The document discusses performance evaluation of mobility management in 4G wireless networks. It specifically focuses on handoff management and location management. For handoff management, it proposes using relative received signal strength as a performance criterion. It presents the procedure of this proposed handoff scheme. For location management, it discusses location update and paging operations. It then proposes a location update scheme that predicts future location of a mobile host based on history of its movement pattern.
Geographical routing protocols for mobile ad hoc networks a survey on their ...eSAT Journals
Abstract Mobile Ad Hoc network is an autonomous system of mobile nodes connected by wireless links forming a temporary network without the aid of any centralized administration or infrastructure. Each node operates not only as an end system but also as a router to forward packets. The nodes are free to move themselves into a network. These networks have no fixed topology due to the high degree of node mobility. To accommodate the changing topology, special routing protocols are needed. The goal of the routing protocol is to have an efficient route establishment between a pair of nodes, so that messages can be delivered in a timely manner. Mobile Ad Hoc routing protocols are divided into Flat routing, Hierarchical routing, Geographical routing, Power aware routing and Multicast routing. It is difficult to determine which protocols may perform well under a number of different network scenarios. This paper provides an overview of geographical routing protocols proposed in the literature and performance comparison of geographical routing protocols. Index Terms: Mobile Ad Hoc Network, Geographical Routing protocols.
Mobility Management Scheme for Mobile Communication Systems. A Reviewiosrjce
An intelligent mobility management scheme for mobile communication systems was studied. From
the result obtained, it was discovered that mobile to mobile call setup times showed a better performance as
compared to fixed network to mobile call setup and mobile to fixed call setup times. Moreover, increasing the
number of location areas within the switch does not affect inter-MSC handover and location updates since the
size of the switch coverage area remains the same. And when the location areas within the switch is increased,
intra-MSC location updates and handover also increases. Finally, user mobility directly affects the signaling
traffic for handover, location management, radio resource allocation and routing.
Research Inventy : International Journal of Engineering and Scienceinventy
Research Inventy : International Journal of Engineering and Science is published by the group of young academic and industrial researchers with 12 Issues per year. It is an online as well as print version open access journal that provides rapid publication (monthly) of articles in all areas of the subject such as: civil, mechanical, chemical, electronic and computer engineering as well as production and information technology. The Journal welcomes the submission of manuscripts that meet the general criteria of significance and scientific excellence. Papers will be published by rapid process within 20 days after acceptance and peer review process takes only 7 days. All articles published in Research Inventy will be peer-reviewed.
MODELING AND DESIGNING RESOURCE EFFICIENT DISTRIBUTED MANET MANAGEMENT SYSTEM...IJCNCJournal
The document describes a proposed distributed network management system (DMMS) for managing mobile ad hoc networks (MANETs). Key points:
- DMMS uses a distributed approach where each node has a management agent and stores management information locally. Agents exchange abstract data on a need-to-know basis to monitor and control the network.
- The system forms nodes into clusters, with a cluster head node acting as a local manager. Management messages are exchanged within and between clusters.
- Seven message types are defined for manager-agent communication, including GET, SET, and TRAP messages. Agents can respond with data or acknowledge requests.
- Management information is stored in MIBs and represented abstractly
Dynamic Shaping Method using SDN And NFV ParadigmsIJCNCJournal
Traffic shaping controls communication traffic flow to prevent a specified communication rate from being exceeded. In conventional networks, the traffic shaping device is implemented at a predetermined location and only a communication flow passing through the device is targeted. If the traffic can be shaped dynamically on any selected communication flows at the optimal point only when necessary, it could use network bandwidths and packet relay processing capacity more efficiently and flexibly.
This paper proposes a dynamic shaping method using Software-Defined Networking (SDN) and Network Functions Virtualization (NFV) paradigms, which selects the optimal communication flows to be shaped, and the optimal shaping points dynamically. This paper also presented system configuration and functions for the proposed dynamic shaping, and the method to simplify the process of collecting the traffic data of each communication flow by SDN controller.
A Survey on the Common Network Traffic Sources ModelsCSCJournals
Selecting the appropriate traffic model can lead to the successful design of networks. The more accurate is the traffic model the better is the system quantified in terms of its performance Successful design lead to enhancement the overall performance of the whole of network .in literature there is innumerous traffic models proposed for understanding and analyzing the traffic characteristics of networks. Consequently, the study of traffic models to understand the features of the models and identify eventually the best traffic model, for a concerned environment has become a crucial and lucrative task. Good traffic modeling is also a basic requirement for accurate capacity planning. This paper provides an overview of some of the widely used network traffic models, highlighting the core features of the model and traffic characteristics they capture best. Finally we found that the N_BURST traffic model can capture the traffic characteristics of most types of networks, under every possible circumstance rather than any type of traffic model.
Building impedance matching network based on s parameter from manufacturerJournal Papers
The document describes a method for building an impedance matching network for a transistor using S-parameter data and optimization tools in ADS simulation software. The transistor of interest operates from 220-270 MHz, where reference designs are unavailable. Input and output impedances are extracted from S-parameter files. An existing matching network design at a nearby frequency is used as a starting point. Optimization replaces ideal components with real ones, achieving over 30 dB return loss while degrading slightly from the ideal simulation. The method demonstrates synthesizing a matching network when reference designs are unavailable.
VARIABLE RANGE ENERGY EFFICIENT LOCATION AIDED ROUTING FOR MANETcscpconf
A Mobile Ad-Hoc Network (MANET) is a temporary, infrastructure-less and distributed network
having mobile nodes. MANET has limited resources like bandwidth and energy. Due to limited
battery power nodes die out early and affect the network lifetime. To make network energy
efficient, we have modified position based Location Aided Routing (LAR1) for energy
conservation in MANET. The proposed protocol is known as Variable Range Energy aware
Location Aided Routing (ELAR1-VAR). The proposed scheme controls the transmission power
of a node according to the distance between the nodes. It also includes energy information on
route request packet and selects the energy efficient path to route data packets. The comparative
analysis of proposed scheme and LAR1 is done by using the QualNet simulator. ELAR1-VAR
protocol improves the network lifetime by reducing energy consumption by 20% for dense and
mobile network while maintaining the packet delivery ratio above 90%.
Geographical routing protocols for mobile ad hoc networks a survey on their ...eSAT Journals
Abstract Mobile Ad Hoc network is an autonomous system of mobile nodes connected by wireless links forming a temporary network without the aid of any centralized administration or infrastructure. Each node operates not only as an end system but also as a router to forward packets. The nodes are free to move themselves into a network. These networks have no fixed topology due to the high degree of node mobility. To accommodate the changing topology, special routing protocols are needed. The goal of the routing protocol is to have an efficient route establishment between a pair of nodes, so that messages can be delivered in a timely manner. Mobile Ad Hoc routing protocols are divided into Flat routing, Hierarchical routing, Geographical routing, Power aware routing and Multicast routing. It is difficult to determine which protocols may perform well under a number of different network scenarios. This paper provides an overview of geographical routing protocols proposed in the literature and performance comparison of geographical routing protocols. Index Terms: Mobile Ad Hoc Network, Geographical Routing protocols.
Mobility Management Scheme for Mobile Communication Systems. A Reviewiosrjce
An intelligent mobility management scheme for mobile communication systems was studied. From
the result obtained, it was discovered that mobile to mobile call setup times showed a better performance as
compared to fixed network to mobile call setup and mobile to fixed call setup times. Moreover, increasing the
number of location areas within the switch does not affect inter-MSC handover and location updates since the
size of the switch coverage area remains the same. And when the location areas within the switch is increased,
intra-MSC location updates and handover also increases. Finally, user mobility directly affects the signaling
traffic for handover, location management, radio resource allocation and routing.
Research Inventy : International Journal of Engineering and Scienceinventy
Research Inventy : International Journal of Engineering and Science is published by the group of young academic and industrial researchers with 12 Issues per year. It is an online as well as print version open access journal that provides rapid publication (monthly) of articles in all areas of the subject such as: civil, mechanical, chemical, electronic and computer engineering as well as production and information technology. The Journal welcomes the submission of manuscripts that meet the general criteria of significance and scientific excellence. Papers will be published by rapid process within 20 days after acceptance and peer review process takes only 7 days. All articles published in Research Inventy will be peer-reviewed.
MODELING AND DESIGNING RESOURCE EFFICIENT DISTRIBUTED MANET MANAGEMENT SYSTEM...IJCNCJournal
The document describes a proposed distributed network management system (DMMS) for managing mobile ad hoc networks (MANETs). Key points:
- DMMS uses a distributed approach where each node has a management agent and stores management information locally. Agents exchange abstract data on a need-to-know basis to monitor and control the network.
- The system forms nodes into clusters, with a cluster head node acting as a local manager. Management messages are exchanged within and between clusters.
- Seven message types are defined for manager-agent communication, including GET, SET, and TRAP messages. Agents can respond with data or acknowledge requests.
- Management information is stored in MIBs and represented abstractly
Dynamic Shaping Method using SDN And NFV ParadigmsIJCNCJournal
Traffic shaping controls communication traffic flow to prevent a specified communication rate from being exceeded. In conventional networks, the traffic shaping device is implemented at a predetermined location and only a communication flow passing through the device is targeted. If the traffic can be shaped dynamically on any selected communication flows at the optimal point only when necessary, it could use network bandwidths and packet relay processing capacity more efficiently and flexibly.
This paper proposes a dynamic shaping method using Software-Defined Networking (SDN) and Network Functions Virtualization (NFV) paradigms, which selects the optimal communication flows to be shaped, and the optimal shaping points dynamically. This paper also presented system configuration and functions for the proposed dynamic shaping, and the method to simplify the process of collecting the traffic data of each communication flow by SDN controller.
A Survey on the Common Network Traffic Sources ModelsCSCJournals
Selecting the appropriate traffic model can lead to the successful design of networks. The more accurate is the traffic model the better is the system quantified in terms of its performance Successful design lead to enhancement the overall performance of the whole of network .in literature there is innumerous traffic models proposed for understanding and analyzing the traffic characteristics of networks. Consequently, the study of traffic models to understand the features of the models and identify eventually the best traffic model, for a concerned environment has become a crucial and lucrative task. Good traffic modeling is also a basic requirement for accurate capacity planning. This paper provides an overview of some of the widely used network traffic models, highlighting the core features of the model and traffic characteristics they capture best. Finally we found that the N_BURST traffic model can capture the traffic characteristics of most types of networks, under every possible circumstance rather than any type of traffic model.
Building impedance matching network based on s parameter from manufacturerJournal Papers
The document describes a method for building an impedance matching network for a transistor using S-parameter data and optimization tools in ADS simulation software. The transistor of interest operates from 220-270 MHz, where reference designs are unavailable. Input and output impedances are extracted from S-parameter files. An existing matching network design at a nearby frequency is used as a starting point. Optimization replaces ideal components with real ones, achieving over 30 dB return loss while degrading slightly from the ideal simulation. The method demonstrates synthesizing a matching network when reference designs are unavailable.
VARIABLE RANGE ENERGY EFFICIENT LOCATION AIDED ROUTING FOR MANETcscpconf
A Mobile Ad-Hoc Network (MANET) is a temporary, infrastructure-less and distributed network
having mobile nodes. MANET has limited resources like bandwidth and energy. Due to limited
battery power nodes die out early and affect the network lifetime. To make network energy
efficient, we have modified position based Location Aided Routing (LAR1) for energy
conservation in MANET. The proposed protocol is known as Variable Range Energy aware
Location Aided Routing (ELAR1-VAR). The proposed scheme controls the transmission power
of a node according to the distance between the nodes. It also includes energy information on
route request packet and selects the energy efficient path to route data packets. The comparative
analysis of proposed scheme and LAR1 is done by using the QualNet simulator. ELAR1-VAR
protocol improves the network lifetime by reducing energy consumption by 20% for dense and
mobile network while maintaining the packet delivery ratio above 90%.
A Grouped System Architecture for Smart Grids Based AMI Communications Over LTE ijwmn
- The document proposes a grouped hierarchical architecture and scheduling technique for smart meter communications over LTE networks. Smart meters are divided into groups, with each group connected to a data concentrator.
- The data concentrator collects smart meter readings and sends a total consumption message to the LTE network on a scheduled basis. It also sends individual smart meter readings.
- This grouped approach reduces the number of LTE modules needed and ensures real-time monitoring while avoiding overloading the LTE network, making LTE a promising solution for smart grid communications.
New weight function for adapting handover margin level over contiguous carrie...Journal Papers
The document proposes a new Adaptive Handover Margin algorithm called AHOM-NWF that automatically adjusts the handover margin level in LTE-Advanced systems using carrier aggregation. The algorithm considers three key functions - f(SINR), f(TL), and f(v) - which are evaluated based on signal-to-interference-plus-noise ratio, traffic load, and user velocity respectively. It assigns a weight to each function to estimate an accurate margin level. Simulation results show the proposed algorithm enhances system performance like SINR, cell edge throughput, and outage probability by an average of 24.4%, 14.6%, and 17.9% respectively over other existing algorithms.
Mobility Contrast Effect on Environment in Manet as Mobility ModelIOSR Journals
The document discusses mobility models in mobile ad hoc networks (MANETs). It describes several types of mobility models including:
1) Random mobility models like the random waypoint, random walk, and random direction models.
2) Group mobility models like the referential point group, nomadic community, and column models.
3) Map-based models like the Manhattan and freeway models.
4) Particle-based models like the pedestrian mobility model. The models have different characteristics that affect the performance of routing protocols in MANETs.
IRJET- Efficient and Secure Communication In Vehicular AD HOC NetworkIRJET Journal
The document discusses efficient and secure communication in vehicular ad hoc networks (VANETs). It proposes a Cluster based reliable routing (CRR) protocol. Vehicles are clustered based on their velocity, and a Cluster Controller (CC) is elected based on transmitter heights and position to manage communication among cluster members. The CRR protocol aims to address the challenging routing issues posed by the highly dynamic topology of VANETs.
A SELECTIVE PAGING SCHEME BASED ON ACTIVITY IN CELLULAR MOBILE NETWORKS FOR R...ijwmn
This document presents a selective paging scheme based on activity for location management in cellular networks. An activity-based mobility model is used where mobile terminals move between cells according to daily activity patterns like going to work or school. A simulation is conducted with 49 cells, 100 mobile terminals, and schedules for moving between home, workplaces, colleges and fitness centers. The proposed scheme applies prediction-based selective paging at reporting centers to reduce paging cost without increasing location update cost. Simulation results are analyzed to compare the location management costs of the conventional and proposed schemes.
This document discusses mobility management in mobile ad-hoc networks (MANETs). It begins by introducing MANETs and explaining that they are temporary networks formed spontaneously via wireless communication between mobile nodes without centralized administration. It then discusses the need for mobility management, including location management and handoff management routing protocols. It also discusses different types of node mobility and mobility models for predicting node movement patterns over time in MANETs. The document categorizes mobility models as trace-based (using real movement data) or synthetic-based (simulating realistic movement), and lists examples of models within each category like the random waypoint and reference point group mobility models.
Link Stability Based On Qos Aware On - Demand Routing In Mobile Ad Hoc NetworksIOSR Journals
This document summarizes a research paper that proposes a new routing protocol for mobile ad hoc networks (MANETs) that considers link stability and quality of service (QoS) metrics. The protocol estimates link quality based on node mobility prediction using GPS data. It calculates a "cost" metric factoring in link stability and power consumption to select paths with more stable, lower-cost links. Simulation results show the proposed protocol achieves higher throughput and packet delivery ratio compared to existing protocols, with lower control overhead. Future work could incorporate additional link quality metrics and statistical classifiers to further optimize path selection in MANETs.
MAR SECURITY: IMPROVED SECURITY MECHANISM FOR EMERGENCY MESSAGES OF VANET USI...IJCNCJournal
Vehicular Ad-hoc network (VANET) is one of the emerging technologies for research community to get various research challenges to construct secured framework for autonomous vehicular communication. The prime concern of this technology is to provide efficient data communication among registered vehicle nodes. The several research ideas are implemented practically to improve overall communication in VANETs by considering security and privacy as major aspects of VANETs. Several mechanisms have been implemented using cryptography algorithms and methodologies. However, these mechanisms provide a solution only for some restricted environments and to limited security threats. Hence, the proposed novel mechanism has been introduced, implemented and tested using key management technique. It provides secured network environment for VANET and its components. Later, this mechanism provides security for data packets of emergency messages using cryptography mechanism. Hence, the proposed novel mechanism is named Group Key Management & Cryptography Schemes (GKMC). The experimental analysis shows significant improvements in the network performance to provide security and privacy for emergency messages. This GKMC mechanism will help the VANET user’s to perform secured emergency message communication in network environment.
An Efficient and Stable Routing Algorithm in Mobile Ad Hoc NetworkIJCNCJournal
Mobile Ad hoc Network (MANET) is mainly designed to set up communication among devices in infrastructure-less wireless communication network. Routing in this kind of communication network is highly affected by its restricted characteristics such as frequent topological changes and limited battery power. Several research works have been carried out to improve routing performance in MANET. However, the overall performance enhancement in terms of packet delivery, delay and control message overhead is still not come into the wrapping up. In order to overcome the addressed issues, an Efficient and Stable-AODV (EFST-AODV) routing scheme has been proposed which is an improvement over AODV to establish a better quality route between source and destination. In this method, we have modified the route request and route reply phase. During the route request phase, cost metric of a route is calculated on the basis of parameters such as residual energy, delay and distance. In a route reply phase, average residual energy and average delay of overall path is calculated and the data forwarding decision is taken at the source node accordingly. Simulation outcomes reveal that the proposed approach gives better results in terms of packet delivery ratio, delay, throughput, normalized routing load and control message overhead as compared to AODV.
Improved AODV based on Load and Delay for Route Discovery in MANETIOSR Journals
This document proposes an improved AODV routing protocol for mobile ad hoc networks (MANETs) that considers both node load and routing delay when selecting routes. It calculates a "route weight" based on the average load and delay of the nodes along each potential path from source to destination. The path with the lowest route weight is then selected for routing to help balance traffic loads across the network and minimize delays. Simulation results showed this approach can dynamically balance traffic allocation between paths and optimize resource utilization in the MANET.
On the real time hardware implementation feasibility of joint radio resource ...IEEEFINALYEARPROJECTS
To Get any Project for CSE, IT ECE, EEE Contact Me @ 09849539085, 09966235788 or mail us - ieeefinalsemprojects@gmail.co¬m-Visit Our Website: www.finalyearprojects.org
A Proactive Greedy Routing Protocol Precludes Sink-Hole Formation in Wireless...ijwmn
The International Journal of Wireless & Mobile Networks (IJWMN) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of Wireless & Mobile Networks. The journal focuses on all technical and practical aspects of Wireless & Mobile Networks. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on advanced wireless & mobile networking concepts and establishing new collaborations in these areas.
PERFORMANCE EVALUATION OF VERTICAL HARD HANDOVERS IN CELLULAR MOBILE SYSTEMSijngnjournal
With the rapid increase of new and diverse cellular mobile services, the overlapping of cells has become typical in the majority of the coverage area of the network. Vertical handovers occur between two layers of cells when a user is switched from one layer to the other. In this paper we investigate the influence of network parameters on vertical hard handover performance in a cell environment. The work considers two layers of cells: a layer of macrocells and a layer of microcells. Handover requests enter the macrocell from neighbor macrocells and from microcells that belong to a different layer. Using Markov chain analysis and simulation we calculate network performance parameters such as mean queue delay, handover dropping probability and channel utilization. We also compare the handover performance for the macrocell and macrocell traffic separately. Our results show the influence of total channels, maximum queue size and handover request arrival rate on handover performance. They also show that when the traffic from each layer is treated with equal priority in the system, the performance of each layer is comparable.
Balancing stable topology and network lifetime in ad hoc networksIAEME Publication
This document summarizes a research paper that proposes a new topology control method called Network Connectivity based Topology Control (NCTC) to improve network lifetime in mobile ad hoc networks. The method aims to balance energy consumption and node connectivity in two phases: 1) minimizing interference between links, and 2) estimating an energy-efficient topology based on minimal weight paths. Simulation results using the NS2 simulator show that NCTC achieves better network lifetime, packet delivery ratio, lower overhead, and end-to-end delay compared to existing methods.
GPSFR: GPS-Free Routing Protocol for Vehicular Networks with Directional Ante...ijwmn
Efficient and practical communications between large numbers of vehicles are critical in providing high level of safety and convenience to drivers. Crucial real-time information on road hazard, traffic conditions and driver services must be communicated to vehicles rapidly even in adverse environments, such as “urban canyons” and tunnels. We propose a novel routing protocol in vehicular networks that does not require position information (e.g. from GPS) but instead rely on relative position that can be determined dynamically. This GPS-Free Geographic Routing (GPSFR) protocol uses the estimated relative position of vehicles and greedily chooses the best next hop neighbor based on a Balance Advance (BADV) metric which balances between proximity and link stability in order to improve routing performance. In this paper, we focuses primarily on the complexity of routing in highways and solves routing problems that arise when vehicles are near interchanges, curves, and merge or exit lanes of highways. Our simulation results show that by taking relative velocity into account, GPSFR reduces link breakage to only 27% that of GPSR in the dense network. Consequently, GPSFR outperforms GPSR in terms of higher data delivery ratio, lower delay, less sensitivity of the network density and route paths’length
PERFORMANCE ANALYSIS OF WIRELESS MESH NETWORK USING ADAPTIVE INFORMANT FACTOR...IJCSES Journal
Wireless mesh network (WMN) has become an important leading technology which provides several types of useful applications such as community network, broadband home network and internet access, etc. The rise in the size of users in WMN has created a degradation of efficiency in a network especially in dense areas due to the clumsy channel allocation and hence creating many challenges for enhancing the users experience, network quality and throughput. Therefore in this paper, we proposed OCA based AIF model that can access the channel information and then it process to improve the RF channel association. The proposed OCA-AIF will function for each period when some interference is detected via AIF and we further extend this analysis by taking in to consideration the influence of interference to provide a high quality indicator in network. The analysis of result shows the optimization by our proposed approach which increases as per the increment of relay nodes (RNs).
Traffic Congestion Prediction using Deep Reinforcement Learning in Vehicular ...IJCNCJournal
In recent years, a new wireless network called vehicular ad-hoc network (VANET), has become a popular research topic. VANET allows communication among vehicles and with roadside units by providing information to each other, such as vehicle velocity, location and direction. In general, when many vehicles likely to use the common route to proceed to the same destination, it can lead to a congested route that should be avoided. It may be better if vehicles are able to predict accurately the traffic congestion and then avoid it. Therefore, in this work, the deep reinforcement learning in VANET to enhance the ability to predict traffic congestion on the roads is proposed. Furthermore, different types of neural networks namely Convolutional Neural Network (CNN), Multilayer Perceptron (MLP) and Long Short-Term Memory (LSTM) are investigated and compared in this deep reinforcement learning model to discover the most effective one. Our proposed method is tested by simulation. The traffic scenarios are created using traffic simulator called Simulation of Urban Mobility (SUMO) before integrating with deep reinforcement learning model. The simulation procedures, as well as the programming used, are described in detail. The performance of our proposed method is evaluated using two metrics; the average travelling time delay and average waiting time delay of vehicles. According to the simulation results, the average travelling time delay and average waiting time delay are gradually improved over the multiple runs, since our proposed method receives feedback from the environment. In addition, the results without and with three different deep learning algorithms, i.e., CNN, MLP and LSTM are compared. It is obvious that the deep reinforcement learning model works effectively when traffic density is neither too high nor too low. In addition, it can be concluded that the effective algorithms for traffic congestion prediction models in descending order are MLP, CNN, and LSTM, respectively.
Design analysis and life estimation of a first stage rotor blade using nickel...IAEME Publication
The document analyzes the design, stresses, and life estimation of a first stage rotor blade made of CMSX4 nickel-based super alloy. Finite element analysis was conducted in ANSYS to determine stresses on the blade, with maximum stresses of 70.549 kPa found at the trailing edge root. Modal and life estimation analyses were also performed. The analyses found the blade design and stresses to be safe for continuous operation, which would increase the power capacity of the combined cycle gas turbine plant.
Optimization of the welding parameters in resistance spot weldingIAEME Publication
This document summarizes an analysis of resistance spot welding parameters on CRCA steel sheets using Taguchi methods. The authors conducted experiments varying welding current, electrode force, and welding time according to an L9 orthogonal array. Tensile shear strength was evaluated as the output parameter. Analysis of variance found welding current to be the most influential parameter, contributing 49.72% to strength. Optimal parameters were determined to be high current of 13.5 kA, medium electrode force of 4 kN, and high welding time of 10 seconds. Taguchi methods allowed determination of optimal resistance spot welding parameters for maximum tensile shear strength.
Optimization of process parameters in drilling of aisi 1015 steel for exit bu...IAEME Publication
The document analyzes and optimizes drilling parameters to minimize burr size in drilling AISI 1015 steel. Response surface methodology and Taguchi methods were used. Speed, feed, drill diameter, and point angle were parameters varied, and burr height and thickness were responses. Central composite design was used. Optimal parameters for minimum burr height were found to be 28 m/min speed, 0.1 mm/rev feed, 20 mm diameter, and 135° point angle. Optimal parameters for minimum burr thickness were 16 m/min speed, 0.05 mm/rev feed, 4 mm diameter, and 142° point angle.
Microstructural characterization and elastoplastic behaviour of high strengtIAEME Publication
This document discusses microstructural characterization and elastoplastic behavior of high strength low alloy steel. It describes how the steel was thermomechanically processed by controlled rolling just above the A3 temperature and then water quenched. Electron backscatter diffraction and nanoindentation were used to characterize the microstructure and mechanical properties. The ferrite grain size was refined to 1-3 microns through dynamic strain induced transformation of austenite during processing. The ferrite formed via different mechanisms exhibited varying elastoplastic behavior related to their carbon content and formation temperature.
A review recent trends in world and indian telecom marketIAEME Publication
The world market has changed almost beyond recognition over the last twenty years.
The recent trends in the world telecom market are: increase in private ownership,
competition, data based mobile and global communication, trade and finance oriented
operators, and rapid increase in subscribers from the developing nations. Several of these
trends (such as increase in privatization, competition, mobile communication, digital
divide) also exist in the Indian submarket. The submarkets of the world telecom market
are mainly classified according to geographical location, and according to the technology
used. India comes under the Asia Pacific geographical submarket. India had a traditional
telecom market, which was dominated by public sector monopoly till 1990. Later, it was
privatized by bits and pieces and now allows private sector participation in almost all the
sectors of telecom in the nation. It has a rapidly increasing subscriber base. It allows investor
friendly environment and has set up regulatory bodies to ensure justice to all players. In brief,
the present Indian telecom sector is marked by choice, competition, subscriber growth,
improvement in quality and service, and a shift from monopoly to oligopoly to true
competition.
A Grouped System Architecture for Smart Grids Based AMI Communications Over LTE ijwmn
- The document proposes a grouped hierarchical architecture and scheduling technique for smart meter communications over LTE networks. Smart meters are divided into groups, with each group connected to a data concentrator.
- The data concentrator collects smart meter readings and sends a total consumption message to the LTE network on a scheduled basis. It also sends individual smart meter readings.
- This grouped approach reduces the number of LTE modules needed and ensures real-time monitoring while avoiding overloading the LTE network, making LTE a promising solution for smart grid communications.
New weight function for adapting handover margin level over contiguous carrie...Journal Papers
The document proposes a new Adaptive Handover Margin algorithm called AHOM-NWF that automatically adjusts the handover margin level in LTE-Advanced systems using carrier aggregation. The algorithm considers three key functions - f(SINR), f(TL), and f(v) - which are evaluated based on signal-to-interference-plus-noise ratio, traffic load, and user velocity respectively. It assigns a weight to each function to estimate an accurate margin level. Simulation results show the proposed algorithm enhances system performance like SINR, cell edge throughput, and outage probability by an average of 24.4%, 14.6%, and 17.9% respectively over other existing algorithms.
Mobility Contrast Effect on Environment in Manet as Mobility ModelIOSR Journals
The document discusses mobility models in mobile ad hoc networks (MANETs). It describes several types of mobility models including:
1) Random mobility models like the random waypoint, random walk, and random direction models.
2) Group mobility models like the referential point group, nomadic community, and column models.
3) Map-based models like the Manhattan and freeway models.
4) Particle-based models like the pedestrian mobility model. The models have different characteristics that affect the performance of routing protocols in MANETs.
IRJET- Efficient and Secure Communication In Vehicular AD HOC NetworkIRJET Journal
The document discusses efficient and secure communication in vehicular ad hoc networks (VANETs). It proposes a Cluster based reliable routing (CRR) protocol. Vehicles are clustered based on their velocity, and a Cluster Controller (CC) is elected based on transmitter heights and position to manage communication among cluster members. The CRR protocol aims to address the challenging routing issues posed by the highly dynamic topology of VANETs.
A SELECTIVE PAGING SCHEME BASED ON ACTIVITY IN CELLULAR MOBILE NETWORKS FOR R...ijwmn
This document presents a selective paging scheme based on activity for location management in cellular networks. An activity-based mobility model is used where mobile terminals move between cells according to daily activity patterns like going to work or school. A simulation is conducted with 49 cells, 100 mobile terminals, and schedules for moving between home, workplaces, colleges and fitness centers. The proposed scheme applies prediction-based selective paging at reporting centers to reduce paging cost without increasing location update cost. Simulation results are analyzed to compare the location management costs of the conventional and proposed schemes.
This document discusses mobility management in mobile ad-hoc networks (MANETs). It begins by introducing MANETs and explaining that they are temporary networks formed spontaneously via wireless communication between mobile nodes without centralized administration. It then discusses the need for mobility management, including location management and handoff management routing protocols. It also discusses different types of node mobility and mobility models for predicting node movement patterns over time in MANETs. The document categorizes mobility models as trace-based (using real movement data) or synthetic-based (simulating realistic movement), and lists examples of models within each category like the random waypoint and reference point group mobility models.
Link Stability Based On Qos Aware On - Demand Routing In Mobile Ad Hoc NetworksIOSR Journals
This document summarizes a research paper that proposes a new routing protocol for mobile ad hoc networks (MANETs) that considers link stability and quality of service (QoS) metrics. The protocol estimates link quality based on node mobility prediction using GPS data. It calculates a "cost" metric factoring in link stability and power consumption to select paths with more stable, lower-cost links. Simulation results show the proposed protocol achieves higher throughput and packet delivery ratio compared to existing protocols, with lower control overhead. Future work could incorporate additional link quality metrics and statistical classifiers to further optimize path selection in MANETs.
MAR SECURITY: IMPROVED SECURITY MECHANISM FOR EMERGENCY MESSAGES OF VANET USI...IJCNCJournal
Vehicular Ad-hoc network (VANET) is one of the emerging technologies for research community to get various research challenges to construct secured framework for autonomous vehicular communication. The prime concern of this technology is to provide efficient data communication among registered vehicle nodes. The several research ideas are implemented practically to improve overall communication in VANETs by considering security and privacy as major aspects of VANETs. Several mechanisms have been implemented using cryptography algorithms and methodologies. However, these mechanisms provide a solution only for some restricted environments and to limited security threats. Hence, the proposed novel mechanism has been introduced, implemented and tested using key management technique. It provides secured network environment for VANET and its components. Later, this mechanism provides security for data packets of emergency messages using cryptography mechanism. Hence, the proposed novel mechanism is named Group Key Management & Cryptography Schemes (GKMC). The experimental analysis shows significant improvements in the network performance to provide security and privacy for emergency messages. This GKMC mechanism will help the VANET user’s to perform secured emergency message communication in network environment.
An Efficient and Stable Routing Algorithm in Mobile Ad Hoc NetworkIJCNCJournal
Mobile Ad hoc Network (MANET) is mainly designed to set up communication among devices in infrastructure-less wireless communication network. Routing in this kind of communication network is highly affected by its restricted characteristics such as frequent topological changes and limited battery power. Several research works have been carried out to improve routing performance in MANET. However, the overall performance enhancement in terms of packet delivery, delay and control message overhead is still not come into the wrapping up. In order to overcome the addressed issues, an Efficient and Stable-AODV (EFST-AODV) routing scheme has been proposed which is an improvement over AODV to establish a better quality route between source and destination. In this method, we have modified the route request and route reply phase. During the route request phase, cost metric of a route is calculated on the basis of parameters such as residual energy, delay and distance. In a route reply phase, average residual energy and average delay of overall path is calculated and the data forwarding decision is taken at the source node accordingly. Simulation outcomes reveal that the proposed approach gives better results in terms of packet delivery ratio, delay, throughput, normalized routing load and control message overhead as compared to AODV.
Improved AODV based on Load and Delay for Route Discovery in MANETIOSR Journals
This document proposes an improved AODV routing protocol for mobile ad hoc networks (MANETs) that considers both node load and routing delay when selecting routes. It calculates a "route weight" based on the average load and delay of the nodes along each potential path from source to destination. The path with the lowest route weight is then selected for routing to help balance traffic loads across the network and minimize delays. Simulation results showed this approach can dynamically balance traffic allocation between paths and optimize resource utilization in the MANET.
On the real time hardware implementation feasibility of joint radio resource ...IEEEFINALYEARPROJECTS
To Get any Project for CSE, IT ECE, EEE Contact Me @ 09849539085, 09966235788 or mail us - ieeefinalsemprojects@gmail.co¬m-Visit Our Website: www.finalyearprojects.org
A Proactive Greedy Routing Protocol Precludes Sink-Hole Formation in Wireless...ijwmn
The International Journal of Wireless & Mobile Networks (IJWMN) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of Wireless & Mobile Networks. The journal focuses on all technical and practical aspects of Wireless & Mobile Networks. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on advanced wireless & mobile networking concepts and establishing new collaborations in these areas.
PERFORMANCE EVALUATION OF VERTICAL HARD HANDOVERS IN CELLULAR MOBILE SYSTEMSijngnjournal
With the rapid increase of new and diverse cellular mobile services, the overlapping of cells has become typical in the majority of the coverage area of the network. Vertical handovers occur between two layers of cells when a user is switched from one layer to the other. In this paper we investigate the influence of network parameters on vertical hard handover performance in a cell environment. The work considers two layers of cells: a layer of macrocells and a layer of microcells. Handover requests enter the macrocell from neighbor macrocells and from microcells that belong to a different layer. Using Markov chain analysis and simulation we calculate network performance parameters such as mean queue delay, handover dropping probability and channel utilization. We also compare the handover performance for the macrocell and macrocell traffic separately. Our results show the influence of total channels, maximum queue size and handover request arrival rate on handover performance. They also show that when the traffic from each layer is treated with equal priority in the system, the performance of each layer is comparable.
Balancing stable topology and network lifetime in ad hoc networksIAEME Publication
This document summarizes a research paper that proposes a new topology control method called Network Connectivity based Topology Control (NCTC) to improve network lifetime in mobile ad hoc networks. The method aims to balance energy consumption and node connectivity in two phases: 1) minimizing interference between links, and 2) estimating an energy-efficient topology based on minimal weight paths. Simulation results using the NS2 simulator show that NCTC achieves better network lifetime, packet delivery ratio, lower overhead, and end-to-end delay compared to existing methods.
GPSFR: GPS-Free Routing Protocol for Vehicular Networks with Directional Ante...ijwmn
Efficient and practical communications between large numbers of vehicles are critical in providing high level of safety and convenience to drivers. Crucial real-time information on road hazard, traffic conditions and driver services must be communicated to vehicles rapidly even in adverse environments, such as “urban canyons” and tunnels. We propose a novel routing protocol in vehicular networks that does not require position information (e.g. from GPS) but instead rely on relative position that can be determined dynamically. This GPS-Free Geographic Routing (GPSFR) protocol uses the estimated relative position of vehicles and greedily chooses the best next hop neighbor based on a Balance Advance (BADV) metric which balances between proximity and link stability in order to improve routing performance. In this paper, we focuses primarily on the complexity of routing in highways and solves routing problems that arise when vehicles are near interchanges, curves, and merge or exit lanes of highways. Our simulation results show that by taking relative velocity into account, GPSFR reduces link breakage to only 27% that of GPSR in the dense network. Consequently, GPSFR outperforms GPSR in terms of higher data delivery ratio, lower delay, less sensitivity of the network density and route paths’length
PERFORMANCE ANALYSIS OF WIRELESS MESH NETWORK USING ADAPTIVE INFORMANT FACTOR...IJCSES Journal
Wireless mesh network (WMN) has become an important leading technology which provides several types of useful applications such as community network, broadband home network and internet access, etc. The rise in the size of users in WMN has created a degradation of efficiency in a network especially in dense areas due to the clumsy channel allocation and hence creating many challenges for enhancing the users experience, network quality and throughput. Therefore in this paper, we proposed OCA based AIF model that can access the channel information and then it process to improve the RF channel association. The proposed OCA-AIF will function for each period when some interference is detected via AIF and we further extend this analysis by taking in to consideration the influence of interference to provide a high quality indicator in network. The analysis of result shows the optimization by our proposed approach which increases as per the increment of relay nodes (RNs).
Traffic Congestion Prediction using Deep Reinforcement Learning in Vehicular ...IJCNCJournal
In recent years, a new wireless network called vehicular ad-hoc network (VANET), has become a popular research topic. VANET allows communication among vehicles and with roadside units by providing information to each other, such as vehicle velocity, location and direction. In general, when many vehicles likely to use the common route to proceed to the same destination, it can lead to a congested route that should be avoided. It may be better if vehicles are able to predict accurately the traffic congestion and then avoid it. Therefore, in this work, the deep reinforcement learning in VANET to enhance the ability to predict traffic congestion on the roads is proposed. Furthermore, different types of neural networks namely Convolutional Neural Network (CNN), Multilayer Perceptron (MLP) and Long Short-Term Memory (LSTM) are investigated and compared in this deep reinforcement learning model to discover the most effective one. Our proposed method is tested by simulation. The traffic scenarios are created using traffic simulator called Simulation of Urban Mobility (SUMO) before integrating with deep reinforcement learning model. The simulation procedures, as well as the programming used, are described in detail. The performance of our proposed method is evaluated using two metrics; the average travelling time delay and average waiting time delay of vehicles. According to the simulation results, the average travelling time delay and average waiting time delay are gradually improved over the multiple runs, since our proposed method receives feedback from the environment. In addition, the results without and with three different deep learning algorithms, i.e., CNN, MLP and LSTM are compared. It is obvious that the deep reinforcement learning model works effectively when traffic density is neither too high nor too low. In addition, it can be concluded that the effective algorithms for traffic congestion prediction models in descending order are MLP, CNN, and LSTM, respectively.
Design analysis and life estimation of a first stage rotor blade using nickel...IAEME Publication
The document analyzes the design, stresses, and life estimation of a first stage rotor blade made of CMSX4 nickel-based super alloy. Finite element analysis was conducted in ANSYS to determine stresses on the blade, with maximum stresses of 70.549 kPa found at the trailing edge root. Modal and life estimation analyses were also performed. The analyses found the blade design and stresses to be safe for continuous operation, which would increase the power capacity of the combined cycle gas turbine plant.
Optimization of the welding parameters in resistance spot weldingIAEME Publication
This document summarizes an analysis of resistance spot welding parameters on CRCA steel sheets using Taguchi methods. The authors conducted experiments varying welding current, electrode force, and welding time according to an L9 orthogonal array. Tensile shear strength was evaluated as the output parameter. Analysis of variance found welding current to be the most influential parameter, contributing 49.72% to strength. Optimal parameters were determined to be high current of 13.5 kA, medium electrode force of 4 kN, and high welding time of 10 seconds. Taguchi methods allowed determination of optimal resistance spot welding parameters for maximum tensile shear strength.
Optimization of process parameters in drilling of aisi 1015 steel for exit bu...IAEME Publication
The document analyzes and optimizes drilling parameters to minimize burr size in drilling AISI 1015 steel. Response surface methodology and Taguchi methods were used. Speed, feed, drill diameter, and point angle were parameters varied, and burr height and thickness were responses. Central composite design was used. Optimal parameters for minimum burr height were found to be 28 m/min speed, 0.1 mm/rev feed, 20 mm diameter, and 135° point angle. Optimal parameters for minimum burr thickness were 16 m/min speed, 0.05 mm/rev feed, 4 mm diameter, and 142° point angle.
Microstructural characterization and elastoplastic behaviour of high strengtIAEME Publication
This document discusses microstructural characterization and elastoplastic behavior of high strength low alloy steel. It describes how the steel was thermomechanically processed by controlled rolling just above the A3 temperature and then water quenched. Electron backscatter diffraction and nanoindentation were used to characterize the microstructure and mechanical properties. The ferrite grain size was refined to 1-3 microns through dynamic strain induced transformation of austenite during processing. The ferrite formed via different mechanisms exhibited varying elastoplastic behavior related to their carbon content and formation temperature.
A review recent trends in world and indian telecom marketIAEME Publication
The world market has changed almost beyond recognition over the last twenty years.
The recent trends in the world telecom market are: increase in private ownership,
competition, data based mobile and global communication, trade and finance oriented
operators, and rapid increase in subscribers from the developing nations. Several of these
trends (such as increase in privatization, competition, mobile communication, digital
divide) also exist in the Indian submarket. The submarkets of the world telecom market
are mainly classified according to geographical location, and according to the technology
used. India comes under the Asia Pacific geographical submarket. India had a traditional
telecom market, which was dominated by public sector monopoly till 1990. Later, it was
privatized by bits and pieces and now allows private sector participation in almost all the
sectors of telecom in the nation. It has a rapidly increasing subscriber base. It allows investor
friendly environment and has set up regulatory bodies to ensure justice to all players. In brief,
the present Indian telecom sector is marked by choice, competition, subscriber growth,
improvement in quality and service, and a shift from monopoly to oligopoly to true
competition.
An external plunge grinding machine with control panel automation techniqueIAEME Publication
This document describes an external plunge grinding machine automated with a control panel using a Mitsubishi PLC system. It discusses how programmable logic controllers have improved manufacturing productivity by providing flexible, reliable control. The PLC controls inputs like push buttons and outputs like motors and lights. Ladder logic programming is used to automate the machine's grinding and loading/unloading sequences. Servo and induction motors precisely position the grinding wheel. A human-machine interface allows users to input part programs. Communication between the PLC and computer allows storing and monitoring machine data. Overall, automating the machine's control panel with a PLC improves productivity and efficiency compared to traditional control techniques.
Investigation of particulate control in thermal power plant usingIAEME Publication
This document analyzes particulate control in a thermal power plant using an electrostatic precipitator (ESP). It investigates ESP performance at the Korba East Phase III power plant in India. Mathematical models are used to predict emission levels based on ESP dimensions and migration velocity. The models show that higher migration velocity and fly ash percentage lead to lower required collection area to meet emissions standards. Upgrading ESPs with advanced control systems is a more cost effective solution than increasing ESP size.
Modeling and analysis of base plate for brake spider fixture by fem using ans...IAEME Publication
The document summarizes the modeling and analysis of a base plate for a brake spider fixture using finite element analysis software ANSYS. A new brake spider fixture design was created in CATIA V5 to increase productivity from 5 to 7 components per hour. The base plate, a critical component, was evaluated for failure using FEM in ANSYS. Static analysis found a maximum deflection of 0.725x10-5 mm and stress of 15.4MPa, within specified limits. The redesign successfully increased productivity while maintaining required accuracy.
A review technology innovation and role of training and educationIAEME Publication
This document discusses technology innovation and the role of training and education in small and medium enterprises (SMEs) and the IT sector. It begins with an abstract that introduces the topic and an introduction that discusses the role of training in developing skills and competitive advantage. It then discusses defining training, analyzing training needs, and strategies for technology-based innovation and training in SMEs and IT sectors. These include introducing competency models, developing social training models, improving training methods, and establishing training management systems. It concludes by emphasizing the need for effective training and education structures to help SMEs and IT sectors achieve competitive advantages.
Performance and handoff evaluation of heterogeneous wireless networks 2IAEME Publication
This document discusses performance evaluations of heterogeneous wireless networks (HWNs) using the OPNET simulator. It implemented WLAN, WiMAX, and UMTS networks with applications like FTP, video conferencing, and VoIP. Handoff management between the networks was also evaluated. Simulation results showed WiMAX throughput was over 30% higher than WLAN and UMTS. Vertical handoff between WLAN-WiMAX and WLAN-UMTS was difficult without carefully engineering the WLAN network due to differences between the networks. Key metrics like delay, throughput, and received traffic were analyzed and WiMAX generally had superior performance.
BIO-INSPIRED SEAMLESS VERTICAL HANDOVER ALGORITHM FOR VEHICULAR AD HOC NETWORKSijwmn
One of the most important factors to implement VANET is by considering the variety of wireless networks available around the city as well as the vehicles traffic scenarios. However, by providing a diverse range of wireless access technologies, it is necessary to provide continuous network connectivity as well as selecting the most suitable network technology and performance. Many researchers have worked on building algorithms for selecting the best network to improve the handover process. However, with high-speed vehicles mobility, the vertical handover process became the most challenging task in order to achieve realtime network selection. This paper proposes a bio-inspired network selection algorithm influenced by insect's behaviour which combines Artificial Bee Colony (ABC) and Particle Swarm Optimization (PSO). The proposed algorithm is applied to process multi-criteria parameters to evaluate the best available network and then execute the handover process seamlessly. The results demonstrate the benefits of the proposed Multi-Criteria ABC-PSO method by reducing the handover decision delays by 25%. It gives the optimum performance in terms of network selections and reduces the handover latency by 14.5%. The proposed algorithm also reduces the number of unnecessary handovers by 48% for three different mobility scenarios based on traffic environments (highway, urban and traffic jam).
This document reviews a mobility management scheme for mobile communication systems. It was found that mobile-to-mobile call setup times performed better than fixed network-to-mobile or mobile-to-fixed call setup times. Additionally, increasing the number of location areas within a switch did not affect inter-MSC handovers or location updates since the switch coverage area size remained the same, but did increase intra-MSC location updates and handovers. Finally, user mobility directly impacts signaling traffic for handovers, location management, radio resource allocation, and routing.
SECURE & FAULT TOLERANCE HANDOFF IN VANET USING SPECIAL MOBILE AGENTcscpconf
This document proposes a fault tolerant mobile agent based information retrieval system for handoffs in vehicular ad hoc networks (VANETs). Special mobile agents are dispatched from client vehicles to neighboring vehicles to retrieve information needed for seamless handoffs as the client vehicle moves. The system uses checkpointing and replication to increase reliability, storing copies of data at each visited node. A timestamp and threshold ensure data validity and prevent excessive resource usage. Authentication with digital signatures secures communication between agents and nodes. The proposed approach aims to provide reliable information retrieval to support fault tolerant handoffs in VANETs.
Secure & fault tolerance handoff in vanet using special mobile agentcsandit
Vehicular Traffic poses an emerging issue nowadays. The critical factors for the data
communication are speed and time tradeoffs. For data communication, gathering and retrieving
information many cost-effective and tested techniques are required in VANET. Client server
architectures being coercive are commonly used in spite of having drawbacks of fault and time
in-effectiveness. This paper elaborates a proposed method in VANET for fault tolerance
information retrieval based on theory of bandwidth and timestamp. Mobile Agents, with the
feature of autonomy, social ability, learning, and most importantly mobility, regarded as an
appropriate technology to build applications for instance information retrieval system in mobile
computing environment.
IRJET - A Review on Analysis of Location Management in Mobile ComputingIRJET Journal
This document reviews location management in mobile computing. It discusses various location management schemes including location updates and location queries. Static update strategies like location areas and reporting cells are described, as well as dynamic update strategies that account for user mobility and call frequency. Key components of location management systems are outlined, including base stations, base station controllers, cells, handoffs, home location registers, and location areas. Issues in location management like location registration, paging, and call delivery are also summarized. The document provides an overview of the important area of location management for tracking user locations in mobile networks.
Intelligent network selection using fuzzy logic for 4 g wireless networksIAEME Publication
This document presents an intelligent network selection algorithm using fuzzy logic for 4G wireless networks. It proposes a fuzzy logic-based vertical handoff scheme that uses linguistic variables to estimate when a handoff is needed and to select a new network attachment point. Separate fuzzy logic controllers are used for different traffic types like conversational and streaming to improve overall system performance. A fuzzy multi-attribute decision making function is used to select a suitable network based on factors like user speed, network characteristics, user preferences, cost and quality of service requirements of applications. The goal is to enhance service mobility and continuity by choosing the most appropriate network based on an application's quality of service demands and network properties.
This document provides an overview of vertical handover decision strategies in heterogeneous wireless networks. It begins with an introduction to always best connectivity requirements in next generation networks that allow users to move between different network technologies. It then discusses the key aspects of handover management, including the three phases of initiation, decision, and execution. Various criteria for the handover decision process are described, such as received signal strength, network connection time, available bandwidth, power consumption, cost, security, and user preferences. Different types of handover decision strategies are categorized, including those based on network conditions, user preferences, multiple attributes, fuzzy logic/neural networks, and context awareness. The strategies are analyzed and their advantages/disadvantages compared.
This document discusses vertical handover decision algorithms for heterogeneous wireless networks. It analyzes existing vertical handover decision algorithms and proposes a new prediction-based approach. Specifically:
1. Existing algorithms do not consider mobility prediction methods to take proactive measures when deciding vertical handovers.
2. The proposed algorithm uses a Hidden Markov Model predictor to accurately estimate a user's next location based on current and historical movement data.
3. This allows the algorithm to make more informed vertical handover decisions by anticipating future movements and network conditions.
An Intelligent Approach for Handover Decision in Heterogeneous Wireless Envir...CSCJournals
Vertical handoff is the basic requirement of the convergence of different access technologies. It is also the key characteristic and technology of overlay wireless network with appropriate network interfaces. The integration of diverse but complementary cellular and wireless technologies in the next generation wireless networks requires the design of intelligent vertical handoff decision algorithms to enable mobile users equipped with contemporary multi-interfaced mobile terminals to seamlessly switch network access and experience uninterrupted service continuity anywhere and anytime. Most existing vertical handoff decision strategies are designed to meet individual needs that may not achieve a good system performance. In this paper an intelligent approach is used for vertical handover decision. The intelligence is based on the fuzzy logic approach. So here, fuzzy logic is used for network selection and decision making for vertical handover.
Fuzzy Based Vertical Handoff Decision Controller for Future NetworksIJAEMSJORNAL
Abstract— In Next generation wireless Networks, the received signals (RSS) from different networks do not have a same meaning since each network is composed of its specific characteristics and there is no common pilot signal. Then, RSS comparisons are insufficient for handoff decision and may be inefficient and impractical. A more complex decision criterion that combines a large number of parameters or factors such as monetary cost, bandwidth, and power consumption and user profile is necessary. Though there are a lot works available for vertical handoff decision (VHD) for wireless networks, the selection of best network is still challenging problem. In this paper we propose a Fuzzy based vertical handoff decision controller (FVHDC) Which performs handover decision based on the output of fuzzy based rules.
A vertical handover decision approaches in next generation wireless networks ...ijmnct
In next generation wireless network the most desirable feature is its ability to move seamlessly over various
access network regardless of the network infrastructure is used. The handover between these dissimilar
networks can be explored by using vertical handover algorithms. This paper focuses on the vertical
handover decision methods and algorithms effectiveness. Most of the algorithms which are based on RSS
values provide vertical handover with small delay at a lower rate of throughput. There are such algorithms
which provide significant improvements in throughput but at a cost of higher delays. As per the need for the
real time applications in next generation wireless networks there is a requirement of developing new
optimized algorithms that are able to produce high throughput and minimizing signalling cost and delay.
This document discusses decision strategies for vertical handovers in heterogeneous wireless networks. It begins by introducing the concepts of vertical handovers and heterogeneous networks. It then discusses some key aspects of handover management including the three phase process (information gathering, decision, execution), types of handovers, and control mechanisms. Several vertical handover decision strategies are then summarized, including those based on decision functions, user-centric approaches, and multiple attribute decision making. The strategies aim to select the optimal network by evaluating different criteria like network conditions, user preferences, quality of service, and applying weighting and algorithms. The document provides an overview of recent research on improving handover decisions between different wireless technologies.
This document discusses vertical handover in heterogeneous wireless networks. It begins by introducing the concept of vertical handover which allows seamless switching between different wireless technologies like 3G cellular networks and WiFi networks. It then discusses some of the challenges in managing vertical handovers, particularly achieving seamlessness and automation. Several decision strategies for vertical handover are proposed to address these challenges and achieve the goal of always providing users with the best available connection. The document goes on to describe the typical phases of the vertical handover process - information gathering, decision, and execution. It also discusses factors that influence the handover decision like network conditions, user preferences, and quality of service requirements.
QOS ROUTING AND PERFORMANCE EVALUATION FOR MOBILE AD HOC NETWORKS USING OLSR ...ijasuc
Mobile Ad-Hoc network is a collection of mobile nodes in communication without using infrastructure.
As the real-time applications used in today’s wireless network grow, we need some schemes to provide
more suitable service for them. We know that most of actual schemes do not perform well on traffic which
is not strictly CBR. Therefore, in this paper we have studied the impact, respectively, of mobility models
and the density of nodes on the performances (End-to-End Delay, Throughput and Packet Delivery ratio)
of routing protocol (Optimized Link State Routing) OLSR by using in the first a real-time VBR (MPEG-4)
and secondly the Constant Bit Rate (CBR) traffic. Finally we compare the performance on both cases.
Experimentally, we considered the three mobility models as follows Random Waypoint, Random
Direction and Mobgen Steady State. The experimental results illustrate that the behavior of OLSR change
according to the model and the used traffics.
Intelligent location tracking scheme for handling user’s mobilityeSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
This document summarizes research on parameters for vertical handoff in heterogeneous wireless networks. It discusses several key parameters that influence vertical handoff decisions, including available bandwidth, received signal strength, cost, latency, and quality of service. The document reviews several existing approaches for vertical handoff that consider parameters like bandwidth, RSS, access fee, packet delay, available bandwidth, and network load. Overall, the document analyzes parameters that are important for designing efficient vertical handoff mechanisms in next-generation heterogeneous wireless networks.
Implementation of lru algorithm for location update in wireless m2 m communic...eSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Improvements for DMM in SDN and Virtualization-Based Mobile Network Architectureijmnct
This document summarizes a research paper that proposes improvements to distributed mobility management (DMM) in software defined networking (SDN) and network functions virtualization-based mobile network architectures. The paper presents a new "Software defined plus virtualization featured Mobile Network (S+ MN)" architecture that uses SDN controllers and virtualization to distribute gateway functions. This allows for more efficient mobility management across heterogeneous networks, removal of IP address preservation chains during handovers, and optimal data path management according to application needs. The paper then evaluates the S+ MN architecture in terms of inter-system handover performance relative to control plane delay requirements for 5G networks.
IMPROVEMENTS FOR DMM IN SDN AND VIRTUALIZATION-BASED MOBILE NETWORK ARCHITECTUREijmnct
The (r)evolution of wireless access infrastructure can be described as the convergence of the available radio communication systems towards a harmonized, more flexible and reconfigurable access system to match the current and upcoming demands. In recent years Softwarization and Virtualization technologies have moved from server and network domains to wireless domain and provides new perspectives of
managing mobile networks functionalities. This paper provides evolution of the mobile network architecture in Software Defined Networking (SDN) and virtualization context and realizes it through the use of distribution of gateway function approach. Key improvements with proposed approach are to support efficient mobility management in heterogeneous access environments, remove the chains of IP preservation and optimal data path management according to application needs. A functional setup validates and assays the proposed evolution in terms of inter-system handover preparation, interruption
and completion time relative to control plane delay requirements of the 5G networks.
Similar to Performance evaluation of the mobility management towards 4 g wireless netwo (20)
Submission Deadline: 30th September 2022
Acceptance Notification: Within Three Days’ time period
Online Publication: Within 24 Hrs. time Period
Expected Date of Dispatch of Printed Journal: 5th October 2022
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...IAEME Publication
White layer thickness (WLT) formed and surface roughness in wire electric discharge turning (WEDT) of tungsten carbide composite has been made to model through response surface methodology (RSM). A Taguchi’s standard Design of experiments involving five input variables with three levels has been employed to establish a mathematical model between input parameters and responses. Percentage of cobalt content, spindle speed, Pulse on-time, wire feed and pulse off-time were changed during the experimental tests based on the Taguchi’s orthogonal array L27 (3^13). Analysis of variance (ANOVA) revealed that the mathematical models obtained can adequately describe performance within the parameters of the factors considered. There was a good agreement between the experimental and predicted values in this study.
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURSIAEME Publication
The study explores the reasons for a transgender to become entrepreneurs. In this study transgender entrepreneur was taken as independent variable and reasons to become as dependent variable. Data were collected through a structured questionnaire containing a five point Likert Scale. The study examined the data of 30 transgender entrepreneurs in Salem Municipal Corporation of Tamil Nadu State, India. Simple Random sampling technique was used. Garrett Ranking Technique (Percentile Position, Mean Scores) was used as the analysis for the present study to identify the top 13 stimulus factors for establishment of trans entrepreneurial venture. Economic advancement of a nation is governed upon the upshot of a resolute entrepreneurial doings. The conception of entrepreneurship has stretched and materialized to the socially deflated uncharted sections of transgender community. Presently transgenders have smashed their stereotypes and are making recent headlines of achievements in various fields of our Indian society. The trans-community is gradually being observed in a new light and has been trying to achieve prospective growth in entrepreneurship. The findings of the research revealed that the optimistic changes are taking place to change affirmative societal outlook of the transgender for entrepreneurial ventureship. It also laid emphasis on other transgenders to renovate their traditional living. The paper also highlights that legislators, supervisory body should endorse an impartial canons and reforms in Tamil Nadu Transgender Welfare Board Association.
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURSIAEME Publication
Since ages gender difference is always a debatable theme whether caused by nature, evolution or environment. The birth of a transgender is dreadful not only for the child but also for their parents. The pain of living in the wrong physique and treated as second class victimized citizen is outrageous and fully harboured with vicious baseless negative scruples. For so long, social exclusion had perpetuated inequality and deprivation experiencing ingrained malign stigma and besieged victims of crime or violence across their life spans. They are pushed into the murky way of life with a source of eternal disgust, bereft sexual potency and perennial fear. Although they are highly visible but very little is known about them. The common public needs to comprehend the ravaged arrogance on these insensitive souls and assist in integrating them into the mainstream by offering equal opportunity, treat with humanity and respect their dignity. Entrepreneurship in the current age is endorsing the gender fairness movement. Unstable careers and economic inadequacy had inclined one of the gender variant people called Transgender to become entrepreneurs. These tiny budding entrepreneurs resulted in economic transition by means of employment, free from the clutches of stereotype jobs, raised standard of living and handful of financial empowerment. Besides all these inhibitions, they were able to witness a platform for skill set development that ignited them to enter into entrepreneurial domain. This paper epitomizes skill sets involved in trans-entrepreneurs of Thoothukudi Municipal Corporation of Tamil Nadu State and is a groundbreaking determination to sightsee various skills incorporated and the impact on entrepreneurship.
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONSIAEME Publication
The banking and financial services industries are experiencing increased technology penetration. Among them, the banking industry has made technological advancements to better serve the general populace. The economy focused on transforming the banking sector's system into a cashless, paperless, and faceless one. The researcher wants to evaluate the user's intention for utilising a mobile banking application. The study also examines the variables affecting the user's behaviour intention when selecting specific applications for financial transactions. The researcher employed a well-structured questionnaire and a descriptive study methodology to gather the respondents' primary data utilising the snowball sampling technique. The study includes variables like performance expectations, effort expectations, social impact, enabling circumstances, and perceived risk. Each of the aforementioned variables has a major impact on how users utilise mobile banking applications. The outcome will assist the service provider in comprehending the user's history with mobile banking applications.
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONSIAEME Publication
Technology upgradation in banking sector took the economy to view that payment mode towards online transactions using mobile applications. This system enabled connectivity between banks, Merchant and user in a convenient mode. there are various applications used for online transactions such as Google pay, Paytm, freecharge, mobikiwi, oxygen, phonepe and so on and it also includes mobile banking applications. The study aimed at evaluating the predilection of the user in adopting digital transaction. The study is descriptive in nature. The researcher used random sample techniques to collect the data. The findings reveal that mobile applications differ with the quality of service rendered by Gpay and Phonepe. The researcher suggest the Phonepe application should focus on implementing the application should be user friendly interface and Gpay on motivating the users to feel the importance of request for money and modes of payments in the application.
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINOIAEME Publication
The prototype of a voice-based ATM for visually impaired using Arduino is to help people who are blind. This uses RFID cards which contain users fingerprint encrypted on it and interacts with the users through voice commands. ATM operates when sensor detects the presence of one person in the cabin. After scanning the RFID card, it will ask to select the mode like –normal or blind. User can select the respective mode through voice input, if blind mode is selected the balance check or cash withdraw can be done through voice input. Normal mode procedure is same as the existing ATM.
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...IAEME Publication
There is increasing acceptability of emotional intelligence as a major factor in personality assessment and effective human resource management. Emotional intelligence as the ability to build capacity, empathize, co-operate, motivate and develop others cannot be divorced from both effective performance and human resource management systems. The human person is crucial in defining organizational leadership and fortunes in terms of challenges and opportunities and walking across both multinational and bilateral relationships. The growing complexity of the business world requires a great deal of self-confidence, integrity, communication, conflict and diversity management to keep the global enterprise within the paths of productivity and sustainability. Using the exploratory research design and 255 participants the result of this original study indicates strong positive correlation between emotional intelligence and effective human resource management. The paper offers suggestions on further studies between emotional intelligence and human capital development and recommends for conflict management as an integral part of effective human resource management.
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMYIAEME Publication
Our life journey, in general, is closely defined by the way we understand the meaning of why we coexist and deal with its challenges. As we develop the "inspiration economy", we could say that nearly all of the challenges we have faced are opportunities that help us to discover the rest of our journey. In this note paper, we explore how being faced with the opportunity of being a close carer for an aging parent with dementia brought intangible discoveries that changed our insight of the meaning of the rest of our life journey.
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...IAEME Publication
The main objective of this study is to analyze the impact of aspects of Organizational Culture on the Effectiveness of the Performance Management System (PMS) in the Health Care Organization at Thanjavur. Organizational Culture and PMS play a crucial role in present-day organizations in achieving their objectives. PMS needs employees’ cooperation to achieve its intended objectives. Employees' cooperation depends upon the organization’s culture. The present study uses exploratory research to examine the relationship between the Organization's culture and the Effectiveness of the Performance Management System. The study uses a Structured Questionnaire to collect the primary data. For this study, Thirty-six non-clinical employees were selected from twelve randomly selected Health Care organizations at Thanjavur. Thirty-two fully completed questionnaires were received.
Living in 21st century in itself reminds all of us the necessity of police and its administration. As more and more we are entering into the modern society and culture, the more we require the services of the so called ‘Khaki Worthy’ men i.e., the police personnel. Whether we talk of Indian police or the other nation’s police, they all have the same recognition as they have in India. But as already mentioned, their services and requirements are different after the like 26th November, 2008 incidents, where they without saving their own lives has sacrificed themselves without any hitch and without caring about their respective family members and wards. In other words, they are like our heroes and mentors who can guide us from the darkness of fear, militancy, corruption and other dark sides of life and so on. Now the question arises, if Gandhi would have been alive today, what would have been his reaction/opinion to the police and its functioning? Would he have some thing different in his mind now what he had been in his mind before the partition or would he be going to start some Satyagraha in the form of some improvement in the functioning of the police administration? Really these questions or rather night mares can come to any one’s mind, when there is too much confusion is prevailing in our minds, when there is too much corruption in the society and when the polices working is also in the questioning because of one or the other case throughout the India. It is matter of great concern that we have to thing over our administration and our practical approach because the police personals are also like us, they are part and parcel of our society and among one of us, so why we all are pin pointing towards them.
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...IAEME Publication
The goal of this study was to see how talent management affected employee retention in the selected IT organizations in Chennai. The fundamental issue was the difficulty to attract, hire, and retain talented personnel who perform well and the gap between supply and demand of talent acquisition and retaining them within the firms. The study's main goals were to determine the impact of talent management on employee retention in IT companies in Chennai, investigate talent management strategies that IT companies could use to improve talent acquisition, performance management, career planning and formulate retention strategies that the IT firms could use. The respondents were given a structured close-ended questionnaire with the 5 Point Likert Scale as part of the study's quantitative research design. The target population consisted of 289 IT professionals. The questionnaires were distributed and collected by the researcher directly. The Statistical Package for Social Sciences (SPSS) was used to collect and analyse the questionnaire responses. Hypotheses that were formulated for the various areas of the study were tested using a variety of statistical tests. The key findings of the study suggested that talent management had an impact on employee retention. The studies also found that there is a clear link between the implementation of talent management and retention measures. Management should provide enough training and development for employees, clarify job responsibilities, provide adequate remuneration packages, and recognise employees for exceptional performance.
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...IAEME Publication
Globally, Millions of dollars were spent by the organizations for employing skilled Information Technology (IT) professionals. It is costly to replace unskilled employees with IT professionals possessing technical skills and competencies that aid in interconnecting the business processes. The organization’s employment tactics were forced to alter by globalization along with technological innovations as they consistently diminish to remain lean, outsource to concentrate on core competencies along with restructuring/reallocate personnel to gather efficiency. As other jobs, organizations or professions have become reasonably more appropriate in a shifting employment landscape, the above alterations trigger both involuntary as well as voluntary turnover. The employee view on jobs is also afflicted by the COVID-19 pandemic along with the employee-driven labour market. So, having effective strategies is necessary to tackle the withdrawal rate of employees. By associating Emotional Intelligence (EI) along with Talent Management (TM) in the IT industry, the rise in attrition rate was analyzed in this study. Only 303 respondents were collected out of 350 participants to whom questionnaires were distributed. From the employees of IT organizations located in Bangalore (India), the data were congregated. A simple random sampling methodology was employed to congregate data as of the respondents. Generating the hypothesis along with testing is eventuated. The effect of EI and TM along with regression analysis between TM and EI was analyzed. The outcomes indicated that employee and Organizational Performance (OP) were elevated by effective EI along with TM.
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...IAEME Publication
By implementing talent management strategy, organizations would have the option to retain their skilled professionals while additionally working on their overall performance. It is the course of appropriately utilizing the ideal individuals, setting them up for future top positions, exploring and dealing with their performance, and holding them back from leaving the organization. It is employee performance that determines the success of every organization. The firm quickly obtains an upper hand over its rivals in the event that its employees having particular skills that cannot be duplicated by the competitors. Thus, firms are centred on creating successful talent management practices and processes to deal with the unique human resources. Firms are additionally endeavouring to keep their top/key staff since on the off chance that they leave; the whole store of information leaves the firm's hands. The study's objective was to determine the impact of talent management on organizational performance among the selected IT organizations in Chennai. The study recommends that talent management limitedly affects performance. On the off chance that this talent is appropriately management and implemented properly, organizations might benefit as much as possible from their maintained assets to support development and productivity, both monetarily and non-monetarily.
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...IAEME Publication
Banking regulations act of India, 1949 defines banking as “acceptance of deposits for the purpose of lending or investment from the public, repayment on demand or otherwise and withdrawable through cheques, drafts order or otherwise”, the major participants of the Indian financial system are commercial banks, the financial institution encompassing term lending institutions. Investments institutions, specialized financial institution and the state level development banks, non banking financial companies (NBFC) and other market intermediaries such has the stock brokers and money lenders are among the oldest of the certain variants of NBFC and the oldest market participants. The asset quality of banks is one of the most important indicators of their financial health. The Indian banking sector has been facing severe problems of increasing Non- Performing Assets (NPAs). The NPAs growth directly and indirectly affects the quality of assets and profitability of banks. It also shows the efficiency of banks credit risk management and the recovery effectiveness. NPA do not generate any income, whereas, the bank is required to make provisions for such as assets that why is a double edge weapon. This paper outlines the concept of quality of bank loans of different types like Housing, Agriculture and MSME loans in state Haryana of selected public and private sector banks. This study is highlighting problems associated with the role of commercial bank in financing Small and Medium Scale Enterprises (SME). The overall objective of the research was to assess the effect of the financing provisions existing for the setting up and operations of MSMEs in the country and to generate recommendations for more robust financing mechanisms for successful operation of the MSMEs, in turn understanding the impact of MSME loans on financial institutions due to NPA. There are many research conducted on the topic of Non- Performing Assets (NPA) Management, concerning particular bank, comparative study of public and private banks etc. In this paper the researcher is considering the aggregate data of selected public sector and private sector banks and attempts to compare the NPA of Housing, Agriculture and MSME loans in state Haryana of public and private sector banks. The tools used in the study are average and Anova test and variance. The findings reveal that NPA is common problem for both public and private sector banks and is associated with all types of loans either that is housing loans, agriculture loans and loans to SMES. NPAs of both public and private sector banks show the increasing trend. In 2010-11 GNPA of public and private sector were at same level it was 2% but after 2010-11 it increased in many fold and at present there is GNPA in some more than 15%. It shows the dark area of Indian banking sector.
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...IAEME Publication
An experiment conducted in this study found that BaSO4 changed Nylon 6's mechanical properties. By changing the weight ratios, BaSO4 was used to make Nylon 6. This Researcher looked into how hard Nylon-6/BaSO4 composites are and how well they wear. Experiments were done based on Taguchi design L9. Nylon-6/BaSO4 composites can be tested for their hardness number using a Rockwell hardness testing apparatus. On Nylon/BaSO4, the wear behavior was measured by a wear monitor, pinon-disc friction by varying reinforcement, sliding speed, and sliding distance, and the microstructure of the crack surfaces was observed by SEM. This study provides significant contributions to ultimate strength by increasing BaSO4 content up to 16% in the composites, and sliding speed contributes 72.45% to the wear rate
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...IAEME Publication
The majority of the population in India lives in villages. The village is the back bone of the country. Village or rural industries play an important role in the national economy, particularly in the rural development. Developing the rural economy is one of the key indicators towards a country’s success. Whether it be the need to look after the welfare of the farmers or invest in rural infrastructure, Governments have to ensure that rural development isn’t compromised. The economic development of our country largely depends on the progress of rural areas and the standard of living of rural masses. Village or rural industries play an important role in the national economy, particularly in the rural development. Rural entrepreneurship is based on stimulating local entrepreneurial talent and the subsequent growth of indigenous enterprises. It recognizes opportunity in the rural areas and accelerates a unique blend of resources either inside or outside of agriculture. Rural entrepreneurship brings an economic value to the rural sector by creating new methods of production, new markets, new products and generate employment opportunities thereby ensuring continuous rural development. Social Entrepreneurship has the direct and primary objective of serving the society along with the earning profits. So, social entrepreneurship is different from the economic entrepreneurship as its basic objective is not to earn profits but for providing innovative solutions to meet the society needs which are not taken care by majority of the entrepreneurs as they are in the business for profit making as a sole objective. So, the Social Entrepreneurs have the huge growth potential particularly in the developing countries like India where we have huge societal disparities in terms of the financial positions of the population. Still 22 percent of the Indian population is below the poverty line and also there is disparity among the rural & urban population in terms of families living under BPL. 25.7 percent of the rural population & 13.7 percent of the urban population is under BPL which clearly shows the disparity of the poor people in the rural and urban areas. The need to develop social entrepreneurship in agriculture is dictated by a large number of social problems. Such problems include low living standards, unemployment, and social tension. The reasons that led to the emergence of the practice of social entrepreneurship are the above factors. The research problem lays upon disclosing the importance of role of social entrepreneurship in rural development of India. The paper the tendencies of social entrepreneurship in India, to present successful examples of such business for providing recommendations how to improve situation in rural areas in terms of social entrepreneurship development. Indian government has made some steps towards development of social enterprises, social entrepreneurship, and social in- novation, but a lot remains to be improved.
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...IAEME Publication
Distribution system is a critical link between the electric power distributor and the consumers. Most of the distribution networks commonly used by the electric utility is the radial distribution network. However in this type of network, it has technical issues such as enormous power losses which affect the quality of the supply. Nowadays, the introduction of Distributed Generation (DG) units in the system help improve and support the voltage profile of the network as well as the performance of the system components through power loss mitigation. In this study network reconfiguration was done using two meta-heuristic algorithms Particle Swarm Optimization and Gravitational Search Algorithm (PSO-GSA) to enhance power quality and voltage profile in the system when simultaneously applied with the DG units. Backward/Forward Sweep Method was used in the load flow analysis and simulated using the MATLAB program. Five cases were considered in the Reconfiguration based on the contribution of DG units. The proposed method was tested using IEEE 33 bus system. Based on the results, there was a voltage profile improvement in the system from 0.9038 p.u. to 0.9594 p.u.. The integration of DG in the network also reduced power losses from 210.98 kW to 69.3963 kW. Simulated results are drawn to show the performance of each case.
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...IAEME Publication
Manufacturing industries have witnessed an outburst in productivity. For productivity improvement manufacturing industries are taking various initiatives by using lean tools and techniques. However, in different manufacturing industries, frugal approach is applied in product design and services as a tool for improvement. Frugal approach contributed to prove less is more and seems indirectly contributing to improve productivity. Hence, there is need to understand status of frugal approach application in manufacturing industries. All manufacturing industries are trying hard and putting continuous efforts for competitive existence. For productivity improvements, manufacturing industries are coming up with different effective and efficient solutions in manufacturing processes and operations. To overcome current challenges, manufacturing industries have started using frugal approach in product design and services. For this study, methodology adopted with both primary and secondary sources of data. For primary source interview and observation technique is used and for secondary source review has done based on available literatures in website, printed magazines, manual etc. An attempt has made for understanding application of frugal approach with the study of manufacturing industry project. Manufacturing industry selected for this project study is Mahindra and Mahindra Ltd. This paper will help researcher to find the connections between the two concepts productivity improvement and frugal approach. This paper will help to understand significance of frugal approach for productivity improvement in manufacturing industry. This will also help to understand current scenario of frugal approach in manufacturing industry. In manufacturing industries various process are involved to deliver the final product. In the process of converting input in to output through manufacturing process productivity plays very critical role. Hence this study will help to evolve status of frugal approach in productivity improvement programme. The notion of frugal can be viewed as an approach towards productivity improvement in manufacturing industries.
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENTIAEME Publication
In this paper, we investigated a queuing model of fuzzy environment-based a multiple channel queuing model (M/M/C) ( /FCFS) and study its performance under realistic conditions. It applies a nonagonal fuzzy number to analyse the relevant performance of a multiple channel queuing model (M/M/C) ( /FCFS). Based on the sub interval average ranking method for nonagonal fuzzy number, we convert fuzzy number to crisp one. Numerical results reveal that the efficiency of this method. Intuitively, the fuzzy environment adapts well to a multiple channel queuing models (M/M/C) ( /FCFS) are very well.
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AIVladimir Iglovikov, Ph.D.
Presented by Vladimir Iglovikov:
- https://www.linkedin.com/in/iglovikov/
- https://x.com/viglovikov
- https://www.instagram.com/ternaus/
This presentation delves into the journey of Albumentations.ai, a highly successful open-source library for data augmentation.
Created out of a necessity for superior performance in Kaggle competitions, Albumentations has grown to become a widely used tool among data scientists and machine learning practitioners.
This case study covers various aspects, including:
People: The contributors and community that have supported Albumentations.
Metrics: The success indicators such as downloads, daily active users, GitHub stars, and financial contributions.
Challenges: The hurdles in monetizing open-source projects and measuring user engagement.
Development Practices: Best practices for creating, maintaining, and scaling open-source libraries, including code hygiene, CI/CD, and fast iteration.
Community Building: Strategies for making adoption easy, iterating quickly, and fostering a vibrant, engaged community.
Marketing: Both online and offline marketing tactics, focusing on real, impactful interactions and collaborations.
Mental Health: Maintaining balance and not feeling pressured by user demands.
Key insights include the importance of automation, making the adoption process seamless, and leveraging offline interactions for marketing. The presentation also emphasizes the need for continuous small improvements and building a friendly, inclusive community that contributes to the project's growth.
Vladimir Iglovikov brings his extensive experience as a Kaggle Grandmaster, ex-Staff ML Engineer at Lyft, sharing valuable lessons and practical advice for anyone looking to enhance the adoption of their open-source projects.
Explore more about Albumentations and join the community at:
GitHub: https://github.com/albumentations-team/albumentations
Website: https://albumentations.ai/
LinkedIn: https://www.linkedin.com/company/100504475
Twitter: https://x.com/albumentations
In the rapidly evolving landscape of technologies, XML continues to play a vital role in structuring, storing, and transporting data across diverse systems. The recent advancements in artificial intelligence (AI) present new methodologies for enhancing XML development workflows, introducing efficiency, automation, and intelligent capabilities. This presentation will outline the scope and perspective of utilizing AI in XML development. The potential benefits and the possible pitfalls will be highlighted, providing a balanced view of the subject.
We will explore the capabilities of AI in understanding XML markup languages and autonomously creating structured XML content. Additionally, we will examine the capacity of AI to enrich plain text with appropriate XML markup. Practical examples and methodological guidelines will be provided to elucidate how AI can be effectively prompted to interpret and generate accurate XML markup.
Further emphasis will be placed on the role of AI in developing XSLT, or schemas such as XSD and Schematron. We will address the techniques and strategies adopted to create prompts for generating code, explaining code, or refactoring the code, and the results achieved.
The discussion will extend to how AI can be used to transform XML content. In particular, the focus will be on the use of AI XPath extension functions in XSLT, Schematron, Schematron Quick Fixes, or for XML content refactoring.
The presentation aims to deliver a comprehensive overview of AI usage in XML development, providing attendees with the necessary knowledge to make informed decisions. Whether you’re at the early stages of adopting AI or considering integrating it in advanced XML development, this presentation will cover all levels of expertise.
By highlighting the potential advantages and challenges of integrating AI with XML development tools and languages, the presentation seeks to inspire thoughtful conversation around the future of XML development. We’ll not only delve into the technical aspects of AI-powered XML development but also discuss practical implications and possible future directions.
Maruthi Prithivirajan, Head of ASEAN & IN Solution Architecture, Neo4j
Get an inside look at the latest Neo4j innovations that enable relationship-driven intelligence at scale. Learn more about the newest cloud integrations and product enhancements that make Neo4j an essential choice for developers building apps with interconnected data and generative AI.
Sudheer Mechineni, Head of Application Frameworks, Standard Chartered Bank
Discover how Standard Chartered Bank harnessed the power of Neo4j to transform complex data access challenges into a dynamic, scalable graph database solution. This keynote will cover their journey from initial adoption to deploying a fully automated, enterprise-grade causal cluster, highlighting key strategies for modelling organisational changes and ensuring robust disaster recovery. Learn how these innovations have not only enhanced Standard Chartered Bank’s data infrastructure but also positioned them as pioneers in the banking sector’s adoption of graph technology.
Threats to mobile devices are more prevalent and increasing in scope and complexity. Users of mobile devices desire to take full advantage of the features
available on those devices, but many of the features provide convenience and capability but sacrifice security. This best practices guide outlines steps the users can take to better protect personal devices and information.
20 Comprehensive Checklist of Designing and Developing a WebsitePixlogix Infotech
Dive into the world of Website Designing and Developing with Pixlogix! Looking to create a stunning online presence? Look no further! Our comprehensive checklist covers everything you need to know to craft a website that stands out. From user-friendly design to seamless functionality, we've got you covered. Don't miss out on this invaluable resource! Check out our checklist now at Pixlogix and start your journey towards a captivating online presence today.
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024Neo4j
Neha Bajwa, Vice President of Product Marketing, Neo4j
Join us as we explore breakthrough innovations enabled by interconnected data and AI. Discover firsthand how organizations use relationships in data to uncover contextual insights and solve our most pressing challenges – from optimizing supply chains, detecting fraud, and improving customer experiences to accelerating drug discoveries.
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slackshyamraj55
Discover the seamless integration of RPA (Robotic Process Automation), COMPOSER, and APM with AWS IDP enhanced with Slack notifications. Explore how these technologies converge to streamline workflows, optimize performance, and ensure secure access, all while leveraging the power of AWS IDP and real-time communication via Slack notifications.
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfPaige Cruz
Monitoring and observability aren’t traditionally found in software curriculums and many of us cobble this knowledge together from whatever vendor or ecosystem we were first introduced to and whatever is a part of your current company’s observability stack.
While the dev and ops silo continues to crumble….many organizations still relegate monitoring & observability as the purview of ops, infra and SRE teams. This is a mistake - achieving a highly observable system requires collaboration up and down the stack.
I, a former op, would like to extend an invitation to all application developers to join the observability party will share these foundational concepts to build on:
A tale of scale & speed: How the US Navy is enabling software delivery from l...sonjaschweigert1
Rapid and secure feature delivery is a goal across every application team and every branch of the DoD. The Navy’s DevSecOps platform, Party Barge, has achieved:
- Reduction in onboarding time from 5 weeks to 1 day
- Improved developer experience and productivity through actionable findings and reduction of false positives
- Maintenance of superior security standards and inherent policy enforcement with Authorization to Operate (ATO)
Development teams can ship efficiently and ensure applications are cyber ready for Navy Authorizing Officials (AOs). In this webinar, Sigma Defense and Anchore will give attendees a look behind the scenes and demo secure pipeline automation and security artifacts that speed up application ATO and time to production.
We will cover:
- How to remove silos in DevSecOps
- How to build efficient development pipeline roles and component templates
- How to deliver security artifacts that matter for ATO’s (SBOMs, vulnerability reports, and policy evidence)
- How to streamline operations with automated policy checks on container images
Essentials of Automations: The Art of Triggers and Actions in FMESafe Software
In this second installment of our Essentials of Automations webinar series, we’ll explore the landscape of triggers and actions, guiding you through the nuances of authoring and adapting workspaces for seamless automations. Gain an understanding of the full spectrum of triggers and actions available in FME, empowering you to enhance your workspaces for efficient automation.
We’ll kick things off by showcasing the most commonly used event-based triggers, introducing you to various automation workflows like manual triggers, schedules, directory watchers, and more. Plus, see how these elements play out in real scenarios.
Whether you’re tweaking your current setup or building from the ground up, this session will arm you with the tools and insights needed to transform your FME usage into a powerhouse of productivity. Join us to discover effective strategies that simplify complex processes, enhancing your productivity and transforming your data management practices with FME. Let’s turn complexity into clarity and make your workspaces work wonders!
Building RAG with self-deployed Milvus vector database and Snowpark Container...Zilliz
This talk will give hands-on advice on building RAG applications with an open-source Milvus database deployed as a docker container. We will also introduce the integration of Milvus with Snowpark Container Services.
Communications Mining Series - Zero to Hero - Session 1DianaGray10
This session provides introduction to UiPath Communication Mining, importance and platform overview. You will acquire a good understand of the phases in Communication Mining as we go over the platform with you. Topics covered:
• Communication Mining Overview
• Why is it important?
• How can it help today’s business and the benefits
• Phases in Communication Mining
• Demo on Platform overview
• Q/A
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.