabrication of fixture and is tested for its productivity. It is found that there is a considerable enhancement
in the productivity to seven components per hour with required accuracy.
Key Words: Fixture; support pin; ansys; brake spider; CATIA V5; FEM
RFID Based Warehouse Management of Perishable ProductsIOSR Journals
Abstract: The changing global market scenario, high level of competition, and faster obsolescence of
perishable products due to short self life and changing customer demand are among the key challenges faced by
perishable supply chains. Supply chains need to compete with growing variety of products, short delivery time,
higher cycle service level, high quality and lower cost. Perishability imposes an intense pressure on managers
as it adds an additional cost of disposal of outdated items, leading to out-of-stock situations and also loss of
company faith. These problems are arising mostly due to the lack of information at every stage of the supply
chains. The inadequate information about product quality, quantity, demand variability, product availability
and lead times creates the bullwhip effect (BWE) at all stages and chains leads to the mismanagement.
RFID technologies, with the appropriate IT infrastructure, would help major distributors and manufacturers, as
well as health-care system, defence industries, and global supply chains in which products and product
shipments must be traced and identified in a non-contact, wireless fashion using a computer network. This
paper presents the impact of RFID in warehouse management of perishable products. It provides mathematical
framework to asses the benefits of RFID in warehouse management. It helps management in the variety of ways
including improvement in receiving and shipping processes, reduction in cycle counting efforts, reduction in
stock outs/excess inventory, decreased counterfeiting, decreased returns, and reduction in inventory loss due to
shrinkage and obsolescence. A sensitivity analysis has been presented at the end of paper which shows the
compound effect of RFID, reduction in lead time and lead time variability. In all scenarios inventory level is
reduced by certain percentage by incorporating RFID.
Keywords— Supply chain management, Perishable product, Inventory, RFID, Warehouse.
Evaluation of and Fracture Behavior of Alloy 90 SheetsIOSR Journals
Abstract: ALLOY–90 refers to a family of austenitic nickel-based super alloys. Nimonic alloys typically consist
of roughly 80% nickel and 20% chromium with additives such as titanium and aluminium. Nickel-based
superalloys, among several high temperature structural alloys, are the prime materials for numerous advanced
high temperature structural components. Several advanced processing technologies, such as isothermal forging,
equiangle extrusion, investment casting, directional solidification and single crystal technologies, similar and
dissimilar metal joining, destructive and non- destructive testing too have also evolved.
In the past, a few attempts have been made to study the deformation behavior and Fracture behavior of the
alloy 90 sheets for sheet metal applications. However, these studies were limited to different commercial grades
such as cold rolled sheets of thicknesses upto 2 mm. None of these studies have addressed the influence of
microstructure and texture for ultra-thin sheet applications. Hence, a comprehensive study has been undertaken
to evaluate the ambient temperature deformation characteristics as a function of degree of cold rolling and
ageing.
In order to determine the tensile properties, tensile tests are conducted on the alloy-90 sheets of 1 mm
and 0.5 mm thicknesses in different heat treat conditions in different specimen orientations namely R, R+30º,
R+45º, R+60º and RT. The fracture behavior of the alloy sheets are studied to determine the mode of fracture.
present work includes comparison of tensile properties of macro and micro specimens of alloy 90 sheet and
properties evaluated in the present work include tensile flow behavior in various microstructural conditions
such as Cold rolled, Solution treated, aged for different times.
Key words: Formability, Alloy 90, Impact
Optimizing Mobile Robot Path Planning and Navigation by Use of Differential E...IOSR Journals
Abstract: Path planning and navigation is essential for an autonomous robot which can move avoiding the
static obstacles in a real world and to reach the specific target. Optimizing path for the robot movement gives
the optimal distance from the source to the target and save precious time as well. With the development of
various evolutionary algorithms, the differential evolution is taking the pace in comparison to genetic algorithm.
Differential evolution has been deployed quite successfully for solving global optimization problem. Differential
evolution is a very simple yet powerful metaheuristics type problem solving method. In this paper we are
proposing a Differential Evolution based path navigation algorithm for mobile path navigation and analyze its
efficiency with other developed approaches. The proposed algorithm optimized the robot path and navigates the
robot to the proper target efficiently.
Influence of the speed in advance and the laser’s power on the zone affected ...IOSR Journals
Abstract: The Laser cutting is a very important manufacturing technology. But this method has some
disadvantages, among which we find the emergence of a Thermically Affected Zone ZAT can dramatically alter
the characteristics of the processed material which affects its behaviour during its use. For this, we have tried in
this article to study the effect of the forward speed and the laser power in this area (thickness, hardening). In
this context, tests were made on steel C45 where we relied on the method of experiment plans to create a
mathematical model Significant coefficients are obtained by carrying out a variance analysis ANOVA on the
level of 5% of significance. We find that the speed in advance and the power of the laser have a great effect on
the ZAT.
Keywords: Cutting, Laser CO2, Heat Affected Zone.
Channel Equalization of WCDMA Downlink System Using Finite Length MMSE-DFEIOSR Journals
The performance of WCDMA system deteriorates in the presence of multipath fading environment.
Fading destroys the orthogonality and is responsible for multiple access interference (MAI). Though
conventional rake receiver provides reasonable performance in the WCDMA downlink system due to path
diversity, but it does not restores the orthogonality. Linear equalizer restores orthogonality and suppresses
MAI, but it is not efficient, since its performance depends on the spectral characteristics of the channel. To
overcome this, Minimum Mean Square Error- Decision Feedback Equalizer (MMSE-DFE) with a linear,
anticausal feedforward filter, causal feedback filter and simple detector is proposed in this paper. The filter taps
of finite length DFE is derived using the cholesky factorization theory, capable of suppressing noise,
Intersymbol Interference (ISI) and MAI. This paper describes the WCDMA downlink system using finite length
MMSE-DFE and takes into consideration the effects of interference which includes additive white gaussian
noise, multipath fading, ISI and MAI. Furthermore, the performance is compared with conventional rake
receiver and MMSE and the simulation results are shown.
A Professional QoS Provisioning in the Intra Cluster Packet Level Resource Al...GiselleginaGloria
Wireless mesh networking has transpired as a gifted technology for potential broadband wireless access. In a communication network, wireless mesh network plays a vital role in transmission and are structured in a mesh topology. The coordination of mesh routers and mesh clients forms the wireless mesh networks which are routed through the gateways. Wireless mesh networks uses IEEE 802.11 standards and has its wide applications broadband home networking and enterprise networking deployment such as Microsoft wireless mesh and MIT etc. A professional Qos provisioning in intra cluster packet level resource allocation for WMN approach takes power allocation, sub carrier allocation and packet scheduling. This approach combines the merits of a Karush-Kuhn-Tucker (KKT) algorithm and a genetic algorithm (GA) based approach. The KKT algorithm uses uniform power allocation over all the subcarriers, based on the optimal allocation criterion. The genetic algorithm is used to generate useful solutions to optimization and search problems and it is also used for search problems. By combining the intrinsic worth of both the approaches, it facilitates effective QOS provisioning at the packet level. It is concluded that, this approach achieves a preferred stability between system implementation and computational convolution.
Quality of Service Stability Based Multicast Routing Protocol for MANETsCSEIJJournal
Mobile Ad Hoc Networking Does Not Own Any Fixed Infrastructure And Hence, Stable Routing Is The
Major Problem. The Mobility Nature Of Manet’s Node Facilitates Rediscovery Of A New Path To
Organizing A Routing. In Order To Intensify The Quality Of Service And Routing Stability In Manet, We
Propose A Dynamic Quality Of Service Stability Based Multicast Routing Protocol By Modifying The
Cuckoo Search Algorithm Through A Modernizing Mechanism Which Is Derived From The Differential
Evolution Algorithm. Tuned Csa Is A Combined Feature Of Csa And De Algorithms. Periodically, Each
Node In The Network Creates Neighbour Stability And Qos Database At Every Node By Calculating The
Parameters Like Node And Link Stability Factor, Bandwidth Availability, And Delays. Finally, Multicast
Path Constructs Route Request And Route Reply Packets, Stability Information And Performing Route
Maintenance.
QUALITY OF SERVICE STABILITY BASED MULTICAST ROUTING PROTOCOL FOR MANETScseij
ABSTRACT :
Mobile Ad Hoc Networking Does Not Own Any Fixed Infrastructure And Hence, Stable Routing Is The Major Problem. The Mobility Nature Of Manet’s Node Facilitates Rediscovery Of A New Path To Organizing A Routing. In Order To Intensify The Quality Of Service And Routing Stability In Manet, We Propose A Dynamic Quality Of Service Stability Based Multicast Routing Protocol By Modifying The Cuckoo Search Algorithm Through A Modernizing Mechanism Which Is Derived From The Differential Evolution Algorithm. Tuned Csa Is A Combined Feature Of Csa And De Algorithms. Periodically, Each Node In The Network Creates Neighbour Stability And Qos Database At Every Node By Calculating The Parameters Like Node And Link Stability Factor, Bandwidth Availability, And Delays. Finally, Multicast Path Constructs Route Request And Route Reply Packets, Stability Information And Performing Route Maintenance.
Mobile Ad Hoc Networking Does Not Own Any Fixed Infrastructure And Hence, Stable Routing Is The
Major Problem. The Mobility Nature Of Manet’s Node Facilitates Rediscovery Of A New Path To
Organizing A Routing. In Order To Intensify The Quality Of Service And Routing Stability In Manet, We
Propose A Dynamic Quality Of Service Stability Based Multicast Routing Protocol By Modifying The
Cuckoo Search Algorithm Through A Modernizing Mechanism Which Is Derived From The Differential
Evolution Algorithm. Tuned Csa Is A Combined Feature Of Csa And De Algorithms. Periodically, Each
Node In The Network Creates Neighbour Stability And Qos Database At Every Node By Calculating The
Parameters Like Node And Link Stability Factor, Bandwidth Availability, And Delays. Finally, Multicast
Path Constructs Route Request And Route Reply Packets, Stability Information And Performing Route
Maintenance.
EFFICIENT MULTI-PATH PROTOCOL FOR WIRELESS SENSOR NETWORKSijwmn
Wireless sensor networks are useful for streaming multimedia in infrastructure-free and hazardous environments. However, these networks are quite different from their wired counterpart and are composed of nodes with constrained bandwidth and energy. Multiple-path transmission is one of the methods for ensuring QoS routing in both wired and wireless environment. Directed diffusion, a well known wireless sensor network protocol, only routes packets through a single path, which barely meets the throughput requirement of multimedia data. Instead, we propose a multipath algorithm based on directed diffusion that reinforces multiple routes with high link quality and low latency. This algorithm retains the merits of the original directed diffusion algorithms, including its energy efficiency and scalability. A hybrid metric of link quality and latency is used as the criterion for path selection. In order to select disjoint paths, we propose a scheme for reinforced nodes to respond negatively to multiple reinforcement messages. We use the NS-2 simulation tool with video trace generated by Multiple Description Coding (MDC) to evaluate the performance. The results show that our algorithm gives better throughput and delay performance, i.e higher video quality, than standard directed diffusion that transmits over a single path, with low overheads and energy consumption.
A Review of the Energy Efficient and Secure Multicast Routing Protocols for ...graphhoc
This paper presents a thorough survey of recent work addressing energy efficient multicast routing protocols and secure multicast routing protocols in Mobile Ad hoc Networks (MANETs). There are so many issues and solutions which witness the need of energy management and security in ad hoc wireless networks. The objective of a multicast routing protocol for MANETs is to support the propagation of data from a sender to all the receivers of a multicast group while trying to use the available bandwidth efficiently in the presence of frequent topology changes. Multicasting can improve the efficiency of the wireless link when sending multiple copies of messages by exploiting the inherent broadcast property of wireless transmission. Secure multicast routing plays a significant role in MANETs. However, offering energy efficient and secure multicast routing is a difficult and challenging task. In recent years, various multicast routing protocols have been proposed for MANETs. These protocols have distinguishing features and use different mechanisms.
Wireless Sensor Networks (WSNs)have sensor nodes that sense and extract information from surrounding environment, processing information locally then transmit it to sink wirelessly. Multimedia data is larger in volume than scalar data, thus transmitting multimedia data via Wireless Multimedia Sensor Networks (WMSNs) requires stick constraints on quality of services in terms of energy, throughput and end to end delay.Multipath routing is to discover multipath during route discovery from source to sink. Discover multipath and sending data via these different paths improve the bandwidth and decrease the end to end delay. This paper introduces an Energy Location Aware Routing Protocol (ELARP) which is reactive multipath routing protocol establishing three paths with awareness of node’s residual energy and distance. ELARP has experimented with NS2 simulator. The simulation results show that ELARP enhances QoS for multimedia data in terms of end to end delay and packet delivery ratio.
Connectivity aware and adaptive multipath routing algorithm for mobile adhoc ...ijwmn
We propose in this paper a connectivity-aware routing algorithm and a set of related theorems. This algorithm allows nodes in Mobile Adhoc and Sensor Networks (MASNets) to provide the highest connectivity life time to a specific destination since the issuance of data becomes a necessity for MASNets. In the proposed Solution, nodes in MASNets are able to specify the disjointness degree of the available paths allowing the discovery of the optimal set of backup routes and consequently enhance the survivability of the connectivity. These nodes perform an on-demand discovery and a generation of a set of routes, by specifying a disjointness threshold, representing the maximal number of nodes shared between any two paths in the set of k established paths. The proposed multipath routing algorithm, is adaptive, secure, and uses labels to carry the disjointness-threshold between nodes during the route discovery. A set of security mechanisms, based on the Watchdog and the digital signature concepts, is used to protect the route discovery process.
Wireless Sensor Networks (WSNs)have sensor nodes that sense and extract information from surrounding environment, processing information locally then transmit it to sink wirelessly. Multimedia data is larger in volume than scalar data, thus transmitting multimedia data via Wireless Multimedia Sensor Networks (WMSNs) requires stick constraints on quality of services in terms of energy, throughput and end to end delay.Multipath routing is to discover multipath during route discovery from source to sink. Discover multipath and sending data via these different paths improve the bandwidth and decrease the end to end delay. This paper introduces an Energy Location Aware Routing Protocol (ELARP) which is reactive multipath routing protocol establishing three paths with awareness of node’s residual energy and distance. ELARP has experimented with NS2 simulator. The simulation results show that ELARP enhances QoS for multimedia data in terms of end to end delay and packet delivery ratio.
The present paper describes a novel Raspberry Pi and Arduino UNO architecture used as a meteorological station. One of the advantages of the proposed architecture is the huge quantity of sensors developed for its usage; practically one can find them for any application, and weather sensing is not an exception. The principle followed is to configure Raspberry as a collector for measures obtained from Arduino, transmitting occurs via USB; meanwhile, Raspberry broadcasts them via a web page. For such activity is possible thanks to Raspbian, a Linux-based operating system. It has a lot of libraries and resources available, among them Apache Web Server, that gives the possibility to host a web-page. On it, the user can observe temperature, humidity, solar radiance, and wind speed and direction. Information on the web-page is refreshed each five minute; however, measurements arrive at Raspberry every ten seconds. This low refreshment rate was determined because weather variables normally do not abruptly change. As an additional feature, system stores all information on the log file, this gives the possibility for future analysis and processing.
Wireless Sensor Networks (WSNs)have sensor nodes that sense and extract information from surrounding environment, processing information locally then transmit it to sink wirelessly. Multimedia data is larger in volume than scalar data, thus transmitting multimedia data via Wireless Multimedia Sensor Networks (WMSNs) requires stick constraints on quality of services in terms of energy, throughput and end to end delay. Multipath routing is to discover multipath during route discovery from source to sink. Discover multipath and sending data via these different paths improve the bandwidth and decrease the end to end delay. This paper introduces an Energy Location Aware Routing Protocol (ELARP) which is reactive multipath routing protocol establishing three paths with awareness of node’s residual energy and distance. ELARP has experimented with NS2 simulator. The simulation results show that ELARP enhances QoS for multimedia data in terms of end to end delay and packet delivery ratio.
Solving QoS multicast routing problem using ACO algorithmAbdullaziz Tagawy
Many Internet multicast applications have stringent Quality-of-Service (QoS) requirements that include delay, loss rate, bandwidth, and delay jitter. In this paper, we present a Swarm intelligence based on Ant Colony Optimization (ACO) technique to optimize the multicast tree
Quality of Service Routing in Mobile Ad Hoc Networks Using Location and Energ...ijwmn
Mobile Ad hoc Networks are highly dynamic networks. Quality of Service (QoS) routing in such networks is usually limited by the network breakage due to either node mobility or energy depletion of the mobile nodes. Also, to fulfill certain quality parameters, presence of multiple node-disjoint paths becomes essential. Such paths aid in the optimal traffic distribution and reliability in case of path breakages. Thus, to cater such problem, we present a node-disjoint multipath protocol. The metric used to select the paths takes into account the stability of the nodes and the corresponding links. The proposed technique is also illustrated with an example.
QUALITY OF SERVICE ROUTING IN MOBILE AD HOC NETWORKS USING LOCATION AND ENERG...ijwmn
Mobile Ad hoc Networks are highly dynamic networks. Quality of Service (QoS) routing in such networks is usually limited by the network breakage due to either node mobility or energy depletion of the mobile nodes. Also, to fulfill certain quality parameters, presence of multiple node-disjoint paths becomes essential. Such paths aid in the optimal traffic distribution and reliability in case of path breakages. Thus, to cater such problem, we present a node-disjoint multi path protocol. The metric used to select the paths takes into account the stability of the nodes and the corresponding links. The proposed technique is also illustrated with an example.
Mobile ad hoc network is a reconfigurable network of mobile nodes connected by multi-hop wireless links and capable of operating without any fixed infrastructure support. In order to facilitate communication within such self-creating, self-organizing and self administrating network, a dynamic routing protocol is needed. The primary goal of such an ad hoc network routing protocol is to discover and establish a correct and efficient route between a pair of nodes so that messages may be delivered in a timely manner. Route construction should be done with a minimum of overhead and bandwidth consumption. This paper examines two routing protocols, both on-demand source routing, for mobile ad hoc networks– the Dynamic Source Routing (DSR), an flat architecture based and the Cluster Based Routing Protocol (CBRP), a cluster architecture based and evaluates both routing protocols in terms of packet delivery fraction, normalized routing load, average end to end delay, throughput by varying number of nodes per sq. km, traffic sources and mobility. Simulation results show that in high
mobility (pause time 0s) scenarios, CBRP outperforms DSR. CBRP scales well with increasing number of nodes.
Similar to A comparative analysis on qos multicast routing protocols in MANETs (20)
Explore the innovative world of trenchless pipe repair with our comprehensive guide, "The Benefits and Techniques of Trenchless Pipe Repair." This document delves into the modern methods of repairing underground pipes without the need for extensive excavation, highlighting the numerous advantages and the latest techniques used in the industry.
Learn about the cost savings, reduced environmental impact, and minimal disruption associated with trenchless technology. Discover detailed explanations of popular techniques such as pipe bursting, cured-in-place pipe (CIPP) lining, and directional drilling. Understand how these methods can be applied to various types of infrastructure, from residential plumbing to large-scale municipal systems.
Ideal for homeowners, contractors, engineers, and anyone interested in modern plumbing solutions, this guide provides valuable insights into why trenchless pipe repair is becoming the preferred choice for pipe rehabilitation. Stay informed about the latest advancements and best practices in the field.
Final project report on grocery store management system..pdfKamal Acharya
In today’s fast-changing business environment, it’s extremely important to be able to respond to client needs in the most effective and timely manner. If your customers wish to see your business online and have instant access to your products or services.
Online Grocery Store is an e-commerce website, which retails various grocery products. This project allows viewing various products available enables registered users to purchase desired products instantly using Paytm, UPI payment processor (Instant Pay) and also can place order by using Cash on Delivery (Pay Later) option. This project provides an easy access to Administrators and Managers to view orders placed using Pay Later and Instant Pay options.
In order to develop an e-commerce website, a number of Technologies must be studied and understood. These include multi-tiered architecture, server and client-side scripting techniques, implementation technologies, programming language (such as PHP, HTML, CSS, JavaScript) and MySQL relational databases. This is a project with the objective to develop a basic website where a consumer is provided with a shopping cart website and also to know about the technologies used to develop such a website.
This document will discuss each of the underlying technologies to create and implement an e- commerce website.
Welcome to WIPAC Monthly the magazine brought to you by the LinkedIn Group Water Industry Process Automation & Control.
In this month's edition, along with this month's industry news to celebrate the 13 years since the group was created we have articles including
A case study of the used of Advanced Process Control at the Wastewater Treatment works at Lleida in Spain
A look back on an article on smart wastewater networks in order to see how the industry has measured up in the interim around the adoption of Digital Transformation in the Water Industry.
Student information management system project report ii.pdfKamal Acharya
Our project explains about the student management. This project mainly explains the various actions related to student details. This project shows some ease in adding, editing and deleting the student details. It also provides a less time consuming process for viewing, adding, editing and deleting the marks of the students.
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdffxintegritypublishin
Advancements in technology unveil a myriad of electrical and electronic breakthroughs geared towards efficiently harnessing limited resources to meet human energy demands. The optimization of hybrid solar PV panels and pumped hydro energy supply systems plays a pivotal role in utilizing natural resources effectively. This initiative not only benefits humanity but also fosters environmental sustainability. The study investigated the design optimization of these hybrid systems, focusing on understanding solar radiation patterns, identifying geographical influences on solar radiation, formulating a mathematical model for system optimization, and determining the optimal configuration of PV panels and pumped hydro storage. Through a comparative analysis approach and eight weeks of data collection, the study addressed key research questions related to solar radiation patterns and optimal system design. The findings highlighted regions with heightened solar radiation levels, showcasing substantial potential for power generation and emphasizing the system's efficiency. Optimizing system design significantly boosted power generation, promoted renewable energy utilization, and enhanced energy storage capacity. The study underscored the benefits of optimizing hybrid solar PV panels and pumped hydro energy supply systems for sustainable energy usage. Optimizing the design of solar PV panels and pumped hydro energy supply systems as examined across diverse climatic conditions in a developing country, not only enhances power generation but also improves the integration of renewable energy sources and boosts energy storage capacities, particularly beneficial for less economically prosperous regions. Additionally, the study provides valuable insights for advancing energy research in economically viable areas. Recommendations included conducting site-specific assessments, utilizing advanced modeling tools, implementing regular maintenance protocols, and enhancing communication among system components.
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...Dr.Costas Sachpazis
Terzaghi's soil bearing capacity theory, developed by Karl Terzaghi, is a fundamental principle in geotechnical engineering used to determine the bearing capacity of shallow foundations. This theory provides a method to calculate the ultimate bearing capacity of soil, which is the maximum load per unit area that the soil can support without undergoing shear failure. The Calculation HTML Code included.
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
A comparative analysis on qos multicast routing protocols in MANETs
1. IOSR Journal of Computer Engineering (IOSR-JCE)
e-ISSN: 2278-0661, p- ISSN: 2278-8727Volume 15, Issue 4 (Nov. - Dec. 2013), PP 88-92
www.iosrjournals.org
www.iosrjournals.org 88 | Page
A comparative analysis on qos multicast routing protocols in
MANETs
Mamata Rath
Asst.Professor Dept. M.C.A, C.V.Raman Computer Academy Bhubaneswar,Odisha,India
Abstract: Simultaneous transmission of data from one sender to multiple receivers is called multicasting.
Several widely used applications require multicasting at least at the logical level. Examples include audio video
teleconferencing, real time video streaming and the maintenance of distributed databases. In many cases it is
advantageous to implement multicasting at the level of the routing algorithm (other approaches would be one-
to-all unicast or the implementation of multicasting at the application layer). In this paper we are presenting a
comparative analysis on various multicast routing protocols in adhoc networks.
Keywords: multicasting, multicast protocols,dynamic core, performance evaluation,Qos Parameters
I. INTRODUCTION
Mobile Adhoc Networks (MANETs) are a class of wireless communication networks without a fixed
infra-structure.The MANET concept has basically evolved to tackle the disaster situations like tsunami,
earthquake, terrorist activities, battlefields, land slides, etc.Later, the concept has been extended to include
applications such as online education, gaming, business, etc. Several applications in MANETs need group
communication to manage the situations. The MANET nodes do not provide reliable services and QoS
(QualityofService) guarantees as compared to other wireless networks such as WiFi, WiMAX, GSM and
CDMA.The main sources of unreliability in MANETs are due to limited battery capacity, limited memory and
processing power, varying channel conditions, less stability under unpredictable and high mobility of nodes.The
QoS parameters to be guaranteed for multimedia group commu- nication are bandwidth, delay, packetloss,
jitters and bandwidth-delay product.Here we discuss some of the important multicast routing protocols.
II. MULTICAST ROUTING MECHANISM IN MANETS
Multicast routing mechanisms are categorized based on topol- ogy and services within a topology.The
basis of topological classification includes: (a)Mesh (b)Tree (c)Zone,and (d) Others. Multicast routing
mechanisms can be further classified based on the services they provide by mainly focusing on reliability
(Rel),bandwidth (BW), delay(Del)andbandwidth- delay (BD) product.Examples of mesh based multicast routing
include On-Demand Multicast Routing Protocol (ODMRP) (Su etal.,2002; Leetetal.,1999), Enhanced ODMRP
(EODMRP) (Oh etal.,2008; Hu etal., 2009), Resilient ODMRP (RODMRP) (Xu etal.,2009; Pathirana, 2007),
Forward Group Multicast Protocol(FGMP) (Chiangetal., 1998), link stability based multicast routing in
MANETs(LSMRM) (Biradaretal.,2010), Agent-driven back bone Ring-based Reliable Multicast routing in
mobile Adhoc networks (RRMRA) (Biradarand Manvi,2011a), Reliable Neighbor based Multipath
Multicastrouting in MANETs (MMRNS) (BiradarandManvi, 2011b), Team Oriented Multicast (TOM)
protocol(Yunjungetal.,2003; Egbogahetal.,2008), Delay-Guaranteed Multicast Routing in multi-rate MANETs
(DG-ODMRP) (Chen etal.,2009), QoS-Aware Mesh construction to enhance multicast routing in mobile adhoc
Networks(QAMNet).
III. RELATED WORK
A.Adaptive demand-driven multicast routing (ADMR)[1]:
Jetcheva and Johnson propose ADMR, an on-demand multicast routing algorithm with almost no
periodic components within its system. ADMR dynamically maintains the multicast routing state for active
groups of nodes. The protocol uses source-based forwarding trees and continuously monitors the traffic pattern
of the source. This allows ADMR to detect broken links in a tree as well as to identify the sources which
stopped sending data packets. The sender node will transmit ‘‘keep-alive’’ messages to maintain the forwarding
tree. When the source wants to terminate the route, it stops sending the ‘‘keep-alive’’ messages, and the tree
expires. Similarly, the receiver nodes need to keep alive their respective branches by sending downstream
passive ACK messages. If these messages are stopped, ADMR ‘‘prunes’’ the specific branches of the
forwarding tree. Multicast data packets are forwarded from the sender to the multicast receivers using MAC
layer multicast transmissions along the path of shortest delay.
2. A comparative analysis on qos multicast routing protocols in MANETs
www.iosrjournals.org 89 | Page
B.Dynamic core based multicast routing (DCMP)[2] :
DCMP is a source-initiated multicast protocol proposed by Das et al. DCMP has been designed from
the ground up as a multicast protocol, without relying on existing unicast protocols. DCMP classifies the
sources into active, core active, and passive as shown in Fig. 30. Active sources use the traditional technique of
flooding the network with JoinReq control packets at regular intervals. Nodes which desire to join the multicast
group as a destination, reply with a JoinReply packet along the reverse path to the source. Passive nodes do not
participate in the creation of the multicast routes themselves. Instead, a subset of the active nodes, the core
active nodes form a shared mesh through which the passive sources transmit their data packets.
C.AMRoute: ad hoc multicast routing protocol [3]:
Xie et al. propose AMRoute which aims to avoid the high control packet overhead associated with the
maintenance of multicast trees in ad hoc networks with highly mobile nodes. It does not support guarantees for
minimal bandwidth and packet latency; the main design objectives are robustness and scalability. A
conventional unicast routing protocol is used to keep track of the network dynamics. AMRoute is independent
of the underlying unicast protocol, which can be chosen according to the specific network requirements. Thus,
AMRoute is only concerned with the dynamics of the multicast groups.
D.Energy efficient multicast routing [4]:
Li et al. focus on developing an energy efficient multicast routing protocol. By assigning the
transmission power of each node as a weight, the network graph is transformed to a new graph with weights
between edges. The minimum energy multicast (MEM) problem is to find the multicast tree whose total energy
cost is minimized. The problem now reduces to the directed Steiner tree (DST) problem.
E.QoS multicast routing protocol for clustering mobile ad hoc networks (QMRPCAH) [5] :
Layuan and Chunlin present a QoS aware multicast protocol for MANETs with clustering. The
proposed QMRPCAH protocol allows a node to maintain only local multicast information and a summary of
other clusters; it does not require knowledge of the global network. The protocol supports soft QoS without any
hard guarantees. There may exist transient periods of time without the required QoS, for instance during periods
of congestion, link breakage or packet loss.
F.QoS multicast routing using multiple paths/trees [6] :
Wu and Jia propose a routing protocol using multiple parallel paths or trees to ensure the bandwidth
requirement of a connection. The protocol is distributed and uses standard route discovery and route reply
techniques. The QoS requirements include a bandwidth requirement for a route and a delay bound represented
by the number of hops from source to destination. Similar to other on demand protocols,
G.Genetic algorithms for group multicast [7]:
Randaccio and Atzori propose a genetic algorithm (GA) based approach to the problem of finding
multicast trees which optimize bandwidth and delay parameters. The algorithm is initialized by building a
population of multicast trees in isolation by combining unicast paths between the source and destination pairs.
The unicast paths follow the shortest path in terms of hops, calculated using Dijkstra’s algorithm. From this
initial population, the GA algorithm generates various (possibly sub-optimal) combinations and selects them for
fitness. The fitness function used by the GA is based on the weighted average of transmission delay and network
resource utilization.
H.Fireworks [8] :
Law et al. propose a 2-tier multicast/ broadcast routing protocol, Fireworks, which adapts itself based
on network topology and group density. At appropriate times, it resorts to broadcast instead of multicast. Sensor
nodes are grouped together with local group leaders or cohort leaders corresponding to areas of high group
member affinity. These cohort leaders establish a sparse multicast tree between themselves and the source node
while they broadcast messages within the local group members
within their own cohort. The 2-tier hierarchical structure comprises of the upper tier formed the source and
cohort leaders (see Fig. 32). The lower tier consists of the members
in the cohort. The authors use a new metric termed as cohesiveness which maintains the affinity of group
members within a node’s k-hop radius.
I.Probabilistic predictive multicast algorithm (PPMA) [9] :
The Probabilistic Predictive Multicast Algorithm (PPMA) proposed by Pompili and Vittucci improves
the robustness and reliability of multicast trees in the event of link and/or node failures. The algorithm defines a
3. A comparative analysis on qos multicast routing protocols in MANETs
www.iosrjournals.org 90 | Page
new way to quantify the suitability of a link, the probabilistic link cost which is comprised of three terms:
energy, distance and lifetime. Using this new metric, the multicast trees can be computed in the centralized or
distributed manner. In the centralized approach, the algorithm simply substitutes the new metric for the other
metrics traditionally used in the centralized Bellman-Form algorithm (such as hop count).
J.Hierarchical multicast techniques and scalability [10]:
Gui and Mohapatra introduce a framework for hierarchical multicasting in MANET. The proposed
approaches include a domain-based and an overlay-driven. In the domain-based scheme, a large multicast group
of nodes is divided into sub-groups. Each sub-group is assigned as a sub-root, chosen based on topological
optimality. The sub-root uses its own lower-level multicast protocol to create its tree and deliver packets to
nodes within its sub-group. The source nodes of each group and sub-roots form a special sub-group for upper
level multicast which is used by the source node to deliver packets to the sub-roots.
K.Application layer multicast algorithm (ALMA) [11]:
Ge et al. propose an application-layer receiver-driven overlay multicast protocol. As the ALMA
protocol operates at the application level, it can be used in conjunction with any routing protocol.
ALMA creates a tree of logical links between the group members. If node mobility or congestion
makes it necessary, the tree can be dynamically reconfigured. Each edge of the logical multicast tree represents
a logical link – a path at the network layer (see Fig. 33). The members of the the group can choose to allow zero,
one or more children. A new member joins the group by sending join messages to multiple existing members.
L.QoS aware multicast routing[12]:
Sun and Li describe a series of QoS extensions to the AODV protocol. The approach uses the delay,
bandwidth and packet-loss characteristics of MAODV with no additional signaling. It also incorporates
multicast routing capability with the existing unicast. A source node sends a QoS route request, RREQ, which
is forwarded by intermediate nodes until it reaches the destination. The destination sends back the RREP packet
with a delay time corresponding to a predefined node traversal time (NTT). Intermediate nodes add their own
NTTs to the delay value and update their routing tables. Routes with the minimum delay are selected for data
transmissions. A similar technique is applied for the bandwidth requirement where source nodes indicate their
bandwidth requirements and intermediate nodes compare their available bandwidth before forwarding the
packet.
M.Ad hoc QoS multicasting (AQM) [13]:
Bur and Ersoy propose the AQM protocol which tracks QoS availability within the neighborhood of
every node based on the requirements and announces it during the session initiation. In order to join a session,
the nodes go through a request reply-reserve procedure that ensures the QoS information is updated and a
possible route is selected. A session is initiated by the initiator (MCN_INIT) node by broadcasting a session
initiation packet (SES_INIT).
This packet consists of the identity number and QoS class of the new session while also setting the
bandwidth and hop count rules for the session. Active sessions are maintained in a table (TBL_SESSION) at
each node. A membership table (TBL_MEMBER) maintains the status of predecessor nodes. The session
information is maintained with periodic session updates keeping track of changes in the QoS conditions and
node connectivity.
N.Content based multicast (CBM) [14]:
Zhou and Singh present a multicast model for a scenario where nodes are interested in obtaining
information about specific threats and resources. These threats and resources are a time t and distance d away
from the current location of the node. Nodes generate information about the movement, intensity and location of
threats. This information is multicast
through the network using a sensor-push receiver-pull approach. Here, sensors push the information into the
network while receivers pull the relevant information. The network is divided into geographic regions and a
sensor detecting a threat broadcasts it into one of these small regions. Individual receivers then pull threat
warnings from nodes that lie in the direction of travel.
O.Differential destination multicast (DDM) [15]:
In the DDM algorithm, proposed by Ji and Corson the source node of a multicast transmission encodes
all the destination addresses within each data packet header in an in-band fashion. With this approach, no fixed
multicast tree is created,
4. A comparative analysis on qos multicast routing protocols in MANETs
www.iosrjournals.org 91 | Page
the routing will be soft-state, similar to state routing algorithms such as DSR. This allows a lower control
overhead, as there is no need for extra packets to maintain multicast forwarding state. Control overhead only
occurs when there is actual data to send.
P.Robust multicasting in ad hoc networks using trees
(ROMANT) [16]:
The ROMANT algorithm proposed by Vaishampayan et al. uses a receiver-initiated group joining
scheme which does not require any underlying unicast routing protocol or the pre-assignment of cores to groups.
The cores of the groups are determined as follows. When a receiver joins a group, it checks if it has ever
received a core announcement for that group. If it did, the node joins the group as a non-core node. Otherwise,
the node considers itself to be the core of the group and starts sending core announcement packets with a core
ID. If several receivers join the group simultaneously, the one with the highest ID becomes the group core.
Q.Epidemic-based reliable and adaptive multicast for
mobile ad hoc networks (EraMobile) [17]:
Ozkasap et al. propose a reliable and adaptive multicast protocol based on bio-inspired epidemic methods.
Epidemic methods are stateless, thus they are a good match for the rapidly changing, non-deterministic structure
of MANETs. The algorithms takes advantage of the broadcast nature of the wireless medium to send gossip
messages locally within a multicast group to neighboring nodes. The traditional approach in gossip based
protocols is to select a random node from a predefined list before unicasting the gossip message to the node. In
EraMobile, the node gossips with a random subset of one-hop neighbors, constantly changing with node
mobility and changes in the local node density.
IV. COMPARISION AND ANALYSIS
1.The most important factor of comparision is whether the multicast happens at the network layer or
somewhere else. Most protocols position the implementation of the multicast at the network layer. ALMA [11]
implements it at the pplication layer (more exactly, at what the ISO model would call the session layer – but in
our current 4-layer networking hierarchy would be the lowest sublayer of the application layer with multiple
applications being able to be built on top of it).
2.Most multicast protocols are based on the receiver subscribing to the transmissions of a specific sender. An
interesting exception is CBM [14], which performs multicast
based on the content rather than the source of the messages. Almost all the protocols are based on building a
multicast tree, although there are some exceptions. CBM [14] does not build a tree due to its radically different
distribution model.
3. Differential destination multicast (DDM) [15] performs an on-demand, soft state based multicasting without
constructing an explicit tree. Finally, EraMobile [17] replaces the multicast tree with a stateless approach based
on epidemic algorithms.
4. Another question is whether the algorithm is considering
the state of the underlying network in the choice of the routing tree. There is an overall group of protocols
whose approach is to select a core of the network. These nodes will serve as forwarding nodes (for instance, as
the nonleaf nodes of the multicast tree). Naturally, the nodes in the core will be nodes with more resources
(although other criteria might also be considered – for instance, the fact that the core must extend in all
geographic areas of the network). From the protocols reviewed, core based protocols are DCMP [2], AMRoute
[3] (‘‘logical core’’), Fireworks [8] (‘‘cohort leaders’’), and ROMANT [16]. The latter is an example of those
protocols where the choice of the core is not based on resources (being simply based on the highest id). Other
protocols do not establish a core but consider the available resources of the nodes on a case-by-case basis:
energy efficient multicast routing [4] and PPMA [9] where energy is part of the probabilistic link cost.
V. CONCLUSION AND FURTHER WORK
Most protocols use a distributed implementation, with the only exception being the genetic algorithm
based approach.So, there is a question whether the protocol considers QoS features such as minimal bandwidth
of the multicast. QoS assurance almost always conflicts with resource conservation, as nodes with move
advantageous locations or higher bandwidth will tend to become overloaded. From the surveyed protocols, the
ones considering QoS are: QMRPCAH [5] (soft Qos), QoS multicast routing using multiple paths/trees [6], QoS
5. A comparative analysis on qos multicast routing protocols in MANETs
www.iosrjournals.org 92 | Page
aware multicast routing [12], AQM [13]. My future work includes designing a better qos performance routing
lgorithm.
REFERENCES
[1] J. Jetcheva, D. Johnson, Adaptive demand-driven multicast routing in multi-hop wireless ad hoc networks, in: Proceedings of ACM
MobiHoc, October 2001, pp. 33–44.
[2] S.K. Das, B.S. Manoj, C.S.R. Murthy, A dynamic core based multicast routing protocol for ad hoc wireless networks, in:
Proceedings of ACM MobiHoc, June 2002, pp. 24–35.
[3] J. Xie, R.R. Talpade, A. McAuley, M. Liu, Amroute: ad hoc multicast routing protocol, MONET 7 (6) (2002) 429–439.
[4] D. Li, Q. Liu, X. Hu, X. Jia, Energy efficient multicast routing in ad hoc wireless networks, Computer ommunications 30 (18)
(2007) 3746–3756.
[5] L. Layuan, L. Chunlin, A QoS multicast routing protocol for clustering mobile ad hoc networks, Computer Communications 30 (7)
(2007) 1641–1654.
[6] H. Wu, X. Jia, QoS multicast routing by using multiple paths/trees in wireless ad hoc networks, Ad Hoc Networks 5 (5) (2007)
600–612.
[7] L. Randaccio, L. Atzori, Group multicast routing problem: a genetic algorithms based approach, Computer Networks 51 (14) (2007)
3989–4004.
[8] L. Law, S. Krishnamurthy, M. Faloutsos, A novel adaptive protocol for lightweight efficient multicasting in ad hoc networks,
Computer Networks 51 (3) (2007) 823–834.
[9] D. Pompili, M. Vittucci, PPMA, a probabilistic predictive multicast algorithm for ad hoc networks, Ad Hoc Networks 4 (6) (2006)
724– 748.
[10] C. Gui, P. Mohapatra, Hierarchical multicast techniques and scalability in mobile ad hoc networks, Ad Hoc Networks 4 (5) (2006)
586–606.
[11] M. Ge, S. Krishnamurthy, M. Faloutsos, Application versus network layer multicasting in ad hoc networks: the ALMA routing
protocol , Ad Hoc Networks 4 (2) (2006) 283–300.
[12] B. Sun, L. Li, QoS-aware multicast routing protocol for ad hoc networks, Journal of Systems Engineering and Electronics 17 (2)
(2006) 417–422.
[13] K. Bür, C. Ersoy, Ad hoc quality of service multicast routing, Computer Communications 29 (1) (2005) 136–148.
[14] H. Zhou, S. Singh, Content based multicast (CBM) in ad hoc Networks, in: Proceedings of ACM MobiHoc, August 2000, pp. 51–
60.
[15] L. Ji, M. Corson, Differential destination multicast-a manet multicast routing protocol for small groups, in: Proceedings of IEEE
INFOCOM, vol. 2, April 2001, pp. 1192–1201.
[16] R. Vaishampayan, J. Garcia-Luna-Aceves, Efficient and robust multicast routing in mobile ad hoc networks, in: Proceedings of
IEEE International Conference on Mobile Ad-hoc and Sensor Systems, October 2004, pp. 304–313.
[17] O. Ozkasap, Z. Genc, E. Atsan, Epidemic-based reliable and adaptive multicast for mobile ad hoc networks, Computer Networks 53
(9) (2009) 1409–1430.