In the last few years the fields of both UAV and cloud computing has gained the interest of researchers. UAV, which can be classified as flying ad-hoc network or FANET plays an important role in both military and civilian applications, also the cloud computing has gained an important role in many applications such as data processing and data preservation beside it allows users to access all applications and get into data and files from any device whenever they are, all of these benefits are used with the visibility of internet, our research shows also that the user can access without the use of the internet by using military network instead of internet in the military applications to gain more secure in the network. This paper offers proposed algorithms for UAV when equipped with cloud computing system in order to work as a unique system in military applications.
PERFORMANCE OF TCP CONGESTION CONTROL IN UAV NETWORKS OF VARIOUS RADIO PROPAG...IJCNCJournal
1) The document analyzes the performance of TCP congestion control in unmanned aerial vehicle (UAV) networks using various radio propagation models.
2) Simulation results show that TCP congestion control improves network performance in UAV networks using the free space and two-ray ground propagation models, increasing average flow throughput and decreasing packet delay and loss.
3) However, TCP congestion control faces challenges when link losses become severe, such as in networks using the shadowing propagation model.
Decision to offload the task to Cloud for increasing energy efficiency of Mob...IRJET Journal
This document discusses increasing the energy efficiency of mobile phones through task offloading to cloud computing. It presents a model where mobile devices can offload computationally intensive tasks to remote cloud servers to save battery power. The key factors in determining whether to offload a task include the processing speeds of the mobile device and cloud server, data transmission time over the network, and power consumption for local processing versus transmission. An analytical model is developed using 802.11 WiFi specifications to estimate transmission times and energy savings from offloading tasks to the cloud. The goal is to provide a way to decide whether offloading a specific task will increase energy efficiency for the mobile phone.
This document discusses using moments to estimate the performance of re-routing in vehicular ad hoc networks (VANETs). It first provides background on VANETs and their characteristics. It then discusses using an ant colony optimization algorithm to optimize re-routing and estimating the performance analytically using moments to allow for intermediate step analysis. This improves the accuracy of re-routing estimation by considering locations of nodes between the starting and ending points. The document provides an example algorithm and procedure for computing potential re-routes and identifying the shortest path using node locations and distances.
Address-light and energy aware routing protocol for wireless sensor networkTELKOMNIKA JOURNAL
In recent years, sensor networks applications were used in many criteria. Because of its vast applications, so many researchers studied these networks. Wireless sensor networks contain significant number of sensor nodes; they are suitable medium for collecting and sending data or informing the sink about an event. This study presents a new integrated method for routing in sensor networks which is based on remaining energy of the nodes and existing space between each node and the sink. This method is more suitable for large and medium volume of data. Lifetime enhancement of the network is the main purpose of this method which is obtained by fair division of nodes roles in transmission of data to the sink. In ALERP algorithm (Address Light, Label-Based and Energy-Aware Routing Protocol), in order to reduce network overload and energy consuming as well as enhancement of network lifetime, we used predetermined routes as well as routing based on packet labels. Energy consumption in the entire network is another advantage of this method. The existence of various parameters on this algorithm will lead to more flexibility of it. Generally, conducted simulations indicate higher uniformity in energy consumption of nodes.
ITA: The Improved Throttled Algorithm of Load Balancing on Cloud ComputingIJCNCJournal
Cloud computing makes the information technology industry boom. It is a great solution for businesses who want to save costs while ensuring the quality of service. One of the key issues that make cloud computing successful is the load balancing technique used in the load balancer to minimize time costs and optimize costs economically. This paper proposes an algorithm to enhance the processing time of tasks so that it can help improve the load balancing capacity on cloud computing. This algorithm, named as Improved Throttled Algorithm (ITA), is an improvement of Throttled Algorithm. The paper uses the Cloud Analyst tool to simulate. The selected algorithms are used to compare: Equally Load, Round Robin, Throttled and TMA. The simulation results show that the proposed algorithm ITA has improved the processing time of tasks, time spent processing requests and reduced the cost of Datacenters compared to the selected popular algorithms as above. The improvement of ITA is because of selecting virtual machines in an index table that is available but in order of priority. It helps response times and processing times remain stable, limits the idling resources, and cloud costs are minimized compared to selected algorithms.
This document discusses the joint design of data compression and medium access control (MAC) protocol for smart grids with renewable energy sources. It proposes using compressed sensing (CS) techniques to compress reported power injection data from multiple nodes in both space and time, and adapting the 802.15.4 MAC protocol to enable efficient data transmission and reliable data reconstruction. An analytical model is developed to determine optimal MAC parameter configurations that minimize reporting delay while achieving reliable data recovery. Numerical results are presented to demonstrate performance gains over existing solutions in terms of reporting delay, energy consumption, and bandwidth usage.
Resource Dependent Radio Allocation For Battlefield Communications - A Data M...IJERA Editor
Network Enabled Capability (NEC) and the Land Open Systems Architecture (LOSA) are novel approaches to enable interoperability between a heterogeneous collection of assets in the battlefield. These paradigms utilise an underlying network for cooperation between deployed battlefield equipment. NEC and LOSA have great potential to transform military communications and enhance integrated survivability as well as situational awareness, but the Achilles’ heel of NEC and LOSA is the wireless spectrum over which they must communicate. A noisy and dynamic battlefield wireless spectrum as well as an array of heterogeneous wireless communications equipment handling multiple types of data with different Quality of Service (QoS) requirements requires a system which manages and allocates these communication resources effectively. This paper presents the High Availability Wireless Communications (HAWC) system, a hardware agnostic communications controller middleware to manage any combination of existing and future multiband wireless resources. The system utilises a vehicle’s data model to gather information about available radio resources and enable LOSA by meeting communications data requirements and delivering appropriate QoS to the appropriate traffic in a fleet of vehicles. The functionality of the system is verified by using behavioural simulation on a virtual battlefield.
PERFORMANCE OF TCP CONGESTION CONTROL IN UAV NETWORKS OF VARIOUS RADIO PROPAG...IJCNCJournal
1) The document analyzes the performance of TCP congestion control in unmanned aerial vehicle (UAV) networks using various radio propagation models.
2) Simulation results show that TCP congestion control improves network performance in UAV networks using the free space and two-ray ground propagation models, increasing average flow throughput and decreasing packet delay and loss.
3) However, TCP congestion control faces challenges when link losses become severe, such as in networks using the shadowing propagation model.
Decision to offload the task to Cloud for increasing energy efficiency of Mob...IRJET Journal
This document discusses increasing the energy efficiency of mobile phones through task offloading to cloud computing. It presents a model where mobile devices can offload computationally intensive tasks to remote cloud servers to save battery power. The key factors in determining whether to offload a task include the processing speeds of the mobile device and cloud server, data transmission time over the network, and power consumption for local processing versus transmission. An analytical model is developed using 802.11 WiFi specifications to estimate transmission times and energy savings from offloading tasks to the cloud. The goal is to provide a way to decide whether offloading a specific task will increase energy efficiency for the mobile phone.
This document discusses using moments to estimate the performance of re-routing in vehicular ad hoc networks (VANETs). It first provides background on VANETs and their characteristics. It then discusses using an ant colony optimization algorithm to optimize re-routing and estimating the performance analytically using moments to allow for intermediate step analysis. This improves the accuracy of re-routing estimation by considering locations of nodes between the starting and ending points. The document provides an example algorithm and procedure for computing potential re-routes and identifying the shortest path using node locations and distances.
Address-light and energy aware routing protocol for wireless sensor networkTELKOMNIKA JOURNAL
In recent years, sensor networks applications were used in many criteria. Because of its vast applications, so many researchers studied these networks. Wireless sensor networks contain significant number of sensor nodes; they are suitable medium for collecting and sending data or informing the sink about an event. This study presents a new integrated method for routing in sensor networks which is based on remaining energy of the nodes and existing space between each node and the sink. This method is more suitable for large and medium volume of data. Lifetime enhancement of the network is the main purpose of this method which is obtained by fair division of nodes roles in transmission of data to the sink. In ALERP algorithm (Address Light, Label-Based and Energy-Aware Routing Protocol), in order to reduce network overload and energy consuming as well as enhancement of network lifetime, we used predetermined routes as well as routing based on packet labels. Energy consumption in the entire network is another advantage of this method. The existence of various parameters on this algorithm will lead to more flexibility of it. Generally, conducted simulations indicate higher uniformity in energy consumption of nodes.
ITA: The Improved Throttled Algorithm of Load Balancing on Cloud ComputingIJCNCJournal
Cloud computing makes the information technology industry boom. It is a great solution for businesses who want to save costs while ensuring the quality of service. One of the key issues that make cloud computing successful is the load balancing technique used in the load balancer to minimize time costs and optimize costs economically. This paper proposes an algorithm to enhance the processing time of tasks so that it can help improve the load balancing capacity on cloud computing. This algorithm, named as Improved Throttled Algorithm (ITA), is an improvement of Throttled Algorithm. The paper uses the Cloud Analyst tool to simulate. The selected algorithms are used to compare: Equally Load, Round Robin, Throttled and TMA. The simulation results show that the proposed algorithm ITA has improved the processing time of tasks, time spent processing requests and reduced the cost of Datacenters compared to the selected popular algorithms as above. The improvement of ITA is because of selecting virtual machines in an index table that is available but in order of priority. It helps response times and processing times remain stable, limits the idling resources, and cloud costs are minimized compared to selected algorithms.
This document discusses the joint design of data compression and medium access control (MAC) protocol for smart grids with renewable energy sources. It proposes using compressed sensing (CS) techniques to compress reported power injection data from multiple nodes in both space and time, and adapting the 802.15.4 MAC protocol to enable efficient data transmission and reliable data reconstruction. An analytical model is developed to determine optimal MAC parameter configurations that minimize reporting delay while achieving reliable data recovery. Numerical results are presented to demonstrate performance gains over existing solutions in terms of reporting delay, energy consumption, and bandwidth usage.
Resource Dependent Radio Allocation For Battlefield Communications - A Data M...IJERA Editor
Network Enabled Capability (NEC) and the Land Open Systems Architecture (LOSA) are novel approaches to enable interoperability between a heterogeneous collection of assets in the battlefield. These paradigms utilise an underlying network for cooperation between deployed battlefield equipment. NEC and LOSA have great potential to transform military communications and enhance integrated survivability as well as situational awareness, but the Achilles’ heel of NEC and LOSA is the wireless spectrum over which they must communicate. A noisy and dynamic battlefield wireless spectrum as well as an array of heterogeneous wireless communications equipment handling multiple types of data with different Quality of Service (QoS) requirements requires a system which manages and allocates these communication resources effectively. This paper presents the High Availability Wireless Communications (HAWC) system, a hardware agnostic communications controller middleware to manage any combination of existing and future multiband wireless resources. The system utilises a vehicle’s data model to gather information about available radio resources and enable LOSA by meeting communications data requirements and delivering appropriate QoS to the appropriate traffic in a fleet of vehicles. The functionality of the system is verified by using behavioural simulation on a virtual battlefield.
Performance analysis and evaluation of IEEE 802.11 distributed coordination f...journalBEEI
This paper discusses the distributed coordination function (DCF) access mechanism which is a carrier sense multiple access with collision avoidance (CSMA/CA) scheme. Simulation projects for different DCF performance parameters have been built using the OPNET network simulator. The projects are mainly basic service set (BSS) topology simulated under different parameter values (data rate, fragmentation, RTS/CTS, number of nodes, and load condition). Simulation results show when the DCF access mechanism is better under what load condition, and how to choose the best fragmentation threshold and other access-mechanism specific parameters according to the network conditions. Simulation results were validated against a theoretically calculated maximum throughput (the simulation maximum throughput was about 70% of the theoretically calculated maximum throughput).
Security based Clock Synchronization technique in Wireless Sensor Network for...iosrjce
This document proposes a secure clock synchronization technique for wireless sensor networks used in event-driven measurement applications. The technique aims to 1) provide high synchronization accuracy around detected events, 2) ensure long network lifetime, and 3) provide secure packet transmission. It divides nodes into an improved synchronization subset (ISS) with high accuracy around events, and a default synchronization subset (DSS) with lower accuracy elsewhere. When an event is detected, neighboring nodes in the ISS exchange synchronization packets more frequently for better accuracy. Authentication is used to securely transmit packets and identify intercepted messages. Simulation results show the technique accurately records event occurrence times while maintaining network lifetime through efficient energy usage.
Distributed Utility-Based Energy Efficient Cooperative Medium Access Control...IJMER
Cooperative communication, that utilizes near terminals to relay the overhearing
information to grasp the variability gains, choices a nice potential to strengthen the transmission
potency in wireless networks. to the subsume the hard medium access interactions evoked by relaying
and leverage the advantages of such cooperation, associate economical Cooperative Medium Access
management (CMAC) protocol is required. throughout this paper, we've got an inclination to tend to
propose a completely unique cross-layer Wide unfold Energy-adaptive Location-based CMAC
protocol, notably WEAL-CMAC, for Mobile Ad-hoc Networks (MANETs). the design objective of
WEAL-CMAC is to strengthen the performance of the MANETs in terms of network amount and
energy potency. a wise energy consumption model is used throughout this paper, that takes the energy
consumption on each transceiver instrumentation and transmit instrumentation into thought. A
distributed utility-based best relay different strategy is incorporated, that selects the most effective
relay supported location information and residual energy. moreover, with the aim of enhancing the
spacial apply, associate innovative network allocation vector setting is provided to the subsume the
variable transmission power of the beginning and relay terminals. we've got an inclination to tend to
point that the planned WEAL-CMAC considerably prolongs the network amount below varied
circumstances even for prime instrumentation energy consumption cases by comprehensive simulation
study
IRJET- Study on Hierarchical Cluster-Based Energy-Efficient Routing in Wi...IRJET Journal
This document discusses energy-efficient hierarchical cluster-based routing protocols for wireless sensor networks. It begins by introducing wireless sensor networks and explaining that energy efficiency is a key challenge due to limited battery power. It then discusses clustering structures commonly used in wireless sensor networks, including hierarchical clustering where clusters form larger clusters in a tree structure. The document goes on to describe several hierarchical cluster-based routing protocols - LEACH, PEGASIS and TEEN - and compares their approaches to routing data to extend network lifetime. It concludes that these protocols each have advantages and disadvantages depending on the network topology, and that cluster formation and communication between clusters requires further research.
A New Programming Model to Simulate Wireless Sensor Networks : Finding The Be...IJCNCJournal
This document summarizes a research paper that proposes a new programming model for wireless sensor networks. The programming model aims to find the best routing path between sensor nodes by coding the actual sensor nodes to perform tasks. The paper reviews existing programming models and requirements for sensor network programming such as energy efficiency, scalability, localization, and time synchronization. It then describes the proposed model and compares results from applying the model in different network topologies using multiple routing algorithms.
IRJET- Investigation on Delay and Power Minimization in IEEE 802.15.4 Protoco...IRJET Journal
This document investigates delay and power minimization in the IEEE 802.15.4 protocol using the CSMA-CA algorithm. It analyzes the average delay and power of the Zigbee protocol with and without considering maximum retry limits. Theoretical calculations show that the average delay and power of the Zigbee protocol without maximum retry limits is greater than when maximum retry limits are considered. This is because without maximum retry limits, packets can be retransmitted indefinitely, leading to higher delays and power consumption. The analysis provides insights into optimizing the Zigbee protocol to improve quality of service parameters like delay and power usage.
GLOBAL FRONTRUNNER ROUTING ALGORITHM (GFRA) FOR V2V COMMUNICATION IN VANETS cscpconf
VANET (Vehicular Ad hoc NETwork) is the emerging research area that making the phrase
“Network on Wheel” true. In this new age network the basic WLAN (IEEE 802.11) standard is
used. As the necessity of such network increases the implementation challenges are being taken
into account. They are broadcasting, routing, priority scheduling and security and privacy. In
this paper the routing is considered as the research factor. A proposal for routing with
frequently changing topology to avoid disconnection of network on road and for the routing
among overlapping networks in flyovers with multiple ramps and stack to avoid wrong
messaging is given.
Detailed Simulation of Large-Scale Wireless NetworksGabriele D'Angelo
WiFra is a new framework for the detailed simulation of very large-scale wireless networks. It is based on the parallel and distributed simulation approach and provides high scalability in terms of size of simulated networks and number of execution units running the simulation. In order to improve the performance of distributed simulation, additional techniques are proposed. Their aim is to reduce the communication overhead and to maintain a good level of load-balancing. Simulation architectures composed of low-cost Commercial-Off-The-Shelf (COTS) hardware are specifically supported by WiFra. The framework dynamically reconfigures the simulation, taking care of the performance of each part of the execution architecture and dealing with unpredictable fluctuations of the available computation power and communication load on the single execution units. A fine-grained model of the 802.11 DCF protocol has been used for the performance evaluation of the proposed framework. The results demonstrate that the distributed approach is suitable for the detailed simulation of very-large scale wireless networks.
we find out various power aware and data packet rate control with-collision-avoidance (CSMA/CA)-based ad hoc wireless network communication. And identifies that CSMA
Routing in Wireless Sensor Networks: Improved Energy Efficiency and Coverage ...CSCJournals
This paper proposes a new method for collecting distributed data in Wireless Sensor Networks (WSNs) that can improve the energy efficiency and network coverage; especially in remote areas. In multi-hop communication, sink nodes are responsible for collecting and forwarding data to base stations. The nodes that are located near a sink node usually deplete their battery faster than other nodes because they are responsible for aggregating the data from other sensor nodes. Several studies have proved the advantages of using mobile sink nodes to reduce energy consumption. Nonetheless, the need for compatible and efficient routing algorithms cannot be understated. Accordingly, a hybrid routing algorithm based on the Dijkstra�s and Rendezvous algorithms is proposed. To improve the energy efficiency and coverage, Energy Efficient Hybrid Unmanned Vehicle Based Routing Algorithm (E2HUV) is proposed to create a routing path for Unmanned Aerial Vehicles (UAVs) that can be used as mobile sinks in WSNs. Performance results show that the E2HUV algorithm offers better efficiency as compared to currently existing algorithms.
Performance evaluation of variants of particle swarm optimization algorithms ...Aayush Gupta
The document discusses wireless sensor networks (WSNs) and energy efficient routing protocols. It provides background on the challenges of WSNs including limited energy. It describes that communication is the most energy expensive activity and multihop transmission can help. It then discusses the LEACH routing protocol, a hierarchical clustering protocol, including its phases and stochastic threshold algorithm for selecting cluster heads. It proposes adapting k-means clustering for LEACH to select cluster heads more efficiently and compares performance of random LEACH versus adaptive k-means LEACH.
IEEE Final Year Projects 2011-2012 :: Elysium Technologies Pvt Ltd::Mobilecom...sunda2011
IEEE Final Year Projects 2011-2012 :: Elysium Technologies Pvt Ltd
IEEE projects, final year projects, students project, be project, engineering projects, academic project, project center in madurai, trichy, chennai, kollam, coimbatore
Investigation of Clock Synchronization Techniques and its Performance Impact ...ijctet
This document summarizes research on clock synchronization techniques in mobile ad hoc networks (MANETs). It begins by defining MANETs and explaining why time synchronization is important. It then discusses challenges in time synchronization due to clock imperfections and variable network delays. The document reviews existing clock synchronization methods like burst transmission and clock sampling. It also covers characteristics of MANETs like dynamic topology. Finally, it surveys previous research on time synchronization algorithms for MANETs, including a decentralized algorithm that achieves fast convergence times and high accuracy.
Time and Energy Minimized Trajectories for LANs of DronesDr. Amarjeet Singh
Controlling UAV movements in a UAV network is a
critical but not well-studied research area in UAV network
research. In this paper, we consider the problem of finding
time and energy minimized trajectories for LANs of Drones
(LoDs) by computationally inexpensive method. A LoD is a
novel type of UAV network, which uses a minimum number
of UAVs to perform any collaborative task. For both
criterions of time and energy minimization, we formulate
separate nonlinear constrained optimization problems and
use Sequential Quadratic Programming method to obtain
local optimum solutions. These minimization methods were
tested by carrying out a range of simulations in MATLAB
environment.
A Generic Open Source Framework for Auto Generation of Data Manipulation Comm...iosrjce
IOSR Journal of Computer Engineering (IOSR-JCE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of computer engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in computer technology. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
This document summarizes and compares several energy-efficient routing cluster protocols for wireless sensor networks, including LEACH, LEACH-C, TL-LEACH, PEGASIS, ER-LEACH, and LEACH-SM. It first provides background on wireless sensor networks and the need for energy efficiency in routing protocols. It then reviews each of the protocols, describing their clustering approach and how they select cluster heads. The document analyzes and compares the performance of the protocols based on metrics like throughput, network lifetime, energy efficiency, and load balancing. It finds that PEGASIS and TL-LEACH generally perform best in terms of throughput and network lifetime, while LEACH-C and ER-LEACH also
Implementation of optimal solution for network lifetime and energy consumptio...TELKOMNIKA JOURNAL
This document summarizes a research paper that proposes an improved energy efficient LEACH (IEE-LEACH) routing protocol for mobile ad hoc networks (MANETs). The paper discusses how the LEACH protocol randomly selects cluster heads, which can lead to uneven energy distributions. The proposed IEE-LEACH protocol selects cluster heads based on remaining node energy and a cost function to balance energy usage and improve network lifetime. Simulation results show the IEE-LEACH protocol achieves higher packet delivery ratios, lower end-to-end delays, and prolongs network lifetime compared to the standard LEACH protocol.
DESIGN OF ENERGY EFFICIENT ROUTING ALGORITHM FOR WIRELESS SENSOR NETWORK (WSN...cscpconf
Development of energy efficient Wireless Sensor Network (WSN) routing protocol is nowadays main area of interest amongst researchers. This research is an effort in designing energy efficient Wireless Sensor Network (WSN) routing protocol under certain parameters consideration. Research report discusses various existing WSN routing protocols and propose a new WSN energy efficient routing protocol. Results show a significant improvement in life cycle of the nodes and enhancement in energy efficiency of WSN. In this paper, an attempt has been made to design a wireless sensor network involving the extraction of Pascal Graph features. The standard task involves designing a suitable topology using Pascal Graph. As per the definition of interconnection network it is equivalent that a suitable graph can represent the different computer network topologies very efficiently. Different characteristics of Pascal Graph Topology has been discovered and used in network topology design. Since Pascal Graph gives
better result in terms of finding the dependable and reliable nodes in topology, it has been considered for network analysis. Moreover, we propose a methodology that involves the Pascal
Graph Topology for wireless sensor network which can analyse and represent the network and help in routing.
A Proactive Greedy Routing Protocol Precludes Sink-Hole Formation in Wireless...ijwmn
The International Journal of Wireless & Mobile Networks (IJWMN) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of Wireless & Mobile Networks. The journal focuses on all technical and practical aspects of Wireless & Mobile Networks. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on advanced wireless & mobile networking concepts and establishing new collaborations in these areas.
This document summarizes a research paper that proposes a framework for dynamically partitioning mobile applications between a mobile device and cloud computing resources. The framework consists of runtime systems on both the mobile device and cloud to support adaptive partitioning and distributed execution. It aims to efficiently serve large numbers of users by allowing computation instances on the cloud to be shared among multiple applications and tenants. The paper formulates the partitioning problem as an optimization problem that allocates application components and wireless bandwidth to maximize throughput.
As a result of technological advances in robotic systems, electronic sensors, and communication techniques, the production of unmanned aerial vehicle (UAV) systems has become possible. Their easy installation and flexibility led these UAV systems to be used widely in both military and civilian applications. Note that the capability of one UAV is however limited. Nowadays, a multi-UAV system is of special interest due to the ability of its associate UAV members either to coordinate simultaneous coverage of large areas or to cooperate to achieve common goals/targets. This kind of cooperation/coordination requires a reliable communication network with a proper network model to ensure the exchange of both control and data packets among UAVs. Such network models should provide all-time connectivity to avoid dangerous failures or unintended consequences. Thus, the multi-UAV system relies on communication to operate. Flying ad hoc network (FANET) is moreover considered as a sophisticated type of wireless ad hoc network among UAVs which solved the communication problems into other network models. Along with the FANET’s unique features, challenges and open issues are also discussed especially in the routing protocols approach. We will try to present the expected transmission account metric with a new algorithm for reliability. In addition to this new algorithm mechanism, the metric takes into account the relative speed between UAVs, and thus the increase of the fluctuations in links between UAVs has been detected. Accordingly, the results show that the function of the AODV routing protocol with this metric becomes effective in high mobility environments.
Performance analysis and evaluation of IEEE 802.11 distributed coordination f...journalBEEI
This paper discusses the distributed coordination function (DCF) access mechanism which is a carrier sense multiple access with collision avoidance (CSMA/CA) scheme. Simulation projects for different DCF performance parameters have been built using the OPNET network simulator. The projects are mainly basic service set (BSS) topology simulated under different parameter values (data rate, fragmentation, RTS/CTS, number of nodes, and load condition). Simulation results show when the DCF access mechanism is better under what load condition, and how to choose the best fragmentation threshold and other access-mechanism specific parameters according to the network conditions. Simulation results were validated against a theoretically calculated maximum throughput (the simulation maximum throughput was about 70% of the theoretically calculated maximum throughput).
Security based Clock Synchronization technique in Wireless Sensor Network for...iosrjce
This document proposes a secure clock synchronization technique for wireless sensor networks used in event-driven measurement applications. The technique aims to 1) provide high synchronization accuracy around detected events, 2) ensure long network lifetime, and 3) provide secure packet transmission. It divides nodes into an improved synchronization subset (ISS) with high accuracy around events, and a default synchronization subset (DSS) with lower accuracy elsewhere. When an event is detected, neighboring nodes in the ISS exchange synchronization packets more frequently for better accuracy. Authentication is used to securely transmit packets and identify intercepted messages. Simulation results show the technique accurately records event occurrence times while maintaining network lifetime through efficient energy usage.
Distributed Utility-Based Energy Efficient Cooperative Medium Access Control...IJMER
Cooperative communication, that utilizes near terminals to relay the overhearing
information to grasp the variability gains, choices a nice potential to strengthen the transmission
potency in wireless networks. to the subsume the hard medium access interactions evoked by relaying
and leverage the advantages of such cooperation, associate economical Cooperative Medium Access
management (CMAC) protocol is required. throughout this paper, we've got an inclination to tend to
propose a completely unique cross-layer Wide unfold Energy-adaptive Location-based CMAC
protocol, notably WEAL-CMAC, for Mobile Ad-hoc Networks (MANETs). the design objective of
WEAL-CMAC is to strengthen the performance of the MANETs in terms of network amount and
energy potency. a wise energy consumption model is used throughout this paper, that takes the energy
consumption on each transceiver instrumentation and transmit instrumentation into thought. A
distributed utility-based best relay different strategy is incorporated, that selects the most effective
relay supported location information and residual energy. moreover, with the aim of enhancing the
spacial apply, associate innovative network allocation vector setting is provided to the subsume the
variable transmission power of the beginning and relay terminals. we've got an inclination to tend to
point that the planned WEAL-CMAC considerably prolongs the network amount below varied
circumstances even for prime instrumentation energy consumption cases by comprehensive simulation
study
IRJET- Study on Hierarchical Cluster-Based Energy-Efficient Routing in Wi...IRJET Journal
This document discusses energy-efficient hierarchical cluster-based routing protocols for wireless sensor networks. It begins by introducing wireless sensor networks and explaining that energy efficiency is a key challenge due to limited battery power. It then discusses clustering structures commonly used in wireless sensor networks, including hierarchical clustering where clusters form larger clusters in a tree structure. The document goes on to describe several hierarchical cluster-based routing protocols - LEACH, PEGASIS and TEEN - and compares their approaches to routing data to extend network lifetime. It concludes that these protocols each have advantages and disadvantages depending on the network topology, and that cluster formation and communication between clusters requires further research.
A New Programming Model to Simulate Wireless Sensor Networks : Finding The Be...IJCNCJournal
This document summarizes a research paper that proposes a new programming model for wireless sensor networks. The programming model aims to find the best routing path between sensor nodes by coding the actual sensor nodes to perform tasks. The paper reviews existing programming models and requirements for sensor network programming such as energy efficiency, scalability, localization, and time synchronization. It then describes the proposed model and compares results from applying the model in different network topologies using multiple routing algorithms.
IRJET- Investigation on Delay and Power Minimization in IEEE 802.15.4 Protoco...IRJET Journal
This document investigates delay and power minimization in the IEEE 802.15.4 protocol using the CSMA-CA algorithm. It analyzes the average delay and power of the Zigbee protocol with and without considering maximum retry limits. Theoretical calculations show that the average delay and power of the Zigbee protocol without maximum retry limits is greater than when maximum retry limits are considered. This is because without maximum retry limits, packets can be retransmitted indefinitely, leading to higher delays and power consumption. The analysis provides insights into optimizing the Zigbee protocol to improve quality of service parameters like delay and power usage.
GLOBAL FRONTRUNNER ROUTING ALGORITHM (GFRA) FOR V2V COMMUNICATION IN VANETS cscpconf
VANET (Vehicular Ad hoc NETwork) is the emerging research area that making the phrase
“Network on Wheel” true. In this new age network the basic WLAN (IEEE 802.11) standard is
used. As the necessity of such network increases the implementation challenges are being taken
into account. They are broadcasting, routing, priority scheduling and security and privacy. In
this paper the routing is considered as the research factor. A proposal for routing with
frequently changing topology to avoid disconnection of network on road and for the routing
among overlapping networks in flyovers with multiple ramps and stack to avoid wrong
messaging is given.
Detailed Simulation of Large-Scale Wireless NetworksGabriele D'Angelo
WiFra is a new framework for the detailed simulation of very large-scale wireless networks. It is based on the parallel and distributed simulation approach and provides high scalability in terms of size of simulated networks and number of execution units running the simulation. In order to improve the performance of distributed simulation, additional techniques are proposed. Their aim is to reduce the communication overhead and to maintain a good level of load-balancing. Simulation architectures composed of low-cost Commercial-Off-The-Shelf (COTS) hardware are specifically supported by WiFra. The framework dynamically reconfigures the simulation, taking care of the performance of each part of the execution architecture and dealing with unpredictable fluctuations of the available computation power and communication load on the single execution units. A fine-grained model of the 802.11 DCF protocol has been used for the performance evaluation of the proposed framework. The results demonstrate that the distributed approach is suitable for the detailed simulation of very-large scale wireless networks.
we find out various power aware and data packet rate control with-collision-avoidance (CSMA/CA)-based ad hoc wireless network communication. And identifies that CSMA
Routing in Wireless Sensor Networks: Improved Energy Efficiency and Coverage ...CSCJournals
This paper proposes a new method for collecting distributed data in Wireless Sensor Networks (WSNs) that can improve the energy efficiency and network coverage; especially in remote areas. In multi-hop communication, sink nodes are responsible for collecting and forwarding data to base stations. The nodes that are located near a sink node usually deplete their battery faster than other nodes because they are responsible for aggregating the data from other sensor nodes. Several studies have proved the advantages of using mobile sink nodes to reduce energy consumption. Nonetheless, the need for compatible and efficient routing algorithms cannot be understated. Accordingly, a hybrid routing algorithm based on the Dijkstra�s and Rendezvous algorithms is proposed. To improve the energy efficiency and coverage, Energy Efficient Hybrid Unmanned Vehicle Based Routing Algorithm (E2HUV) is proposed to create a routing path for Unmanned Aerial Vehicles (UAVs) that can be used as mobile sinks in WSNs. Performance results show that the E2HUV algorithm offers better efficiency as compared to currently existing algorithms.
Performance evaluation of variants of particle swarm optimization algorithms ...Aayush Gupta
The document discusses wireless sensor networks (WSNs) and energy efficient routing protocols. It provides background on the challenges of WSNs including limited energy. It describes that communication is the most energy expensive activity and multihop transmission can help. It then discusses the LEACH routing protocol, a hierarchical clustering protocol, including its phases and stochastic threshold algorithm for selecting cluster heads. It proposes adapting k-means clustering for LEACH to select cluster heads more efficiently and compares performance of random LEACH versus adaptive k-means LEACH.
IEEE Final Year Projects 2011-2012 :: Elysium Technologies Pvt Ltd::Mobilecom...sunda2011
IEEE Final Year Projects 2011-2012 :: Elysium Technologies Pvt Ltd
IEEE projects, final year projects, students project, be project, engineering projects, academic project, project center in madurai, trichy, chennai, kollam, coimbatore
Investigation of Clock Synchronization Techniques and its Performance Impact ...ijctet
This document summarizes research on clock synchronization techniques in mobile ad hoc networks (MANETs). It begins by defining MANETs and explaining why time synchronization is important. It then discusses challenges in time synchronization due to clock imperfections and variable network delays. The document reviews existing clock synchronization methods like burst transmission and clock sampling. It also covers characteristics of MANETs like dynamic topology. Finally, it surveys previous research on time synchronization algorithms for MANETs, including a decentralized algorithm that achieves fast convergence times and high accuracy.
Time and Energy Minimized Trajectories for LANs of DronesDr. Amarjeet Singh
Controlling UAV movements in a UAV network is a
critical but not well-studied research area in UAV network
research. In this paper, we consider the problem of finding
time and energy minimized trajectories for LANs of Drones
(LoDs) by computationally inexpensive method. A LoD is a
novel type of UAV network, which uses a minimum number
of UAVs to perform any collaborative task. For both
criterions of time and energy minimization, we formulate
separate nonlinear constrained optimization problems and
use Sequential Quadratic Programming method to obtain
local optimum solutions. These minimization methods were
tested by carrying out a range of simulations in MATLAB
environment.
A Generic Open Source Framework for Auto Generation of Data Manipulation Comm...iosrjce
IOSR Journal of Computer Engineering (IOSR-JCE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of computer engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in computer technology. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
This document summarizes and compares several energy-efficient routing cluster protocols for wireless sensor networks, including LEACH, LEACH-C, TL-LEACH, PEGASIS, ER-LEACH, and LEACH-SM. It first provides background on wireless sensor networks and the need for energy efficiency in routing protocols. It then reviews each of the protocols, describing their clustering approach and how they select cluster heads. The document analyzes and compares the performance of the protocols based on metrics like throughput, network lifetime, energy efficiency, and load balancing. It finds that PEGASIS and TL-LEACH generally perform best in terms of throughput and network lifetime, while LEACH-C and ER-LEACH also
Implementation of optimal solution for network lifetime and energy consumptio...TELKOMNIKA JOURNAL
This document summarizes a research paper that proposes an improved energy efficient LEACH (IEE-LEACH) routing protocol for mobile ad hoc networks (MANETs). The paper discusses how the LEACH protocol randomly selects cluster heads, which can lead to uneven energy distributions. The proposed IEE-LEACH protocol selects cluster heads based on remaining node energy and a cost function to balance energy usage and improve network lifetime. Simulation results show the IEE-LEACH protocol achieves higher packet delivery ratios, lower end-to-end delays, and prolongs network lifetime compared to the standard LEACH protocol.
DESIGN OF ENERGY EFFICIENT ROUTING ALGORITHM FOR WIRELESS SENSOR NETWORK (WSN...cscpconf
Development of energy efficient Wireless Sensor Network (WSN) routing protocol is nowadays main area of interest amongst researchers. This research is an effort in designing energy efficient Wireless Sensor Network (WSN) routing protocol under certain parameters consideration. Research report discusses various existing WSN routing protocols and propose a new WSN energy efficient routing protocol. Results show a significant improvement in life cycle of the nodes and enhancement in energy efficiency of WSN. In this paper, an attempt has been made to design a wireless sensor network involving the extraction of Pascal Graph features. The standard task involves designing a suitable topology using Pascal Graph. As per the definition of interconnection network it is equivalent that a suitable graph can represent the different computer network topologies very efficiently. Different characteristics of Pascal Graph Topology has been discovered and used in network topology design. Since Pascal Graph gives
better result in terms of finding the dependable and reliable nodes in topology, it has been considered for network analysis. Moreover, we propose a methodology that involves the Pascal
Graph Topology for wireless sensor network which can analyse and represent the network and help in routing.
A Proactive Greedy Routing Protocol Precludes Sink-Hole Formation in Wireless...ijwmn
The International Journal of Wireless & Mobile Networks (IJWMN) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of Wireless & Mobile Networks. The journal focuses on all technical and practical aspects of Wireless & Mobile Networks. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on advanced wireless & mobile networking concepts and establishing new collaborations in these areas.
This document summarizes a research paper that proposes a framework for dynamically partitioning mobile applications between a mobile device and cloud computing resources. The framework consists of runtime systems on both the mobile device and cloud to support adaptive partitioning and distributed execution. It aims to efficiently serve large numbers of users by allowing computation instances on the cloud to be shared among multiple applications and tenants. The paper formulates the partitioning problem as an optimization problem that allocates application components and wireless bandwidth to maximize throughput.
As a result of technological advances in robotic systems, electronic sensors, and communication techniques, the production of unmanned aerial vehicle (UAV) systems has become possible. Their easy installation and flexibility led these UAV systems to be used widely in both military and civilian applications. Note that the capability of one UAV is however limited. Nowadays, a multi-UAV system is of special interest due to the ability of its associate UAV members either to coordinate simultaneous coverage of large areas or to cooperate to achieve common goals/targets. This kind of cooperation/coordination requires a reliable communication network with a proper network model to ensure the exchange of both control and data packets among UAVs. Such network models should provide all-time connectivity to avoid dangerous failures or unintended consequences. Thus, the multi-UAV system relies on communication to operate. Flying ad hoc network (FANET) is moreover considered as a sophisticated type of wireless ad hoc network among UAVs which solved the communication problems into other network models. Along with the FANET’s unique features, challenges and open issues are also discussed especially in the routing protocols approach. We will try to present the expected transmission account metric with a new algorithm for reliability. In addition to this new algorithm mechanism, the metric takes into account the relative speed between UAVs, and thus the increase of the fluctuations in links between UAVs has been detected. Accordingly, the results show that the function of the AODV routing protocol with this metric becomes effective in high mobility environments.
White paper: Enhance mobility and driver experience with multihop data exchan...Yaroslav Domaratsky
Unmanned Aerial Vehicles (UAVs) have growing potential in the Public Safety (PS), commercial, government, and consumer domains. Over six million UAVs will be sold in the US in 2016, and the total available UAV market is estimated to reach 100 million UAVs sold worldwide by 2020. We believe that flying Wireless Mesh Network (WMN) would be the most suitable technology to organize communication between UAVs, between UAVs and ground infrastructure and between UAVs and ground vehicles. In the paper we propose technical approach to implement the above listed use cases using low cost communication technologies within ITS architecture. In the paper we define use cases, discuss potentially applicable communication technologies, overview WMN data routing protocols, list UAV specific requirements and discuss product differentiation.
This document summarizes an article from the International Journal of Computer Engineering and Technology that analyzes the performance of WLAN standards for multimedia applications with multiple subnet scenarios. It describes creating baseline scenarios in OPNET to simulate wired and wireless network frameworks with three subnets. Traffic including video conferencing, web, and other applications was introduced. The performance of overall delay across the three scenario networks was measured. Multimedia load scenarios added video conferencing traffic served by a video server to analyze support for multimedia applications.
Evaluation of load balancing approaches for Erlang concurrent application in ...TELKOMNIKA JOURNAL
Cloud system accommodates the computing environment including PaaS (platform as a service), SaaS (software as a service), and IaaS (infrastructure as service) that enables the services of cloud systems. Cloud system allows multiple users to employ computing services through browsers, which reflects an alternative service model that alters the local computing workload to a distant site. Cloud virtualization is another characteristic of the clouds that deliver virtual computing services and imitate the functionality of physical computing resources. It refers to an elastic load balancing management that provides the flexible model of on-demand services. The virtualization allows organizations to improve high levels of reliability, accessibility, and scalability by having a capability to execute applications on multiple resources simultaneously. In this paper we use a queuing model to consider a flexible load balancing and evaluate performance metrics such as mean queue length, throughput, mean waiting time, utilization, and mean traversal time. The model is aware of the arrival of concurrent applications with an Erlang distribution. Simulation results regarding performance metrics are investigated. Results point out that in Cloud systems both the fairness and load balancing are to be significantly considered.
Lately, the Wireless Sensors Networks (WSN) have moved to the concept of the hybrids networks in order to get universal platforms in various types of monitoring and information collecting applications. The work presented in this paper aims in designing a hybrid remote monitoring architecture, largely secured by a high availability and resilience WSN. The modeling approach intends to describe the main operation of polling and dispatching between the communications channels with the purpose of ensuring the information availability and reducing the resilience time. To achieve our goal, we have realized an experimental platform of measuring, processing and routing data through hybrid communications technologies. We have illustrated, via curves, the routing of the data measured by a WSN (ZigBee Technology) to a final user through several communication technologies (HTTPS, SMS, ...).
International Journal of Engineering Research and Development (IJERD)IJERD Editor
This document summarizes a study that evaluates traffic load for multiple user types in mobile WiMAX networks. It begins with background on the growth of wireless broadband and the capabilities of mobile WiMAX technology. It then describes an algorithm to calculate the maximum number of subscribers a mobile WiMAX sector can support based on system parameters and traffic models. The algorithm calculates throughput by determining overhead values and available bandwidth for downlink and uplink transmissions separately. It accounts for factors like modulation distribution, frame structure, control signaling overhead from maps and ranging, and traffic from different applications. The method is intended to help network operators estimate infrastructure needs for deploying wide-area mobile WiMAX networks.
This document proposes a method for optimizing task distribution in target tracking using unmanned aerial vehicles (UAVs) and edge computing. It describes a system where UAVs track targets and offload computationally intensive tasks to edge nodes for processing. The authors develop an algorithm that considers transmission energy consumption and execution time to select optimal edge nodes. Simulation results show their proposed UAV-enabled edge computing approach outperforms existing techniques in target tracking while minimizing costs.
- The document discusses the concept of an Airborne Internet, which would provide communication between aircraft, and between aircraft and ground stations.
- A key goal is to establish a robust digital data network to enable aircraft-to-aircraft, aircraft-to-ground, and ground-to-ground communications. This could support air traffic management, fleet operations, and passenger services.
- Potential applications of an Airborne Internet discussed include enabling more efficient controller pilot data link communications (CPDLC), sharing real-time weather data from aircraft sensors, ensuring quality of service for critical applications, and facilitating electronic flight bags and automatic dependent surveillance.
A Machine Learning based Network Sharing System Design with MPTCPIJMREMJournal
The information and communication technologies (ICT) integrate different types of wireless communication to
provide IT-enabled services and applications. The great majority end devices are equipped with multiple network
interfaces such as Wi-Fi and 4G. Our goal is to integrate the available network interfaces and technologies to
enhance seamless communication efficiency and increase resources utilization. We proposed a heterogeneous
network management algorithm based on machine learning methods which includes roaming and sharing
functions. The roaming function provides the multiple network resources in physical and media access control
layers. The sharing function supports multiple network resources allocation and the service handover process
based on the Multi-Path TCP protocol. The simulation result also shows that the proposed scheme can increase
the network bandwidth utilization effectively. The sharing system could be used in home, mobile and vehicular
environments to realize ubiquitous social sharing networks.
A Machine Learning based Network Sharing System Design with MPTCPIJMREMJournal
1) The document describes a machine learning-based network sharing system that uses Multipath TCP to integrate multiple network interfaces and allocate bandwidth resources for multiple users.
2) The system includes roaming and sharing functions, where roaming chooses the best network and sharing allocates resources across available networks.
3) A heterogeneous network management algorithm is proposed that monitors network status, predicts handovers between networks, and uses a machine learning approach to optimize resource utilization and load balancing across different network interfaces.
Evaluation of load balancing algorithms on overlappiing wireless accesspointsnooriasukmaningtyas
Wireless networks came into the computing world replacing the costlier and
more complex wired method of connecting numerous equipment in the same
or different location via the use of cables. It provides the user devices a
connection to one another and the greater internet via connections to access
points. Generally, 802.11 access point products follow a default strongest
signal first approach in selecting user devices or nodes to connect to the
access point or overlapping access points. This standard does not make
provisions for even distribution of load and hence the quality of service and
the throughput in areas of congestion would be reduced. This article brings
forward two algorithms used in load balancing and they include round-robin
technique and the weighted round-robin technique to be used in the
simulation of the distribution of the load amongst the access points with the
results collated and compared to clearly show which algorithm is best suited
to be used as a standard for access point load distribution.
IJCER (www.ijceronline.com) International Journal of computational Engineerin...ijceronline
This document proposes routing and security software components that can be integrated into remote laboratories and e-laboratories. It describes implementing routing and security management services using virtual routers. These services allow centralized network management while labs are distributed. The services provide address management of connected nodes, routing of packets between networks, encryption of transmitted information, management of public/private keys, and support for mobile devices through WAP. The services are defined using WSDL and can be accessed programmatically using languages like C# and Visual Basic.
Type your short title here 1Running head Airborne Netwo.docxwillcoxjanay
Type your short title here 1
Running head: Airborne Networks 1
Airborne networks: uses, advantages and disadvantages
The term airborne network refers to the networking technology currently being developed and used by the United States Armed forces whereby an aircraft is used as the hub for a network. Thus the network is a mobile network that moves and shifts as the aircraft moves and shifts. This networking model has been developed majorly for the mode of warfare known as network centric warfare. As technology improves the armed forces need to make decisions based on current information. Airborne networks provide the forces in a battlefield with up to date information concerning any situation that may be important to the armed forces.
This networking architecture and model was developed by the Air Force with the intention to connect the terrestrial, land and water components of any battlefield. Though developed to help the armed forces during their battles this networking model has led to the rise of airborne internet services provision model. It uses the same idea as the airborne networking but its aim is not to create private networks rather it is used to provide wireless internet services to those who have subscribed. The aircrafts are used as the hubs for the wireless internet.
Airborne internet uses a method known as High Altitude Long Operation (HALO) networking. In this case HALO aircrafts fly around a target region to provide the wireless internet. Three aircrafts are needed in each of the regions. Each aircraft operates for 8 hours. Due to the fact that the aircrafts are specialized in the sense that they provide network services consistent update and maintenance of the aircrafts is needed. This is also true when it comes to airborne networks as used by the Air force.
Connectivity
Due to the sensitive nature of this network model connectivity should be a priority. The connectivity needs to be reliable and fast. It should also be secure due to the sensitive information that the Air force handles. The coverage of the network is Beyond Line of Sight (BLOS) and it also extends globally. This is due to the fact that these networks are transportable i.e. they can be moved from one point to another thus giving the network a global coverage attribute.
The connectivity of the airborne networks also gives a diversity of links for different situations. Because these networks are used by the air force the links differ according to the environment and function (which may be to get system information or media information). The links also differ according to the kind of signal that the recipient requires. The signal can be either radio or optical. Network connections are also flexible and global.
Services offered by airborne networks
The first service offered is real time data. This means that the data is delivered at the exact time it has been gene ...
ENHANCING AND MEASURING THE PERFORMANCE IN SOFTWARE DEFINED NETWORKINGIJCNCJournal
Software Defined Networking (SDN) is a challenging chapter in today’s networking era. It is a network design approach that engages the framework to be controlled or 'altered' adroitly and halfway using programming applications. SDN is a serious advancement that assures to provide a better strategy than displaying the Quality of Service (QoS) approach in the present correspondence frameworks. SDN etymologically changes the lead and convenience of system instruments using the single high state program. It separates the system control and sending functions, empowering the network control to end up specifically. It provides more functionality and more flexibility than the traditional networks. A network administrator can easily shape the traffic without touching any individual switches and services which are needed in a network. The main technology for implementing SDN is a separation of data plane and control plane, network virtualization through programmability. The total amount of time in which user can respond is called response time. Throughput is known as how fast a network can send data. In this paper, we have design a network through which we have measured the Response Time and Throughput comparing with the Real-time Online Interactive Applications (ROIA), Multiple Packet Scheduler, and NOX.
The document discusses the OSI model which defines 7 layers of abstraction for networking including the physical, data link, network, transport, session, presentation and application layers. It then explains each of these layers and their functions. The document also covers the TCP/IP model which has 4 layers - application, transport, internet and network interface layers - and describes the purpose and role of each layer.
Mobile Fog: A Programming Model for Large–Scale Applications on the Internet ...HarshitParkar6677
creating a new environment, namely the Internet of Things
(IoT), that enables a wide range of future Internet applications.
In this work, we present Mobile Fog, a high level
programming model for future Internet applications that are
geospatially distributed, large–scale, and latency–sensitive.
We analyze use cases for the programming model with camera
network and connected vehicle applications to show the
efficacy of Mobile Fog. We also evaluate application performance
through simulation.
Similar to Proposed Algorithms for UAV based Cloud Computing (20)
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slackshyamraj55
Discover the seamless integration of RPA (Robotic Process Automation), COMPOSER, and APM with AWS IDP enhanced with Slack notifications. Explore how these technologies converge to streamline workflows, optimize performance, and ensure secure access, all while leveraging the power of AWS IDP and real-time communication via Slack notifications.
Pushing the limits of ePRTC: 100ns holdover for 100 daysAdtran
At WSTS 2024, Alon Stern explored the topic of parametric holdover and explained how recent research findings can be implemented in real-world PNT networks to achieve 100 nanoseconds of accuracy for up to 100 days.
Essentials of Automations: The Art of Triggers and Actions in FMESafe Software
In this second installment of our Essentials of Automations webinar series, we’ll explore the landscape of triggers and actions, guiding you through the nuances of authoring and adapting workspaces for seamless automations. Gain an understanding of the full spectrum of triggers and actions available in FME, empowering you to enhance your workspaces for efficient automation.
We’ll kick things off by showcasing the most commonly used event-based triggers, introducing you to various automation workflows like manual triggers, schedules, directory watchers, and more. Plus, see how these elements play out in real scenarios.
Whether you’re tweaking your current setup or building from the ground up, this session will arm you with the tools and insights needed to transform your FME usage into a powerhouse of productivity. Join us to discover effective strategies that simplify complex processes, enhancing your productivity and transforming your data management practices with FME. Let’s turn complexity into clarity and make your workspaces work wonders!
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...Neo4j
Leonard Jayamohan, Partner & Generative AI Lead, Deloitte
This keynote will reveal how Deloitte leverages Neo4j’s graph power for groundbreaking digital twin solutions, achieving a staggering 100x performance boost. Discover the essential role knowledge graphs play in successful generative AI implementations. Plus, get an exclusive look at an innovative Neo4j + Generative AI solution Deloitte is developing in-house.
“An Outlook of the Ongoing and Future Relationship between Blockchain Technologies and Process-aware Information Systems.” Invited talk at the joint workshop on Blockchain for Information Systems (BC4IS) and Blockchain for Trusted Data Sharing (B4TDS), co-located with with the 36th International Conference on Advanced Information Systems Engineering (CAiSE), 3 June 2024, Limassol, Cyprus.
A tale of scale & speed: How the US Navy is enabling software delivery from l...sonjaschweigert1
Rapid and secure feature delivery is a goal across every application team and every branch of the DoD. The Navy’s DevSecOps platform, Party Barge, has achieved:
- Reduction in onboarding time from 5 weeks to 1 day
- Improved developer experience and productivity through actionable findings and reduction of false positives
- Maintenance of superior security standards and inherent policy enforcement with Authorization to Operate (ATO)
Development teams can ship efficiently and ensure applications are cyber ready for Navy Authorizing Officials (AOs). In this webinar, Sigma Defense and Anchore will give attendees a look behind the scenes and demo secure pipeline automation and security artifacts that speed up application ATO and time to production.
We will cover:
- How to remove silos in DevSecOps
- How to build efficient development pipeline roles and component templates
- How to deliver security artifacts that matter for ATO’s (SBOMs, vulnerability reports, and policy evidence)
- How to streamline operations with automated policy checks on container images
Unlocking Productivity: Leveraging the Potential of Copilot in Microsoft 365, a presentation by Christoforos Vlachos, Senior Solutions Manager – Modern Workplace, Uni Systems
For the full video of this presentation, please visit: https://www.edge-ai-vision.com/2024/06/building-and-scaling-ai-applications-with-the-nx-ai-manager-a-presentation-from-network-optix/
Robin van Emden, Senior Director of Data Science at Network Optix, presents the “Building and Scaling AI Applications with the Nx AI Manager,” tutorial at the May 2024 Embedded Vision Summit.
In this presentation, van Emden covers the basics of scaling edge AI solutions using the Nx tool kit. He emphasizes the process of developing AI models and deploying them globally. He also showcases the conversion of AI models and the creation of effective edge AI pipelines, with a focus on pre-processing, model conversion, selecting the appropriate inference engine for the target hardware and post-processing.
van Emden shows how Nx can simplify the developer’s life and facilitate a rapid transition from concept to production-ready applications.He provides valuable insights into developing scalable and efficient edge AI solutions, with a strong focus on practical implementation.
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024Neo4j
Neha Bajwa, Vice President of Product Marketing, Neo4j
Join us as we explore breakthrough innovations enabled by interconnected data and AI. Discover firsthand how organizations use relationships in data to uncover contextual insights and solve our most pressing challenges – from optimizing supply chains, detecting fraud, and improving customer experiences to accelerating drug discoveries.
Removing Uninteresting Bytes in Software FuzzingAftab Hussain
Imagine a world where software fuzzing, the process of mutating bytes in test seeds to uncover hidden and erroneous program behaviors, becomes faster and more effective. A lot depends on the initial seeds, which can significantly dictate the trajectory of a fuzzing campaign, particularly in terms of how long it takes to uncover interesting behaviour in your code. We introduce DIAR, a technique designed to speedup fuzzing campaigns by pinpointing and eliminating those uninteresting bytes in the seeds. Picture this: instead of wasting valuable resources on meaningless mutations in large, bloated seeds, DIAR removes the unnecessary bytes, streamlining the entire process.
In this work, we equipped AFL, a popular fuzzer, with DIAR and examined two critical Linux libraries -- Libxml's xmllint, a tool for parsing xml documents, and Binutil's readelf, an essential debugging and security analysis command-line tool used to display detailed information about ELF (Executable and Linkable Format). Our preliminary results show that AFL+DIAR does not only discover new paths more quickly but also achieves higher coverage overall. This work thus showcases how starting with lean and optimized seeds can lead to faster, more comprehensive fuzzing campaigns -- and DIAR helps you find such seeds.
- These are slides of the talk given at IEEE International Conference on Software Testing Verification and Validation Workshop, ICSTW 2022.
Maruthi Prithivirajan, Head of ASEAN & IN Solution Architecture, Neo4j
Get an inside look at the latest Neo4j innovations that enable relationship-driven intelligence at scale. Learn more about the newest cloud integrations and product enhancements that make Neo4j an essential choice for developers building apps with interconnected data and generative AI.
Threats to mobile devices are more prevalent and increasing in scope and complexity. Users of mobile devices desire to take full advantage of the features
available on those devices, but many of the features provide convenience and capability but sacrifice security. This best practices guide outlines steps the users can take to better protect personal devices and information.
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AIVladimir Iglovikov, Ph.D.
Presented by Vladimir Iglovikov:
- https://www.linkedin.com/in/iglovikov/
- https://x.com/viglovikov
- https://www.instagram.com/ternaus/
This presentation delves into the journey of Albumentations.ai, a highly successful open-source library for data augmentation.
Created out of a necessity for superior performance in Kaggle competitions, Albumentations has grown to become a widely used tool among data scientists and machine learning practitioners.
This case study covers various aspects, including:
People: The contributors and community that have supported Albumentations.
Metrics: The success indicators such as downloads, daily active users, GitHub stars, and financial contributions.
Challenges: The hurdles in monetizing open-source projects and measuring user engagement.
Development Practices: Best practices for creating, maintaining, and scaling open-source libraries, including code hygiene, CI/CD, and fast iteration.
Community Building: Strategies for making adoption easy, iterating quickly, and fostering a vibrant, engaged community.
Marketing: Both online and offline marketing tactics, focusing on real, impactful interactions and collaborations.
Mental Health: Maintaining balance and not feeling pressured by user demands.
Key insights include the importance of automation, making the adoption process seamless, and leveraging offline interactions for marketing. The presentation also emphasizes the need for continuous small improvements and building a friendly, inclusive community that contributes to the project's growth.
Vladimir Iglovikov brings his extensive experience as a Kaggle Grandmaster, ex-Staff ML Engineer at Lyft, sharing valuable lessons and practical advice for anyone looking to enhance the adoption of their open-source projects.
Explore more about Albumentations and join the community at:
GitHub: https://github.com/albumentations-team/albumentations
Website: https://albumentations.ai/
LinkedIn: https://www.linkedin.com/company/100504475
Twitter: https://x.com/albumentations
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...SOFTTECHHUB
The choice of an operating system plays a pivotal role in shaping our computing experience. For decades, Microsoft's Windows has dominated the market, offering a familiar and widely adopted platform for personal and professional use. However, as technological advancements continue to push the boundaries of innovation, alternative operating systems have emerged, challenging the status quo and offering users a fresh perspective on computing.
One such alternative that has garnered significant attention and acclaim is Nitrux Linux 3.5.0, a sleek, powerful, and user-friendly Linux distribution that promises to redefine the way we interact with our devices. With its focus on performance, security, and customization, Nitrux Linux presents a compelling case for those seeking to break free from the constraints of proprietary software and embrace the freedom and flexibility of open-source computing.
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Proposed Algorithms for UAV based Cloud Computing
1. Proposed algorithms for UAV based cloud computing
Ahmed Refaat Sobhy Abeer Twakol Khalil Mohamed M.Elfaham Atalla Hashad
Benha Faculty of Engineering, Benha Faculty of Engineering, Benha Faculty of Engineering, Arab Academy for Science
Department of Computer Engineering Department of Computer Engineering Department of Engineering basic & Technology & Maritime Transport
,,Benha University , Benha University Science , Benha University College of Engineering & Technology
Benha, Egypt Benha, Egypt Benha, Egypt Cairo, Egypt
ahmed_602air@hotmail.com abeer.twakol@bhit.bu.edu.eg Dr.mMostafa.elfaham@bhit.bu.edu.eg hashad@cairo.aast.edu
Abstract— In the last few years the fields of both UAV and
cloud computing has gained the interest of researchers.
UAV, which can be classified as flying ad-hoc network or
FANET plays an important role in both military and
civilian applications, also the cloud computing has gained
an important role in many applications such as data
processing and data preservation beside it allows users to
access all applications and get into data and files from
any device whenever they are, all of these benefits are
used with the visibility of internet, our research shows
also that the user can access without the use of the
internet by using military network instead of internet in
the military applications to gain more secure in the
network. This paper offers proposed algorithms for UAV
when equipped with cloud computing system in order to
work as a unique system in military applications.
I. INTRODUCTION
The wireless ad hoc networks consist of a collection of
wireless nodes that communicate over a common wireless
medium. Mobile ad hoc networks are gaining momentum
because they help realize network services for mobile users
in areas with no preexisting communications infrastructure
[1]. Ad hoc Networking enables independent wireless nodes,
each limited in transmission and processing power, to be as a
whole providing wider networking coverage and processing
capabilities .The nodes can also be connected to a fixed-
backbone network through a dedicated gateway device,
enabling IP networking services in areas where Internet
services are not available due to lack of the already exists
infrastructure. And due to the widely and variety usage of ad-
hoc networks in many fields such as complex military
systems as Unmanned Aerial Vehicles (UAVs), the
performance of these systems have to be more accurate,
which led us to add cloud computing to the infrastructure of
the UAVs in order to obtain high accuracy of these systems.
This field of research lead us to cover the power of cloud
computing by providing a perspective study on cloud
computing and sheds light on the ambiguous understanding
of cloud computing. Cloud computing is not just a service
being offered from a remote data center. It is a set of
approaches that can help organizations quickly, effectively
add and subtract resources in almost real time. Cloud
computing provides the means through which resources such
as computing power, computing infrastructure and
applications can be delivered to users as a service wherever
and whenever they need over the Internet[2].
Cloud computing can be used to overcome the limitations of
data centers. An enterprise data center is where servers and
storage are located, operated and managed. A functional data
center requires a lot of power, a lot of space, cooling,
maintenance and so on. Most of human activities such as
energy, lighting, telecommunications, Internet, transport,
urban traffic, banks, security systems, public health and
entertainment are controlled by data centers. People rely on
the functioning and availability of one or multiple data
centers. The process of adding and releasing resources in the
traditional data center cannot be done in an automated or
self- service manner, but in the cloud, users can request extra
resources on demand and also release them when they are no
longer needed. The fact that the cloud can easily expand and
contract is one of the main characteristics that attract users
and businesses to the cloud.
The main characteristics that cloud computing offers today
are cost, virtualization, reliability, security and maintenance,
but the validity of cloud became more dependable when it is
combined to the robotics as a cloud robotic system, which
takes the benefits of both systems cloud and robotics.
UAV which is a part of ad hoc network as it is classified as
flying ad hoc network (FANET) can be thought as a kind of
robotics because network robotic system refers to a group of
robotic devices that are connected via a wired and/or wireless
communication network [3].
Now a day the military application focuses in the important
of UAV in reconnaissance and attack roles in order to save
lives, time and money. However, by supplying UAV systems
with cloud computing this will streamline operations and
reducing manning, this leads to investigate in all the
challenges to equipped cloud computing in UAV system.
II. DESIGNING AN ALGORITHM FOR THE PROPOSED
SCENARIO
The algorithm implemented is divided into five main
parts in which any similar system to our proposed system
could be examined to show the system quality and
efficiency. The algorithm designed depends on the
communication between UAVs and UAVs with the
ground control station GCS , this lead us to introduce
arithmetic algorithm for packet transmission between
UAVs and the ground control station , also the mobility of
UAVs takes a part in our algorithm showing the velocity
and UAVs displacement , this part of the algorithm takes a
great consideration in our discussion for the movement of
International Journal of Computer Science and Information Security (IJCSIS),
Vol. 16, No. 2, February 2018
122 https://sites.google.com/site/ijcsis/
ISSN 1947-5500
2. UAVs which leads us in the algorithm for the system
connectivity and here we mean by the term system the
Unmanned Aerial System (UAS).The last main point in
our algorithm is stated for cloud computing algorithm
equipped with the UAV system since our scenario is based
upon UAV cloud computing system.
a. Designing an algorithm for communication between
UAVs
The communication algorithm designed for the proposed
scenario depends on the communication between UAVs and
between UAVs and the ground control station , this is done
by studying the wireless link between the transmitter and
receiver of UAVs and GCS. The algorithm depends on some
major parameters such as the aspect angle ( ) which is the
major process to define the radiation of antenna
with respect to as shown in Fig. 1., the horizontal
angle ( ) which can be determined as the angle located
between roll axis of transmitter and the Line of sight
(LOS) , vertical angle ( ) which is the angle between LOS
and the projection of the LOS onto the yaw plane of
[4].
Fig. 1. Position of UAVs during transmitting and receiving [4].
Also the algorithm depends on the power received by the
receiving antenna ( ), the input power of the transmitting
antenna ( ), the gain of the transmitting antenna ( ), the
gain of the receiving antenna ( ), the wave length ( ) and
the distance between the two UAVs (R).
From the above parameters we can calculate our first step in
the proposed algorithm by calculating the average power
( ) as follow:
……… (1)
The second step in the algorithm leads us to use the terms of
aspect angle in equation (1) as follow:
………… (2)
And by taking the algorithm in equation (2) for both sides
we get equation (3) as follow:
..(3)
The third step in the algorithm is to calculate the free space path
loss ( ) as follow:
…. (4)
……. (5)
.. (6)
The frequency in equation (6) represent the transmission frequency
and the term ( ) is related to the distance between the two
UAVs or between the UAV and the ground control station.
The fourth step in the algorithm is to calculate the total path loss
( ) depending on the free space path loss ( ), log normal
shadowing effect and the random variable (D) presenting
the received envelop of the fast fading signal .
……… (7)
The fifth step is by applying a condition to calculate the power
received, this condition is as follow:
…… (8)
Where is the standard deviation in and a can be represented
as .
The sixth step in the algorithm is to determine the probability
density function of the Ray Leigh distribution and by using
the random variable presenting the received envelop of the fast
fading signal (D) and the time average power of the received
signal .
…….. (9)
..(10)
Where A represent the peak amplitude of LOS signal component
and Represent the zero –order modified Bessel function of
the first kind.
….. (11)
The last step in the communication algorithm is by defining the
ratio as the ratio of Rician factor, this factor can be
defined as the factor measures the link quality and lead us to
know that this ratio is a ratio between the power of LOS and the
power of (NLOS), the main aspect of this factor is that the
increase of lead to the clear of the link with less fading. This
lead us to make an important condition in the algorithm which is
before calculating the average power in the Rician fading the
factor must be larger than or equal to the ratio of the power of
LOS and the power of (NLOS).
International Journal of Computer Science and Information Security (IJCSIS),
Vol. 16, No. 2, February 2018
123 https://sites.google.com/site/ijcsis/
ISSN 1947-5500
3. …. (12)
And by replacing ,
in equation (10), the final form of the
arithmetic algorithm can be written in the form of:
… (13)
Fig. 2. Relation between free space path loss and distance.
Fig.2 shows the relation between free space path loss and the
distance between two UAVs when applying the algorithm
using Matlab program.
b. Arithmetic algorithm for Packet transmission time
The arithmetic algorithm for packet transmission depends
upon main points according to IEEE 802.11-1999 which can
be listed as the Short inter –Frame Space (SIFS), Distributed
Coordination Function inter –Frame Space (DIFS) which is
the fundamental Mac technique of IEEE 802.11 based wlan
standard, back off time (Ack Time).All the listed parameters
accumulate together forming the main arithmetic algorithm
for packet transmission as follow:
..(14)
Fig. 3. DIFS &SIFS [5].
Fig. 4. Time diagram for packet transmission [5].
The main issue for this equation is to ensure packet reception
and avoid the collision between packets and this is done by
using DIFS &SIFS while the time required for DIFS &SIFS
are based upon the physical layer. In our scenario we use
direct sequence spread spectrum DSSS parameters as follow:
Short inter frame space (SIFS) is 20, the time slot is
40, Distributed coordination function inter frame space
(DIFS) is equal to the following equation.
…….. (15)
And the back off time can be calculated as
…… (16)
Fig. 5. Back off Time [5].
According to tables 1, 2, 3 and 4 taken from our implemented
scenario and by using equation (14) we calculate the total time for
packet transmission.
Table 1. Medium access control header
Table 2. Medium access control data unit
Table 3. ACK frame
Table 4. Physical layer data frame
International Journal of Computer Science and Information Security (IJCSIS),
Vol. 16, No. 2, February 2018
124 https://sites.google.com/site/ijcsis/
ISSN 1947-5500
4. ……… (17)
And by applying the algorithm implemented using Matlab
program as shown in figures 6, 7 and 8 we can calculate the
total time for packet transmission and data sent.
Fig. 6. applying the algorithm by matlab
Fig. 7. Total time for packet transmission
Fig. 8. Total time for Data sent
c. Designing an algorithm for the Mobility
Due to the classification of UAV as a part of ad-hoc network
which characterized by high mobility, our algorithm depends
upon some aspects such as the node velocity , tuning
parameter used to vary randomness , the mean value of
as n goes to which is represented by and a random
variable .The main important issue is that each UAV
is initialized with speed and direction and assuming running
fixed intervals of time leads the UAVs to update their speed
and direction.
Fig. 9. Gauss-Markov Mobility Model
In the algorithm implemented the values of speed and direction at
instance of time are calculated based on the values of speed
and direction at instance and random variable as
shown in Fig. 9, which represent the Gauss-Markov Mobility
Model. From all the above parameters we can calculate the node
velocity from equation (18).
* …. (18)
But our algorithm will convert equation (18) into three dependable
aspects in which we can say that if these are considered as UAVs
or not as follow:
The first aspect: If ( = 0)
This mean that we will obtain random motion and according to this
equation (18) become as follow
……. (19)
The second aspect: If ( = 1)
This mean that we will obtain linear motion and according to this
equation (18) become as follow
………… (20)
The third aspect: If (0 < < 1)
This mean that we will obtain intermediate level of randomness
which represents the UAVs, so if is input by a variable greater
than zero and less than one this mean we are going to represent
UAV motion and this is shown in Fig. 11.
The last point in this algorithm is to compute the displacement of a
node with respect to the node velocity as
……. (21)
This equation helps us on studying UAV movement.
Fig.10. Random way point Mobility
Fig.11. Velocity representation for UAVs
International Journal of Computer Science and Information Security (IJCSIS),
Vol. 16, No. 2, February 2018
125 https://sites.google.com/site/ijcsis/
ISSN 1947-5500
5. d. Designing an algorithm for UAV connectivity
Designing an algorithm for UAV connectivity lead us to
represent the survivability of UAVs network, the most
important issue in the world of UAV is how to maintain the
uplink and down link between the UAV and its base station
always up (connected), and we can call this survivability of
UAVs network. Our algorithm is based upon some
assumption depending on the proposed scenario as follow:
1) The status of the node in this network can be damaged
or undamaged only.
2) The connection between two nodes is wireless based upon
mobile radio communication.
3) Only one node is destroyed or removed every time and
this node is the most important one in the network, which
means the worst case occurs every time.
Our algorithm is based upon the estimation of network
connectivity in a complete destruction process, meaning that
the network connectivity is summed with the node being
removed one by one until the network becomes disconnected.
Assuming the number of nodes in a given is n, the
survivability measure (SM) and the connectivity measure
(CM) for this network is defined as:
…….. (22)
Where CM (0) is the connectivity measure of network F, CM
(k) is the connectivity measure of network which was
produced by removing the most important node from the
network .
Also k = 1, 2... m-1 , and m is the number of the nodes
which have to be removed before the network becomes
totally disconnected.
The connectivity measure of network is given by:
…… (23)
Where is the node connectivity between i and j in
the network , (n-k) is the number of nodes in network
.
Fig.12. network
The node connectivity can be defined as:-
………….. (24)
Where is the number of the independent paths between nodes
and to be more accurate the independent paths means
that there is no common node between them [9].
is the number of jumps along the t-th independent path
between nodes , And as shown in Fig.12, network
has three independent paths between nodes , thus we
have .
Path 1: i - j can be thought as
Path 2: i - e – j can be thought as
Path 3: i – a – b – c – d – j can be thought as
, and from equation (24) we get
The node connectivity (NC) between node i and j depends not
only on the number of the independent paths between them but
also on the jumps of the path if there is a direct link between
nodes i and j (as path 1), its contribution to is 1, it
also means that the survivability of this link is 100%(it is
assumed that the link cannot be damaged) on the other hand the
contribution of the path 2 or path 3 to is less than 1
because it is possible to be destroyed. From all the above we can
say that the more jumps of the path, the less the contribution to
the .
e. Cloud model
Our cloud model as we mentioned before is a simple form of
private cloud depending on the military network instead of the
internet, the cloud designed depends on a multi-server system
with a queuing model. The model consists of a single entry point
ES (Entering Server) which act as a load balancer with a main
function of forwarding the user requests (military unit) to one of
the processing server nodes , where i = 1………..m as
shown in Fig.13, while the load balancer is represented by
M/M/1 queue with an arrival and service rate modeled λ and L
respectively where λ˂ L [6]. And deeply the node is a core
node or a processor which represent the physical computational
resources were the services are computed, the is modeled
as M/M/m queuing system and has a service rate μ, so we can
say that .
Fig. 13. Cloud computing paradigm.
International Journal of Computer Science and Information Security (IJCSIS),
Vol. 16, No. 2, February 2018
126 https://sites.google.com/site/ijcsis/
ISSN 1947-5500
6. Each node connect Data server DS with a probability δ,
which represent directories and Data bases which access to
the secondary memory during the service in the cloud model,
it is noted that DS is modeled by M/M/1 queue with
exponential arrival and service rates of δ γ and D
respectively [6].
The output server of the cloud architecture OS is represented
as a node that transmits the response data over the military
network back to the military unit or in other word the user
who made the request, here we can name the military unit or
the user as a client server (CS) who sends requests in an
exponential distribution with parameter λ to the entering
server (ES) and both OS and CS are modeled by M/M/1
queue. Our main goal is to compute the response time (T) of
our cloud model as follow:
…… (25)
Where representing the response time of the Entering
Server (ES) which can be calculated as [7]:
……………… (26)
Where λ is the arrival rate and L is the service of ES,
represent the response time of the process servicing node and
can be calculated as [8]:
………… (27)
Where is the number of processing elements, is the
arrival and is the service
rates of each processing element while the term
represent Erlang's C formula [7], which gives the probability
of a new client joining the M/M/m queue and can be written
in the following form:
……….. (28)
, were .
While the response time of Data base server which the
requests are sent to with a probability δ can be calculated in
the form of:
………………… (29)
Where is the arrival rate to DS, represent the output
probability as shown in Fig.14 and D is the service rate.
Fig. 14. Model of the cloud architecture [6].
We have to notice here the arrival rate at the output server (OS)
as the sum of the arrival rates of the two cross point branches
entering the sum point represented in Fig.14.
………… (30)
And to complete equation (25) we have to compute
and , the which represent the response time of the
output server (OS) can be computed as:
…………… (31)
Where is the service rate of the output server, and deeply
O is the average band width speed (bytes per second) of the OS
and F is the averaged size of the data responses of the system.
And finally is the response time of the client server (CS) can
be calculated in the form of:
……………… (32)
Were C/F is the service rate, C represent the average band width
speed of CS in bytes per second and F is the average size in bytes
of the received files.
III. RESULTS & CONCLUSION
In this paper we made a steps algorithm consists of five steps
as shown in section two, starting from designing an algorithm for
the communication between UAVs showing the effect of
wireless link between the transmitter and the receiver which lead
us to calculate the average power and calculate the free space
path loss, that lead us to but the final form of the first algorithm
for the communication between the UAVs, this is shown in
equation (13) which is represented in Fig.2 as a relation between
the distance and free space path loss for the UAVs, this relation
shows a direct proportion between the distance of the UAVs and
the free space path loss.
International Journal of Computer Science and Information Security (IJCSIS),
Vol. 16, No. 2, February 2018
127 https://sites.google.com/site/ijcsis/
ISSN 1947-5500
7. The second step is designing an algorithm for packet
transmission time between the UAVs resulting to show the
total time for packet transmission as shown in Fig.7, showing
the total time for data sent as shown in Fig.8, we found from
this algorithm that the amount of data and the type of data
effect the time needed for the transmission and this will lead
us in our future work to study its effect on both transmission
control protocol and user data gram protocol.
The third step is designing an algorithm for UAVs mobility
which lead us to keep in mind that tuning parameter α must
be vary between 0,1 as 0˂α˂1 to obtain intermediate level of
randomness which is the closest representation for the UAVs
as shown in Fig.11.
The fourth step is designing an algorithm for UAV
connectivity which leads us to equation (24), from it we can
decide if the network is good connectivity or not by the mean
of survivability.
The last step is for the cloud model by calculating the
response time of the cloud in our system to show the real
time for data to be transmitted.
These five steps results in an dependable algorithm for our
system and also this algorithm can be used as a guide for any
similar system.
References
[1] A. Faragó, Á. Szentesi, and B. Szviatovszki, “Inverse
Optimization in High Speed Networks,” Discrete Applied
Mathematics, Special Issue on Combinatorial and Algorithmic
Aspects of Telecommunications, in press.
[2] Hurwitz J, Bloor R, Kaufman M, Halper F. Cloud computing for
dummies. Indianapolis, Indiana: Wiley Publishing, Inc.; 2010.
[3] IEEE Society of Robotics and Automation’s Technical
Committee on Networked Robots. [Online]. Available: http://www-
users.cs.umn.edu/_isler/tc/.
[4] Abdel Ilah Alshbatat , Liang Dong" Performance Analysis of
Mobile Ad Hoc Unmanned Aerial Vehicle Communication
Networks with Directional Antennas" International Journal of
Aerospace Engineering, Volume 2010, Article ID 874586, 14
pages, December 2010.
[5]https://www.google.com.eg/imgres?imgurl=http://www.rfwireles
s world.com/images/WLAN-SIFS-PIFS-DIFS-
EIFS.jpg&imgrefurl=http://www.rfwireless-
world.com/Terminology/WLAN-SIFS-vs-PIFS-vs-DIFS-vs-EIFS-
vs
AIFS.html&h=186&w=709&tbnid=pcdBJr9gQM0aTM:&tbnh=55
&tbnw=210&usg=__GkjhCVSxXTZYryuO9Mawjzg2hJc=&vet=1
0ahUKEwiX7ZyKpYvVAhVFCBoKHdgeD5kQ9QEIJDAA..i&do
cid=_OLTBN7oNJXEmM&sa=X&sqi=2&ved=0ahUKEwiX7ZyK
pYvVAhVFCBoKHdgeD5kQ9QEIJDAA.
[6] Jordi Vilaplana ,Francesc Solsona , Ivan Teixidó , Jordi Mateo ,
Francesc Abella , Josep Rius"A queuing theory model for cloud
computing"springers,9 April 2014.
[7] Kleinrock L (1975) Queueing systems: theory, vol 1. Wiley-
Interscience, New York.
[8] Barbeau M, Kranakis E (2007) Principles of ad-hoc networking.
Wiley, New York.
[9] Haizhuang Kang,Clive Butler,Qingping Yang" A NEW
SURVIVABILITY MEASURE FOR MILITARY COMMUNICATION
NETWORKS" IEEE,1998.
International Journal of Computer Science and Information Security (IJCSIS),
Vol. 16, No. 2, February 2018
128 https://sites.google.com/site/ijcsis/
ISSN 1947-5500