In this paper, we attempt to present a comparison
through rigorous studies (existing conventional models)
following software based modeling and verifications through
simulations in terms of various traffic parameters such as
packet loss, Recovery Time (Latency), reordering of packets
including recovery time for various widely used path recovery
models for the purpose of end-to-end recovery of LSPs in
MPLS domains using NS2 simulator.
The SpeedIT provides a partial acceleration of sparse linear solvers. Acceleration is achieved with a single reasonably priced NVIDIA Graphics Processing Unit (GPU) that supporst CUDA and proprietary advanced optimisation techniques.
Check also SpeedIT FLOW, our RANS single phase flow solver that runs fully on GPU: vratis.com/blog
“Signalling in GSM BSS” course focuses on signalling between GSM nodes within Base Station
System (BSS). During the course all protocols and signalling procedures on all interfaces within BSS
are presented in details. The organisation of channels of air interface and cell parameters is also
widely covered in the course. The course also describes parts of the Signalling System No. 7 that are
relevant for BSS and presents co-operation between Core Network and BSS during procedures like
call set-up and location update.
A Low Control Overhead Cluster Maintenance Scheme for Mobile Ad hoc NETworks ...IDES Editor
Clustering is an important research area for
mobile ad hoc networks (MANETs) as it increases the
capacity of network, reduces the routing overhead and
makes the network more scalable in the presence of both
high mobility and a large number of mobile nodes. In
clustering the clusterhead manage and store recent routing
information. However the frequent change of clusterhead
leads to loss of routing information stored, changes the route
between two nodes, affects the performance of the routing
protocol and makes the cluster structure unstable.
Communication overhead in terms of exchanging messages
is needed to elect a new clusterhead. The goal then would be
to keep the clusterhead change as least as possible to make
cluster structure more stable, to prevent loss of routing
information which in turn improve the performance of
routing protocol based on clustering. This can be achieved
by an efficient cluster maintenance scheme. In this work, a
novel clustering algorithm, namely Incremental
Maintenance Clustering Scheme (IMS) is proposed for
Mobile Ad Hoc Networks. The goals are yielding low
number of clusterhead and clustermember changes,
maintaining stable clusters, minimizing the number of
clustering overhead. Through simulations the performance
of IMS is compared with that of least cluster change (LCC)
and maintenance scheme of Cluster Based Routing Protocol
(CBRP) in terms of the number of clusterhead changes,
number of cluster-member changes and clustering overhead
by varying mobility and speed. The simulation results
demonstrate the superiority of IMS over LCC and
maintenance scheme of CBRP.
IJERA (International journal of Engineering Research and Applications) is International online, ... peer reviewed journal. For more detail or submit your article, please visit www.ijera.com
The SpeedIT provides a partial acceleration of sparse linear solvers. Acceleration is achieved with a single reasonably priced NVIDIA Graphics Processing Unit (GPU) that supporst CUDA and proprietary advanced optimisation techniques.
Check also SpeedIT FLOW, our RANS single phase flow solver that runs fully on GPU: vratis.com/blog
“Signalling in GSM BSS” course focuses on signalling between GSM nodes within Base Station
System (BSS). During the course all protocols and signalling procedures on all interfaces within BSS
are presented in details. The organisation of channels of air interface and cell parameters is also
widely covered in the course. The course also describes parts of the Signalling System No. 7 that are
relevant for BSS and presents co-operation between Core Network and BSS during procedures like
call set-up and location update.
A Low Control Overhead Cluster Maintenance Scheme for Mobile Ad hoc NETworks ...IDES Editor
Clustering is an important research area for
mobile ad hoc networks (MANETs) as it increases the
capacity of network, reduces the routing overhead and
makes the network more scalable in the presence of both
high mobility and a large number of mobile nodes. In
clustering the clusterhead manage and store recent routing
information. However the frequent change of clusterhead
leads to loss of routing information stored, changes the route
between two nodes, affects the performance of the routing
protocol and makes the cluster structure unstable.
Communication overhead in terms of exchanging messages
is needed to elect a new clusterhead. The goal then would be
to keep the clusterhead change as least as possible to make
cluster structure more stable, to prevent loss of routing
information which in turn improve the performance of
routing protocol based on clustering. This can be achieved
by an efficient cluster maintenance scheme. In this work, a
novel clustering algorithm, namely Incremental
Maintenance Clustering Scheme (IMS) is proposed for
Mobile Ad Hoc Networks. The goals are yielding low
number of clusterhead and clustermember changes,
maintaining stable clusters, minimizing the number of
clustering overhead. Through simulations the performance
of IMS is compared with that of least cluster change (LCC)
and maintenance scheme of Cluster Based Routing Protocol
(CBRP) in terms of the number of clusterhead changes,
number of cluster-member changes and clustering overhead
by varying mobility and speed. The simulation results
demonstrate the superiority of IMS over LCC and
maintenance scheme of CBRP.
IJERA (International journal of Engineering Research and Applications) is International online, ... peer reviewed journal. For more detail or submit your article, please visit www.ijera.com
On the Performance Analysis of Multi-antenna Relaying System over Rayleigh Fa...IDES Editor
In this work, the end-to-end performance of an
amplify-and-forward multi-antenna infrastructure-based relay
(fixed relay) system over flat Rayleigh fading channel is
investigated. New closed form expressions for the statistics of
the received signal-to-noise ratio (SNR) are presented and
applied for studying the outage probability and the average
bit error rate of the digital receivers. The results reveal that
the system performance improves significantly (roughly 3 dB)
for M=2 over that for M=1 in both low and high signal-tonoise
ratio. However, little additional performance
improvement can be achieved for M>2 relative to M=2 at high
SNR.
Exact Outage Performance Analysis of Amplify-and-forward-aware Cooperative NOMATELKOMNIKA JOURNAL
In this paper, new radio access scheme that combines Amplify-and-Forward (AF) relaying protocol and non-orthogonal multiple access (NOMA) system is introduced. In particular, different scenarios for fixed power allocation scheme is investigated. In addition, the outage probability of both weak and strong user is derived and provided in closed-form expressions. Such outage is investigated in high SNR scenario and comparison performance between these NOMA scenarios is introduced. Numerical simulations are offered to clarify the outage performance of the considered scheme if varying several parameters in the existing schemes to verify the derived formulas.
Analysis and Simulation of Pseudo Ranging Noise codes for Geo-Stationary Sate...IDES Editor
The Geo-Stationary Navigation Satellite System
will provides basically two types of services 1) Standard
Positioning Service (SPS) and 2) Restricted Service (RS).
Both of these services are provided at two frequencies of L
and S-Band. The code sequences used in SPS and RS are
Pseudo Ranging Noise (PRN) codes. In SPS downlink, it is
planned to use Gold Codes for navigation data transmission.
The RS navigation down link has signals with pilot component
and data component. The pilot component uses primary code
and secondary code to get final code known as tiered code.
The primary code is truncated Gold code. The secondary
code is PRN sequence code. The data component of RS service
uses truncated PRN sequence code. This paper presents the
performance analysis and simulation results of auto
correlation function (ACF) and Cross correlation function
(CCF) properties for Gold code, Kasami codes and it’s
truncation effect. Apart from ACF and CCF, Doppler
frequency shift on L & S-band carrier frequencies and
Doppler frequency shift on L & S band Codes are carried
out. The simulations of ACF & CCF on codes and Doppler
effects were analyzed using Matlab and System View design
tool and results are compared with Welch bound. The
simulated test results are well within the theoretical limits.
A Fault-tolerant Switch for Next Generation Computer NetworksIDES Editor
In this paper, the architecture of a Multi-plane
Parallel Deflection-Routed Circular Banyan (PDCB) network
based switching fabric is introduced. The PDCB network has
a cyclic, regular, self-routing, simple architecture and fairly
good performance. Its Performance is improved due to
reduction in blocking by two-dimensional path-multiplicity of
the proposed architecture. It consists of 4X4 Switching
Elements.
The proposed switch is shown to be fault-tolerant. A simple
analytical model based on Markov chain to evaluate the
performance of proposed switch under uniform traffic
condition has also been presented in this paper. The
performance parameters studied are Normalized Throughput
and Normalized Delay. Simulation study of the switch is also
performed to validate the model proposed.
Gravitational Based Hierarchical Clustering AlgorithmIDES Editor
We propose a new gravitational based hierarchical
clustering algorithm using kd- tree. kd- tree generates densely
populated packets and finds the clusters using gravitational
force between the packets. Gravitational based hierarchical
clustering results are of high quality and robustness. Our
method is effective as well as robust. Our proposed algorithm
is tested on synthetic dataset and results are presented.
A Novel Optimum Technique for JPEG 2000 Post Compression Rate Distortion Algo...IDES Editor
The new technique we proposed in this paper based
on Hidden Markov Model in the field of post compression rate
distortion algorithms certainly meet the requirements of high
quality still images. The existing technology has been
extensively applied in modern image processing. Development
of image compression algorithms is becoming increasingly
important for obtaining a more informative image from several
source images captured by different modes of imaging systems
or multiple sensors. The JPEG 2000 image compression
standard is very sensitive to errors. The JPEG2000 system
provides scalability with respect to quality, resolution and
color component in the transfer of images. But some of the
applications need certainly qualitative images at the output
ends. In our architecture the Proto-object also introduced as
the input ant bit rate allocation and rate distortion has been
discussed for the output image with high resolution. In this
paper, we have also discussed our novel response dependent
condensation image compression which has given scope to go
for this post compression Rate Distortion Algorithm (PCRD)
of JPEG 2000 standard. This proposed technique outperforms
the existing methods in terms of increasing efficiency,
optimum PSNR values at different bpp levels. The proposed
technique involves Hidden Markov Model to meet the
requirements for higher scalability and also to increase the
memory storage capacity.
Development of Robust Adaptive Inverse models using Bacterial Foraging Optimi...IDES Editor
Adaptive inverse models find applications in
communication and magnetic channel equalization,
recovery of digital data and adaptive linearization of
sensor characteristics. In presence of outliers in the
training signal, the model accuracy is severely reduced. In
this paper three robust inverse models are developed by
recursively minimizing robust norms using BFO based
learning rule. The performance of these models is assesses
through simulation study and is compared with those
obtained by standard squared norm based models. It is in
general, observed that the Wilcoxon norm based model
provides best performance. Moreover the squared error
based model is observed to perform the worst.
On the Performance Analysis of Multi-antenna Relaying System over Rayleigh Fa...IDES Editor
In this work, the end-to-end performance of an
amplify-and-forward multi-antenna infrastructure-based relay
(fixed relay) system over flat Rayleigh fading channel is
investigated. New closed form expressions for the statistics of
the received signal-to-noise ratio (SNR) are presented and
applied for studying the outage probability and the average
bit error rate of the digital receivers. The results reveal that
the system performance improves significantly (roughly 3 dB)
for M=2 over that for M=1 in both low and high signal-tonoise
ratio. However, little additional performance
improvement can be achieved for M>2 relative to M=2 at high
SNR.
Exact Outage Performance Analysis of Amplify-and-forward-aware Cooperative NOMATELKOMNIKA JOURNAL
In this paper, new radio access scheme that combines Amplify-and-Forward (AF) relaying protocol and non-orthogonal multiple access (NOMA) system is introduced. In particular, different scenarios for fixed power allocation scheme is investigated. In addition, the outage probability of both weak and strong user is derived and provided in closed-form expressions. Such outage is investigated in high SNR scenario and comparison performance between these NOMA scenarios is introduced. Numerical simulations are offered to clarify the outage performance of the considered scheme if varying several parameters in the existing schemes to verify the derived formulas.
Analysis and Simulation of Pseudo Ranging Noise codes for Geo-Stationary Sate...IDES Editor
The Geo-Stationary Navigation Satellite System
will provides basically two types of services 1) Standard
Positioning Service (SPS) and 2) Restricted Service (RS).
Both of these services are provided at two frequencies of L
and S-Band. The code sequences used in SPS and RS are
Pseudo Ranging Noise (PRN) codes. In SPS downlink, it is
planned to use Gold Codes for navigation data transmission.
The RS navigation down link has signals with pilot component
and data component. The pilot component uses primary code
and secondary code to get final code known as tiered code.
The primary code is truncated Gold code. The secondary
code is PRN sequence code. The data component of RS service
uses truncated PRN sequence code. This paper presents the
performance analysis and simulation results of auto
correlation function (ACF) and Cross correlation function
(CCF) properties for Gold code, Kasami codes and it’s
truncation effect. Apart from ACF and CCF, Doppler
frequency shift on L & S-band carrier frequencies and
Doppler frequency shift on L & S band Codes are carried
out. The simulations of ACF & CCF on codes and Doppler
effects were analyzed using Matlab and System View design
tool and results are compared with Welch bound. The
simulated test results are well within the theoretical limits.
A Fault-tolerant Switch for Next Generation Computer NetworksIDES Editor
In this paper, the architecture of a Multi-plane
Parallel Deflection-Routed Circular Banyan (PDCB) network
based switching fabric is introduced. The PDCB network has
a cyclic, regular, self-routing, simple architecture and fairly
good performance. Its Performance is improved due to
reduction in blocking by two-dimensional path-multiplicity of
the proposed architecture. It consists of 4X4 Switching
Elements.
The proposed switch is shown to be fault-tolerant. A simple
analytical model based on Markov chain to evaluate the
performance of proposed switch under uniform traffic
condition has also been presented in this paper. The
performance parameters studied are Normalized Throughput
and Normalized Delay. Simulation study of the switch is also
performed to validate the model proposed.
Gravitational Based Hierarchical Clustering AlgorithmIDES Editor
We propose a new gravitational based hierarchical
clustering algorithm using kd- tree. kd- tree generates densely
populated packets and finds the clusters using gravitational
force between the packets. Gravitational based hierarchical
clustering results are of high quality and robustness. Our
method is effective as well as robust. Our proposed algorithm
is tested on synthetic dataset and results are presented.
A Novel Optimum Technique for JPEG 2000 Post Compression Rate Distortion Algo...IDES Editor
The new technique we proposed in this paper based
on Hidden Markov Model in the field of post compression rate
distortion algorithms certainly meet the requirements of high
quality still images. The existing technology has been
extensively applied in modern image processing. Development
of image compression algorithms is becoming increasingly
important for obtaining a more informative image from several
source images captured by different modes of imaging systems
or multiple sensors. The JPEG 2000 image compression
standard is very sensitive to errors. The JPEG2000 system
provides scalability with respect to quality, resolution and
color component in the transfer of images. But some of the
applications need certainly qualitative images at the output
ends. In our architecture the Proto-object also introduced as
the input ant bit rate allocation and rate distortion has been
discussed for the output image with high resolution. In this
paper, we have also discussed our novel response dependent
condensation image compression which has given scope to go
for this post compression Rate Distortion Algorithm (PCRD)
of JPEG 2000 standard. This proposed technique outperforms
the existing methods in terms of increasing efficiency,
optimum PSNR values at different bpp levels. The proposed
technique involves Hidden Markov Model to meet the
requirements for higher scalability and also to increase the
memory storage capacity.
Development of Robust Adaptive Inverse models using Bacterial Foraging Optimi...IDES Editor
Adaptive inverse models find applications in
communication and magnetic channel equalization,
recovery of digital data and adaptive linearization of
sensor characteristics. In presence of outliers in the
training signal, the model accuracy is severely reduced. In
this paper three robust inverse models are developed by
recursively minimizing robust norms using BFO based
learning rule. The performance of these models is assesses
through simulation study and is compared with those
obtained by standard squared norm based models. It is in
general, observed that the Wilcoxon norm based model
provides best performance. Moreover the squared error
based model is observed to perform the worst.
Data Management In Cellular Networks Using Activity MiningIDES Editor
In the recent technology advances, an increasing
number of users are accessing various information systems
via wireless communication. The majority users in a mobile
environment are moving and accessing wireless services for
the activities they are currently unavailable inside. We
propose the idea of complex activity for characterizing the
continuously changing complex behavior patterns of mobile
users. For the purpose of data management, a complex activity
is copy as a sequence of location movement, service requests,
the coincidence of location and service, or the interleaving of
all above. An activity may be composed of sub activities.
Different activities may exhibit dependencies that affect user
behaviors. We argue that the complex activity concept provides
a more specific, rich, and detail description of user behavioral
patterns which are very useful for data management in mobile
environments. Correct exploration of user activities has the
possible of providing much higher quality and personalized
services to individual user at the right place on the right time.
We, therefore, propose new methods for complex activity
mining, incremental maintenance, online detection and
proactive data management based on user activities. In
particular, we develop pre-fetching and pushing techniques
with cost sensitive control to make easy analytical data
allocation. First round implementation and simulation results
shows that the proposed framework and techniques can
significantly increase local availability, conserve execution
cost, reduce response time, and improve cache utilization.
Visual Programming and Program Visualization – Towards an Ideal Visual Softwa...IDES Editor
There has been a great interest recently in systems
that use graphics to aid in the programming, debugging, and
understanding of computer systems. The ‘’Visual
Programming’’ and ‘’Program Visualization’’ are exciting
areas of active computer science research that show promise
for improving the programming process, for this they have
been applied to these systems. This article attempts to provide
more meaning to these terms by giving precise definitions,
and then surveys a number of systems that can be classified as
providing Visual Programming or Program Visualization.
These systems are organized by classifying them into two
different taxonomies. The paper also gives a brief description
of our approach that concentrated on both Visual Programming
and Program Visualization for an Ideal Visual Software
Engineering System. We consider it as a new promising trend
in software engineering.
Preventing Autonomous System against IP Source Address Spoofing: (PASIPS) A N...IDES Editor
Protecting sensitive information of an Autonomous
System (AS) is a critical issues. False origin with IP source
address spoofing is a major threat for AS which causes serious
attacks like insider attack, DDoS, unauthorized access of
intellectuals and many more. Intra domain IP source address
spoofing is still a challenge for security experts due to less
secure router architecture and unavailability of perfect
solution. In this paper, we aim to modify current LAN
communication technology in private network to eliminate
the possibility of any spoofed packet going outside that
network. Our method is fast, light weighted, low management
overhead and easy to deploy in IPv4 (preferable in IPv6), which
prevent IP source address spoofing in same subnet (AS) and
replay attack..
Image Fusion of Video Images and Geo-localization for UAV ApplicationsIDES Editor
We present in this paper a very fine method for
determining the location of a ground based target when viewed
from an Unmanned Aerial Vehicle (UAV). By determining the
pixel coordinates on the video frame and by using a range
finder the target’s geo-location is determined in the North-
East-Down (NED) frame. The contribution of this method is
that the target can be localized to within 9m when view from
an altitude of 2500m and down to 1m from an altitude of 100m.
This method offers a highly versatile tracking and geolocalisation
technique that has very good number of
advantages over the previously suggested methods. Some of
the key factors that differentiate our method from its
predecessors are:
1) Day and night time operation
2) All weather operation
3) Highly accurate positioning of target in terms of
latitude-longitude (GPS) and altitude.
4) Automatic gimbaled operation of the camera once
target is locked
5) Tracking is possible even when the target stops
moving
6) Independent of target (moving or stationary)
7) No terrain database is required
8) Instantaneous target geolocalisation is possible
Physical Layer Technologies And Challenges In Mobile Satellite CommunicationsIDES Editor
The central features of the future fourth-generation
mobile communication systems are the provisioning of highspeed
data transmissions (up to 1 Gb/s) and interactive
multimedia services. For effective delivery of these services,
the network must satisfy some stringent quality-of-service
(QoS) metrics, defined typically in terms of maximum delay
and/or minimum throughput performances. Mobile satellite
systems will be fully integrated with the future terrestrial
cellular systems, playing important roles as back-bones or
access satellites, to provide ubiquitous global coverage to
diverse users. The challenges for future broadband satellite
systems, therefore, lie in the proper deployments of state-ofthe-
art satellite technologies to ensure seamless integration of
the satellite networks into the cellular systems and its QoS
frameworks, while achieving, to the extent possible, efficient
use of the precious satellite link resources. This paper presents
an overview of the future high-speed satellite mobile
communication systems, the technologies deployed or planned
for deployments, and the challenges.
Le DPP devrait-il être obligatoire en Belgique. Une enquête PharmaPlanet exclusive auprès des pharmaciens Belges. Résultats nationaux – Enquête réalisée du 1er au 7 décembre 2015
New Testament Survey no.6 : John - His Gospel AccountClive Ashby
As part of the Course on the New Testament, Session 6 provides an overview of the writing of John - His Gospel on the life of Christ. (This is part of the New Testament Survey Course taught at Harare Theological College - 2016)
Exploiting cooperative relay for high performance communications in mimo ad h...IEEEFINALYEARPROJECTS
To Get any Project for CSE, IT ECE, EEE Contact Me @ 09849539085, 09966235788 or mail us - ieeefinalsemprojects@gmail.co¬m-Visit Our Website: www.finalyearprojects.org
Avoiding packet loss in gateway reallocation in mobile wimax networkseSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
Avoiding packet loss in gateway reallocation in mobile wimax networkseSAT Journals
Abstract Gateway reallocation algorithms are proposed to increase the capacity of WiMAX networks to serve more users. But most of the proposed solutions don’t consider the momentary packet loss occurring during the reallocation process. This momentary packet loss can also affect the application quality of service. In this work, I propose an efficient adaptive buffering strategy to avoid this packet loss in the network. Through simulation I prove that the approach is effective against momentary packet loss during the gateway reallocation process.
A cross layer optimized reliable multicast routing protocol in wireless mesh ...ijdpsjournal
The Optimal way to create a protocol in Wireless Mesh Networks
is to take into account a cross layer due
to the interference among wireless transmissions.
In this paper
,
w
e focus on designing and implementing
a
reliable
multicast protocol
called Me
sh Reliable Multicast Protocol (MRMP).
A
recovery tree
built
dynamically
which is joining with
the multicast routing tree.
U
sing the recovery tree
the packet losses are
repaired locally
.
This Cross layer
Technique
between network layer (
multicast routing)
and transport layer
(
reliability) using simulation
results
prove
the effectiveness
and optimization
of
cross layer
in WMNs
compare with the conventional layer
AFFECT OF PARALLEL COMPUTING ON MULTICORE PROCESSORScscpconf
Our main aim of research is to find the limit of Amdahl's Law for multicore processors, to make number of cores giving more efficiency to overall architecture of the CMP(Chip Multi
Processor a.k.a. Multicore Processor). As it is expected this limit will be in the architecture of Multicore Processor, or in the programming. We surveyed the architecture of the Multicore
processors of various chip manufacturers namely INTEL™, AMD™, IBM™ etc., and the various techniques there followed in, for improving the performance of the Multicore
Processors. We conducted cluster experiments to find this limit. In this paper we propose an alternate design of Multicore processor based on the results of our cluster experiment.
Affect of parallel computing on multicore processorscsandit
Our main aim of research is to find the limit of Amdahl's Law for multicore processors, to make
number of cores giving more efficiency to overall architecture of the CMP(Chip Multi
Processor a.k.a. Multicore Processor). As it is expected this limit will be in the architecture of
Multicore Processor, or in the programming. We surveyed the architecture of the Multicore
processors of various chip manufacturers namely INTEL™, AMD™, IBM™ etc., and the
various techniques there followed in, for improving the performance of the Multicore
Processors.
We conducted cluster experiments to find this limit. In this paper we propose an alternate design
of Multicore processor based on the results of our cluster experiment.
A Survey on Cross Layer Routing Protocol with Quality of ServiceIJSRD
Wireless is playing the wide role in today’s industrial application. Central idea of this paper is to enhance quality of service (QoS) for multimedia transmission over ad-hoc network. This paper describes the operational of different QoS routing protocols, their properties and various parameters advantages and disadvantages. Also describes the use of QoS in Cross layer routing protocol. Finally, it concludes by study of all these cross layer QoS routing protocols.
Energy efficiency in ieee 802.11 standard wlan through mwtdpeSAT Journals
Abstract The main goal of this work is to achieve the energy efficiency in 802.11 WLAN through minimizing the energy consumption in the network. In this proposed study, we introduced a modification in DCF for enhancing the performance of WLAN and it is achieved by giving a new definition for the DCF function of transmission. Generally, in DCF the way AP transmits for the various nodes is one-way during the process of polling. The proposed function modification for DCF enhances the IEEE 802.11 standard DCF Multi-Way Transmission DCF Protocol (MWTDP) with an improved version MWTDP it gives a low-complexity mechanism by which the active and non-active stations in the BSS save energy during the process of polling. With the inception of MWTDP transmissions are taken place in multi-way the access to the WLAN channel for mobile nodes in the list generated for polling with the SIFS interval whenever the transmission in receiving data packet from AP. Index Terms: MWTDP (Multi-Way transmission DCF Protocol), WLAN (Wireless LAN), DCF(Distributed Coordination Function)
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Benchmarking Failure Recovery Time in MPLS FRR with Link ProtectionVaideesh Ravi Shankar
Implementation of a network with MPLS environment using multiple routers to calculate convergence time by measuring the packet loss and transmission rate. Also analyzed the change in convergence time for varying packet size and number of transmitted packets.
An Adaptive Routing Algorithm for Communication Networks using Back Pressure...IJMER
The basic idea of backpressure techniques is to prioritize transmissions over links that have
the highest queue differentials. Backpressure method effectively makes packets flow through the network
as though pulled by gravity towards the destination end, which has the smallest queue size of zero. Under
high traffic conditions, this method works very well, and backpressure is able to fully utilize the available
network resources in a highly dynamic fashion. Under low traffic conditions, however, because many
other hosts may also have a small or zero queue size, there is inefficiency in terms of an increase in
delay, as packets may loop or take a long time to make their way to the destination end. In this paper we
use the concept of shadow queues. Each node has to maintain some counters, called as shadow queues,
per destination. This is very similar to the idea of maintaining a routing table (for routing purpose) per
destination. Using the concept of shadow queues, we partially decouple routing and the scheduling. A
shadow network is maintained to update a probabilistic routing table that packets use upon arrival at a
node. The same shadow network, with back-pressure technique, is used to activate transmissions between
nodes. The routing algorithm is designed to minimize the average number of hops used by the packets in
the network. This idea, along with the scheduling and routing decoupling, leads to delay reduction
compared with the traditional back-pressure algorithm
Simulation of BRKSS Architecture for Data Warehouse Employing Shared Nothing ...Dr. Amarjeet Singh
The BRKSS Architecture is based upon shared
nothing clustering that can scale-up to a large number of
computers, increase their speed and maintain the work load.
The architecture comprises of a console along with a CPU that
also acts as a buffer and stores information based on the
processing of transactions, when a batch enters into the
system. This console is connected to a switch (p-ports) which is
again connected to the c-number of clusters through their
respective hubs. The architecture can be used for personal
databases and for online databases like cloud through router.
This architecture uses the concept of load balancing by
moving the transaction among various nodes within the
clusters so that the overhead of a particular node can be
minimised. In this paper we have simulated the working of
BRKSS architecture using JDK 1.7 with Net beans 8.0.2. We
compared the result of performance parameters sch as
turnaround time, throughput and waiting time with existing
hierarchical clustering model.
Similar to Performance Comparison of Rerouting Schemes of Multi Protocol Label Switching Network (20)
Power System State Estimation - A ReviewIDES Editor
The aim of this article is to provide a comprehensive
survey on power system state estimation techniques. The
algorithms used for finding the system states under both static
and dynamic state estimations are discussed in brief. The
authors are opinion that the scope of pursuing research in the
area of state estimation with PMU and SCADA measurements
is the state of the art and timely.
Artificial Intelligence Technique based Reactive Power Planning Incorporating...IDES Editor
Reactive Power Planning is a major concern in the
operation and control of power systems This paper compares
the effectiveness of Evolutionary Programming (EP) and
New Improved Differential Evolution (NIMDE) to solve
Reactive Power Planning (RPP) problem incorporating
FACTS Controllers like Static VAR Compensator (SVC),
Thyristor Controlled Series Capacitor (TCSC) and Unified
power flow controller (UPFC) considering voltage stability.
With help of Fast Voltage Stability Index (FVSI), the critical
lines and buses are identified to install the FACTS controllers.
The optimal settings of the control variables of the generator
voltages,transformer tap settings and allocation and parameter
settings of the SVC,TCSC,UPFC are considered for reactive
power planning. The test and Validation of the proposed
algorithm are conducted on IEEE 30–bus system and 72-bus
Indian system.Simulation results shows that the UPFC gives
better results than SVC and TCSC and the FACTS controllers
reduce the system losses.
Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...IDES Editor
Damping of power system oscillations with the help
of proposed optimal Proportional Integral Derivative Power
System Stabilizer (PID-PSS) and Static Var Compensator
(SVC)-based controllers are thoroughly investigated in this
paper. This study presents robust tuning of PID-PSS and
SVC-based controllers using Genetic Algorithms (GA) in
multi machine power systems by considering detailed model
of the generators (model 1.1). The effectiveness of FACTSbased
controllers in general and SVC-based controller in
particular depends upon their proper location. Modal
controllability and observability are used to locate SVC–based
controller. The performance of the proposed controllers is
compared with conventional lead-lag power system stabilizer
(CPSS) and demonstrated on 10 machines, 39 bus New England
test system. Simulation studies show that the proposed genetic
based PID-PSS with SVC based controller provides better
performance.
Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...IDES Editor
This paper presents the need to operate the power
system economically and with optimum levels of voltages has
further led to an increase in interest in Distributed
Generation. In order to reduce the power losses and to improve
the voltage in the distribution system, distributed generators
(DGs) are connected to load bus. To reduce the total power
losses in the system, the most important process is to identify
the proper location for fixing and sizing of DGs. It presents a
new methodology using a new population based meta heuristic
approach namely Artificial Bee Colony algorithm(ABC) for
the placement of Distributed Generators(DG) in the radial
distribution systems to reduce the real power losses and to
improve the voltage profile, voltage sag mitigation. The power
loss reduction is important factor for utility companies because
it is directly proportional to the company benefits in a
competitive electricity market, while reaching the better power
quality standards is too important as it has vital effect on
customer orientation. In this paper an ABC algorithm is
developed to gain these goals all together. In order to evaluate
sag mitigation capability of the proposed algorithm, voltage
in voltage sensitive buses is investigated. An existing 20KV
network has been chosen as test network and results are
compared with the proposed method in the radial distribution
system.
Line Losses in the 14-Bus Power System Network using UPFCIDES Editor
Controlling power flow in modern power systems
can be made more flexible by the use of recent developments
in power electronic and computing control technology. The
Unified Power Flow Controller (UPFC) is a Flexible AC
transmission system (FACTS) device that can control all the
three system variables namely line reactance, magnitude and
phase angle difference of voltage across the line. The UPFC
provides a promising means to control power flow in modern
power systems. Essentially the performance depends on proper
control setting achievable through a power flow analysis
program. This paper presents a reliable method to meet the
requirements by developing a Newton-Raphson based load
flow calculation through which control settings of UPFC can
be determined for the pre-specified power flow between the
lines. The proposed method keeps Newton-Raphson Load Flow
(NRLF) algorithm intact and needs (little modification in the
Jacobian matrix). A MATLAB program has been developed to
calculate the control settings of UPFC and the power flow
between the lines after the load flow is converged. Case studies
have been performed on IEEE 5-bus system and 14-bus system
to show that the proposed method is effective. These studies
indicate that the method maintains the basic NRLF properties
such as fast computational speed, high degree of accuracy and
good convergence rate.
Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...IDES Editor
The size and shape of opening in dam causes the
stress concentration, it also causes the stress variation in the
rest of the dam cross section. The gravity method of the analysis
does not consider the size of opening and the elastic property
of dam material. Thus the objective of study is comprises of
the Finite Element Method which considers the size of
opening, elastic property of material, and stress distribution
because of geometric discontinuity in cross section of dam.
Stress concentration inside the dam increases with the opening
in dam which results in the failure of dam. Hence it is
necessary to analyses large opening inside the dam. By making
the percentage area of opening constant and varying size and
shape of opening the analysis is carried out. For this purpose
a section of Koyna Dam is considered. Dam is defined as a
plane strain element in FEM, based on geometry and loading
condition. Thus this available information specified our path
of approach to carry out 2D plane strain analysis. The results
obtained are then compared mutually to get most efficient
way of providing large opening in the gravity dam.
Assessing Uncertainty of Pushover Analysis to Geometric ModelingIDES Editor
Pushover Analysis a popular tool for seismic
performance evaluation of existing and new structures and is
nonlinear Static procedure where in monotonically increasing
loads are applied to the structure till the structure is unable
to resist the further load .During the analysis, whatever the
strength of concrete and steel is adopted for analysis of
structure may not be the same when real structure is
constructed and the pushover analysis results are very sensitive
to material model adopted, geometric model adopted, location
of plastic hinges and in general to procedure followed by the
analyzer. In this paper attempt has been made to assess
uncertainty in pushover analysis results by considering user
defined hinges and frame modeled as bare frame and frame
with slab modeled as rigid diaphragm and results compared
with experimental observations. Uncertain parameters
considered includes the strength of concrete, strength of steel
and cover to the reinforcement which are randomly generated
and incorporated into the analysis. The results are then
compared with experimental observations.
Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...IDES Editor
This paper is an attempt to base on auctions which
presents a frame work for the secure multi-party decision
protocols. In addition to the implementations which are very
light weighted, the main focus is on synchronizing security
features for avoiding agreements manipulations and reducing
the user traffic. Through this paper one can understand that
this different auction protocols on top of the frame work can
be collaborated using mobile devices. This paper present the
negotiation between auctioneer and the proffered and this
negotiation shows that multiparty security is far better than
the existing system.
Selfish Node Isolation & Incentivation using Progressive ThresholdsIDES Editor
The problems associated with selfish nodes in
MANET are addressed by a collaborative watchdog approach
which reduces the detection time for selfish nodes thereby
improves the performance and accuracy of watchdogs[1]. In
the related works they make use of credit based systems, reputation
based mechanisms, pathrater and watchdog mechanism
to detect such selfish nodes. In this paper we follow an approach
of collaborative watchdog which reduces the detection
time for selfish nodes and also involves the removal of such
selfish nodes based on some progressively assessed thresholds.
The threshold gives the nodes a chance to stop misbehaving
before it is permanently deleted from the network.
The node passes through several isolation processes before it
is permanently removed. Another version of AODV protocol
is used here which allows the simulation of selfish nodes in
NS2 by adding or modifying log files in the protocol.
Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...IDES Editor
Wireless sensor networks are networks having non
wired infrastructure and dynamic topology. In OSI model each
layer is prone to various attacks, which halts the performance
of a network .In this paper several attacks on four layers of
OSI model are discussed and security mechanism is described
to prevent attack in network layer i.e wormhole attack. In
Wormhole attack two or more malicious nodes makes a covert
channel which attracts the traffic towards itself by depicting a
low latency link and then start dropping and replaying packets
in the multi-path route. This paper proposes promiscuous mode
method to detect and isolate the malicious node during
wormhole attack by using Ad-hoc on demand distance vector
routing protocol (AODV) with omnidirectional antenna. The
methodology implemented notifies that the nodes which are
not participating in multi-path routing generates an alarm
message during delay and then detects and isolate the
malicious node from network. We also notice that not only
the same kind of attacks but also the same kind of
countermeasures can appear in multiple layer. For example,
misbehavior detection techniques can be applied to almost all
the layers we discussed.
Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...IDES Editor
The recent advancements in the wireless technology
and their wide-spread deployment have made remarkable
enhancements in efficiency in the corporate and industrial
and Military sectors The increasing popularity and usage of
wireless technology is creating a need for more secure wireless
Ad hoc networks. This paper aims researched and developed
a new protocol that prevents wormhole attacks on a ad hoc
network. A few existing protocols detect wormhole attacks but
they require highly specialized equipment not found on most
wireless devices. This paper aims to develop a defense against
wormhole attacks as an Anti-worm protocol which is based on
responsive parameters, that does not require as a significant
amount of specialized equipment, trick clock synchronization,
no GPS dependencies.
Cloud Security and Data Integrity with Client Accountability FrameworkIDES Editor
The Cloud based services provide much efficient
and seamless ways for data sharing across the cloud. The fact
that the data owners no longer possess data makes it very
difficult to assure data confidentiality and to enable secure
data sharing in the cloud. Despite of all its advantages this
will remain a major limitation that acts as a barrier to the
wider deployment of cloud based services. One of the possible
ways for ensuring trust in this aspect is the introduction of
accountability feature in the cloud computing scenario. The
Cloud framework requires promotion of distributed
accountability for such dynamic environment[1]. In some
works, there‘s an accountable framework suggested to ensure
distributed accountability for data sharing by the generation
of only a log of data access, but without any embedded feedback
mechanism for owner permission towards data
protection[2].The proposed system is an enhanced client
accountability framework which provides an additional client
side verification for each access towards enhanced security of
data. The integrity of content of data which resides in the
cloud service provider is also maintained by secured
outsourcing. Besides, the authentication of JAR(Java Archive)
files are done to ensure file protection and to maintain a safer
environment for data sharing. The analysis of various
functionalities of the framework depicts both the
accountability and security feature in an efficient manner.
Genetic Algorithm based Layered Detection and Defense of HTTP BotnetIDES Editor
A System state in HTTP botnet uses HTTP protocol
for the creation of chain of Botnets thereby compromising
other systems. By using HTTP protocol and port number 80,
attacks can not only be hidden but also pass through the
firewall without being detected. The DPR based detection
leads to better analysis of botnet attacks [3]. However, it
provides only probabilistic detection of the attacker and also
time consuming and error prone. This paper proposes a Genetic
algorithm based layered approach for detecting as well as
preventing botnet attacks. The paper reviews p2p firewall
implementation which forms the basis of filtering.
Performance evaluation is done based on precision, F-value
and probability. Layered approach reduces the computation
and overall time requirement [7]. Genetic algorithm promises
a low false positive rate.
Enhancing Data Storage Security in Cloud Computing Through SteganographyIDES Editor
in cloud computing data storage is a significant issue
because the entire data reside over a set of interconnected
resource pools that enables the data to be accessed through
virtual machines. It moves the application software’s and
databases to the large data centers where the management of
data is actually done. As the resource pools are situated over
various corners of the world, the management of data and
services may not be fully trustworthy. So, there are various
issues that need to be addressed with respect to the
management of data, service of data, privacy of data, security
of data etc. But the privacy and security of data is highly
challenging. To ensure privacy and security of data-at-rest in
cloud computing, we have proposed an effective and a novel
approach to ensure data security in cloud computing by means
of hiding data within images following is the concept of
steganography. The main objective of this paper is to prevent
data access from cloud data storage centers by unauthorized
users. This scheme perfectly stores data at cloud data storage
centers and retrieves data from it when it is needed.
The main tasks of a Wireless Sensor Network
(WSN) are data collection from its nodes and communication
of this data to the base station (BS). The protocols used for
communication among the WSN nodes and between the WSN
and the BS, must consider the resource constraints of nodes,
battery energy, computational capabilities and memory. The
WSN applications involve unattended operation of the network
over an extended period of time. In order to extend the lifetime
of a WSN, efficient routing protocols need to be adopted. The
proposed low power routing protocol based on tree-based
network structure reliably forwards the measured data towards
the BS using TDMA. An energy consumption analysis of the
WSN making use of this protocol is also carried out. It is
found that the network is energy efficient with an average
duty cycle of 0:7% for the WSN nodes. The OmNET++
simulation platform along with MiXiM framework is made
use of.
Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...IDES Editor
The security of authentication of internet based
co-banking services should not be susceptible to high risks.
The passwords are highly vulnerable to virus attacks due to
the lack of high end embedding of security methods. In order
for the passwords to be more secure, people are generally
compelled to select jumbled up character based passwords
which are not only less memorable but are also equally prone
to insecurity. Multiple use of distributed shares has been
studied to solve the problem of authentication by algorithms
based on thresholding of pixels in image processing and visual
cryptography concepts where the subset of shares is considered
for the recovery of the original image for authentication using
correlation function[1][2].The main disadvantage in the above
study is the plain storage of shares and also one of the shares
is being supplied to the customer, which will lead to the
possibility of misuse by a third party. This paper proposes a
technique for scrambling of pixels by key based random
permutation (KBRP) within the shares before the
authentication has been attempted. Total number of shares to
be created is dependent on the multiplicity of ownership of
the account. By this method the problem of uncertainty among
the customers with regard to security, storage, retrieval of
holding of half of the shares is minimized.
This paper presents a trifocal Rotman Lens Design
approach. The effects of focal ratio and element spacing on
the performance of Rotman Lens are described. A three beam
prototype feeding 4 element antenna array working in L-band
has been simulated using RLD v1.7 software. Simulated
results show that the simulated lens has a return loss of –
12.4dB at 1.8GHz. Beam to array port phase error variation
with change in the focal ratio and element spacing has also
been investigated.
Band Clustering for the Lossless Compression of AVIRIS Hyperspectral ImagesIDES Editor
Hyperspectral images can be efficiently compressed
through a linear predictive model, as for example the one
used in the SLSQ algorithm. In this paper we exploit this
predictive model on the AVIRIS images by individuating,
through an off-line approach, a common subset of bands, which
are not spectrally related with any other bands. These bands
are not useful as prediction reference for the SLSQ 3-D
predictive model and we need to encode them via other
prediction strategies which consider only spatial correlation.
We have obtained this subset by clustering the AVIRIS bands
via the clustering by compression approach. The main result
of this paper is the list of the bands, not related with the
others, for AVIRIS images. The clustering trees obtained for
AVIRIS and the relationship among bands they depict is also
an interesting starting point for future research.
Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...IDES Editor
A microelectronic circuit of block-elements
functionally analogous to two hydrogen bonding networks is
investigated. The hydrogen bonding networks are extracted
from â-lactamase protein and are formed in its active site.
Each hydrogen bond of the network is described in equivalent
electrical circuit by three or four-terminal block-element.
Each block-element is coded in Matlab. Static and dynamic
analyses are performed. The resultant microelectronic circuit
analogous to the hydrogen bonding network operates as
current mirror, sine pulse source, triangular pulse source as
well as signal modulator.
Texture Unit based Monocular Real-world Scene Classification using SOM and KN...IDES Editor
In this paper a method is proposed to discriminate
real world scenes in to natural and manmade scenes of similar
depth. Global-roughness of a scene image varies as a function
of image-depth. Increase in image depth leads to increase in
roughness in manmade scenes; on the contrary natural scenes
exhibit smooth behavior at higher image depth. This particular
arrangement of pixels in scene structure can be well explained
by local texture information in a pixel and its neighborhood.
Our proposed method analyses local texture information of a
scene image using texture unit matrix. For final classification
we have used both supervised and unsupervised learning using
K-Nearest Neighbor classifier (KNN) and Self Organizing
Map (SOM) respectively. This technique is useful for online
classification due to very less computational complexity.
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf91mobiles
91mobiles recently conducted a Smart TV Buyer Insights Survey in which we asked over 3,000 respondents about the TV they own, aspects they look at on a new TV, and their TV buying preferences.
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Ramesh Iyer
In today's fast-changing business world, Companies that adapt and embrace new ideas often need help to keep up with the competition. However, fostering a culture of innovation takes much work. It takes vision, leadership and willingness to take risks in the right proportion. Sachin Dev Duggal, co-founder of Builder.ai, has perfected the art of this balance, creating a company culture where creativity and growth are nurtured at each stage.
Securing your Kubernetes cluster_ a step-by-step guide to success !KatiaHIMEUR1
Today, after several years of existence, an extremely active community and an ultra-dynamic ecosystem, Kubernetes has established itself as the de facto standard in container orchestration. Thanks to a wide range of managed services, it has never been so easy to set up a ready-to-use Kubernetes cluster.
However, this ease of use means that the subject of security in Kubernetes is often left for later, or even neglected. This exposes companies to significant risks.
In this talk, I'll show you step-by-step how to secure your Kubernetes cluster for greater peace of mind and reliability.
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
Transcript: Selling digital books in 2024: Insights from industry leaders - T...BookNet Canada
The publishing industry has been selling digital audiobooks and ebooks for over a decade and has found its groove. What’s changed? What has stayed the same? Where do we go from here? Join a group of leading sales peers from across the industry for a conversation about the lessons learned since the popularization of digital books, best practices, digital book supply chain management, and more.
Link to video recording: https://bnctechforum.ca/sessions/selling-digital-books-in-2024-insights-from-industry-leaders/
Presented by BookNet Canada on May 28, 2024, with support from the Department of Canadian Heritage.
Neuro-symbolic is not enough, we need neuro-*semantic*Frank van Harmelen
Neuro-symbolic (NeSy) AI is on the rise. However, simply machine learning on just any symbolic structure is not sufficient to really harvest the gains of NeSy. These will only be gained when the symbolic structures have an actual semantics. I give an operational definition of semantics as “predictable inference”.
All of this illustrated with link prediction over knowledge graphs, but the argument is general.