An Efficient Resource Utilization Scheme for Video Transmission over Wireless...ijsrd.com
In this paper we propose an energy efficient video transmission strategy for wireless sensor networks, which combines wavelet-based image decomposition and cooperative communication. The proposed scheme uses the selective decode and forward (SDF) cooperation, so that a relay node collaborates with the source by forwarding only a lower-resolution version of the original video, obtained via discrete wavelet transform (DWT). We show that the proposed SDF-DWT strategy is more energy efficient than non-cooperative single-hop and multi-hop, also outperforming the regular SDF scheme. In addition, we show that our method can achieve the energy efficiency of incremental DF (IDF), without the need of a feedback channel.
This document describes the implementation of a reliable and scalable multicast model called RSM2. RSM2 uses a flat architecture with active server-based local recovery using Dynamics Managers. It employs techniques like proactive routing, minimum cost path algorithm, combo-casting, NACK-based acknowledgment, buffer management, and an optimized flooding algorithm to provide reliability, scalability and efficient delivery of packets in one-to-many, many-to-many, and all-to-all communication environments. RSM2 is designed to overcome limitations of existing hierarchical models like RMTP and provide an improvement for reliable multicasting.
Achieving Optimum Value of k in a K-fold Multicast Network with Buffer using ...cscpconf
Multicast network is widely used for effective communication, transmission and performance
optimizations of a network. In this paper, a new model has been developed to determine a
suitable value of the fold k of a k-fold multicast network under different traffic loads under
Poisson traffic with finite queue at each node. We have derived stationary distribution for the
network states and then derived expressions for the network throughput and the blocking
probability of the network. It has been found in this research work that the network throughput
increases very fast as we increase the fold number. However, at a certain value of the fold, the
blocking probability ceases to increase and it remains constant. We have also observed that as
the offered traffic is increased, the throughput also increases. Moreover, the system parameter k
is increased, the blocking probability decreases. However, after an optimum value of k, the
blocking probability remains constant for a particular value of the offered traffic. In fact, in this
paper, by evaluating the performance of a k-fold multicast network, our developed model improves the performance of a multicast network.
This document presents an optimization framework for associating device-to-device (D2D) communication links with base stations (BSs) in a way that balances network load and reduces signaling overhead. The framework formulates integer linear programs to associate each D2D link, which connects users in different BS coverage areas, with a single BS. This aims to balance load across BSs by distributing D2D links, while reducing signaling by avoiding multi-BS coordination for D2D links. Simulation results show the proposed schemes provide significant gains in load balancing and efficient resource block allocation for orchestrating D2D links.
Performance Analysis of Distributed Spatial Multiplexing with Multi-hop Ampli...IJCSEA Journal
This paper describes a frame work investigating the performance of distributed spatial multiplexing (DSM) in cooperative multi-hop cellular networks. The cooperative communication in cellular networks gives us leverage to get the inherent advantages of its random relay locations and the direction of the data flow. However, traditional centralized relay selection needs considerable overhead and signaling. In our proposed work, threshold based relay selection is adopted based on the received signal strength (RSS) and Signal to Noise Ratio (SNR). The best relay chosen will transmit jointly with source using Amplify and forward (AF) protocol. The evaluation is performed with bit error rate (BER) and energy per bit for distributed spatial multiplexing scheme with multi-hop networking.
1) The document proposes a non-cooperative resource allocation game algorithm using Adaptive Modulation and Coding (AMC) schemes in multi-cell OFDMA systems.
2) The algorithm aims to maximize utility while reducing co-channel interference and improving power efficiency through AMC.
3) Simulation results show the proposed algorithm achieves maximum capacity within AMC levels and reduces system power compared to an algorithm without AMC.
Distributed Spatial Modulation based Cooperative Diversity Schemeijwmn
: In this paper, a distributed spatial modulation based cooperative diversity scheme for relay
wireless networks is proposed. Where, the space-time block code is exploited to integrate with distributed
spatial modulation. Therefore, the interested transmission scheme achieves high diversity gain. By using
Monte-Carlo simulation based on computer, we showed that our proposed transmission scheme outperforms
state-of-the-art cooperative relaying schemes in terms bit error rate (BER) performance.
1) The document presents a mathematical model for optimizing the value of k in a k-fold multicast network under different traffic loads.
2) The model derives the stationary distribution of network states and develops expressions for throughput and blocking probability.
3) Results show that network throughput increases significantly as k increases up to a point, after which throughput levels off, and blocking probability levels off after a certain k value as well. An optimum k value minimizes blocking probability for a given traffic load.
An Efficient Resource Utilization Scheme for Video Transmission over Wireless...ijsrd.com
In this paper we propose an energy efficient video transmission strategy for wireless sensor networks, which combines wavelet-based image decomposition and cooperative communication. The proposed scheme uses the selective decode and forward (SDF) cooperation, so that a relay node collaborates with the source by forwarding only a lower-resolution version of the original video, obtained via discrete wavelet transform (DWT). We show that the proposed SDF-DWT strategy is more energy efficient than non-cooperative single-hop and multi-hop, also outperforming the regular SDF scheme. In addition, we show that our method can achieve the energy efficiency of incremental DF (IDF), without the need of a feedback channel.
This document describes the implementation of a reliable and scalable multicast model called RSM2. RSM2 uses a flat architecture with active server-based local recovery using Dynamics Managers. It employs techniques like proactive routing, minimum cost path algorithm, combo-casting, NACK-based acknowledgment, buffer management, and an optimized flooding algorithm to provide reliability, scalability and efficient delivery of packets in one-to-many, many-to-many, and all-to-all communication environments. RSM2 is designed to overcome limitations of existing hierarchical models like RMTP and provide an improvement for reliable multicasting.
Achieving Optimum Value of k in a K-fold Multicast Network with Buffer using ...cscpconf
Multicast network is widely used for effective communication, transmission and performance
optimizations of a network. In this paper, a new model has been developed to determine a
suitable value of the fold k of a k-fold multicast network under different traffic loads under
Poisson traffic with finite queue at each node. We have derived stationary distribution for the
network states and then derived expressions for the network throughput and the blocking
probability of the network. It has been found in this research work that the network throughput
increases very fast as we increase the fold number. However, at a certain value of the fold, the
blocking probability ceases to increase and it remains constant. We have also observed that as
the offered traffic is increased, the throughput also increases. Moreover, the system parameter k
is increased, the blocking probability decreases. However, after an optimum value of k, the
blocking probability remains constant for a particular value of the offered traffic. In fact, in this
paper, by evaluating the performance of a k-fold multicast network, our developed model improves the performance of a multicast network.
This document presents an optimization framework for associating device-to-device (D2D) communication links with base stations (BSs) in a way that balances network load and reduces signaling overhead. The framework formulates integer linear programs to associate each D2D link, which connects users in different BS coverage areas, with a single BS. This aims to balance load across BSs by distributing D2D links, while reducing signaling by avoiding multi-BS coordination for D2D links. Simulation results show the proposed schemes provide significant gains in load balancing and efficient resource block allocation for orchestrating D2D links.
Performance Analysis of Distributed Spatial Multiplexing with Multi-hop Ampli...IJCSEA Journal
This paper describes a frame work investigating the performance of distributed spatial multiplexing (DSM) in cooperative multi-hop cellular networks. The cooperative communication in cellular networks gives us leverage to get the inherent advantages of its random relay locations and the direction of the data flow. However, traditional centralized relay selection needs considerable overhead and signaling. In our proposed work, threshold based relay selection is adopted based on the received signal strength (RSS) and Signal to Noise Ratio (SNR). The best relay chosen will transmit jointly with source using Amplify and forward (AF) protocol. The evaluation is performed with bit error rate (BER) and energy per bit for distributed spatial multiplexing scheme with multi-hop networking.
1) The document proposes a non-cooperative resource allocation game algorithm using Adaptive Modulation and Coding (AMC) schemes in multi-cell OFDMA systems.
2) The algorithm aims to maximize utility while reducing co-channel interference and improving power efficiency through AMC.
3) Simulation results show the proposed algorithm achieves maximum capacity within AMC levels and reduces system power compared to an algorithm without AMC.
Distributed Spatial Modulation based Cooperative Diversity Schemeijwmn
: In this paper, a distributed spatial modulation based cooperative diversity scheme for relay
wireless networks is proposed. Where, the space-time block code is exploited to integrate with distributed
spatial modulation. Therefore, the interested transmission scheme achieves high diversity gain. By using
Monte-Carlo simulation based on computer, we showed that our proposed transmission scheme outperforms
state-of-the-art cooperative relaying schemes in terms bit error rate (BER) performance.
1) The document presents a mathematical model for optimizing the value of k in a k-fold multicast network under different traffic loads.
2) The model derives the stationary distribution of network states and develops expressions for throughput and blocking probability.
3) Results show that network throughput increases significantly as k increases up to a point, after which throughput levels off, and blocking probability levels off after a certain k value as well. An optimum k value minimizes blocking probability for a given traffic load.
Flexible channel allocation using best Secondary user detection algorithmijsrd.com
This document proposes a flexible channel allocation algorithm for cooperative cognitive radio networks using secondary user detection. It introduces Flexible Channel Cooperation (FLEC) which allows secondary users to optimize their use of resources including channels and time slots from primary users. The document develops efficient resource allocation algorithms for FLEC, including a distributed bargaining algorithm and centralized heuristic algorithm. It evaluates the performance of FLEC and shows it provides throughput improvements of 20-60% over conventional identical channel cooperation. A centralized heuristic algorithm achieves near-optimal performance with only 5% loss compared to the optimal centralized algorithm, providing a good tradeoff between performance and complexity.
Multiple Binary Images Watermarking in Spatial and Frequency Domainssipij
Editing, reproduction and distribution of the digital multimedia are becoming extremely easier and faster with the existence of the internet and the availability of pervasive and powerful multimedia tools. Digital watermarking has emerged as a possible method to tackle these issues. This paper proposes a scheme using which more data can be inserted into an image in different domains using different techniques. This increases the embedding capacity. Using the proposed scheme 24 binary images can be embedded in the DCT domain and 12 binary images can be embedded in the spatial domain using LSB substitution technique in a single RGB image. The proposed scheme also provides an extra level of security to the watermark image by scrambling the image before embedding it into the host image. Experimental results show that the proposed watermarking method results in almost invisible difference between the watermarked image and the original image and is also robust against various image processing attacks.
A genetic algorithm for constructing broadcast trees with cost and delay cons...IJCNCJournal
We refer to the problem of constructing broadcast trees with cost and delay constraints in the networks as a delay-constrained minimum spanning tree problem in directed networks. Hence it is necessary determining a spanning tree of minimal cost to connect the source node to all nodes subject to delay constraints on broadcast routing. In this paper, we proposed a genetic algorithm for solving broadcast routing by finding the low-cost broadcast tree with minimum cost and delay constraints. In this research we present a genetic algorithm to find the broadcast routing tree of a given network in terms of its links. The algorithm uses the connection matrix of the given network to find the spanning trees and considers the weights of the links to obtain the minimum spanning tree. Our proposed algorithm is able to find a better solution, fast convergence speed and high reliability. The scalability and the performance of the algorithm with increasing number of network nodes are also encouraging.
This document proposes an Adaptive Resolution Enhancement Algorithm (AREA) using an Edge Targeted Filter (ETF) and Dual Tree Complex Wavelet Transform (DTCWT) to enhance the resolution and image quality of low-quality, low-resolution images. The ETF first detects edges in an input image and generates a mask. It then focuses on improving edge reconstruction. The output is input to DTCWT, which analyzes subband coefficients to detect flaws and interpolates coefficients to enhance spectral resolution. The inverse DTCWT produces a spatially enhanced output image with improved resolution up to 17% compared to existing techniques. Simulation results demonstrate the effectiveness of the proposed algorithm.
Location updation for energy efficient geographic routing in maneteSAT Journals
Abstract Routing in mobile ad-hoc networks with a large number of nodes or with high mobility is a very difficult task and energy conservation is very important for mobile devices. In geographic routing each node require information about neighbors to forward data packets. Earlier periodic updations are used for location updation but it consumes much amount of node energy and bandwidth utilized for unnecessary updation where there is no changes in the location information. In this paper adaptive position update used with less energy consumption and utilize the bandwidth for location updation only when there is a change in the network. The GPSR protocol used for packet forwarding in both greedy forwarding and perimeter forwarding. This adaptive updation utilize only less amount of node energy than other beaconing scheme. Index Terms:Routing protocols, Beacon updation scheme, Wireless communication, Greedy forwarding, Adaptive position updation.
In a Mobile Ad hoc Network (MANET), due to mobility, limited battery power and poor features of nodes,
network partitioning and nodes disconnecting occur frequently. To improve data availability, database
systems create multiple copies of each data object and allocate them on different nodes. This paper
proposes Automated Re-allocator of Replicas Over MANET (ARROM), that addresses these issues.
ARROM reduces the average response time of requests between clients and database servers by
reallocating replicas frequently. In addition, ARROM increases the average throughput in the network. Our
performance study indicates that ARROM improves average response time and average network
throughput in MANET as compared to resent existing scheme.
THRESHOLD BASED VM PLACEMENT TECHNIQUE FOR LOAD BALANCED RESOURCE PROVISIONIN...IJCNCJournal
The unbalancing load issue is a multi-variation, multi-imperative issue that corrupts the execution and productivity of processing assets. Workload adjusting methods give solutions of load unbalancing circumstances for two bothersome aspects over-burdening and under-stacking. Cloud computing utilizes planning and workload balancing for a virtualized environment, resource partaking in cloud foundation. These two factors must be handled in an improved way in cloud computing to accomplish ideal resource sharing. Henceforth, there requires productive resource, asset reservation for guaranteeing load advancement in the cloud. This work aims to present an incorporated resource, asset reservation, and workload adjusting calculation for effective cloud provisioning. The strategy develops a Priority-based Resource Scheduling Model to acquire the resource, asset reservation with threshold-based load balancing for improving the proficiency in cloud framework. Extending utilization of Virtual Machines through the suitable and sensible outstanding task at hand modifying is then practiced by intensely picking a job from submitting jobs using Priority-based Resource Scheduling Model to acquire resource asset reservation. Experimental evaluations represent, the proposed scheme gives better results by reducing execution time, with minimum resource cost and improved resource utilization in dynamic resource provisioning conditions.
OPTIMAL POWER ALLOCATION FOR MULTIPLE ACCESS CHANNELijwmn
This paper considers the problem of power allocation between the two senders in the multiple access channel. Two power allocation criteria are developed. In particular, in the first criterion, the total available power is allocated between the two users such that the two users have the same achievable rate.
In addition, the second criterion allocates the total available power such that the sum rate is maximized. In addition, many numerical examples are shown to show the value of power allocation and also to compare between the proposed criteria
This document discusses a cooperative transmission protocol for wireless sensor networks. The protocol aims to improve energy efficiency and transmission reliability. It establishes cooperative clusters during data transmission where neighboring nodes help each other. The cluster head recruits nodes to assist in communication. The protocol is analyzed based on factors like capacity, end-to-end robustness to packet loss, and the tradeoff between energy consumption and error rate. Simulation results show the protocol increases transmission reliability and achieves a longer network lifetime compared to non-cooperative schemes.
DIGITAL WATERMARKING TECHNIQUE BASED ON MULTI-RESOLUTION CURVELET TRANSFORMijfcstjournal
In this paper an efficient & robust non-blind watermarking technique based on multi-resolution geometric analysis named curvelet transform is proposed. Curvelet transform represent edges along curve much more efficiently than the wavelet transform and other traditional transforms. The proposed algorithm of embedding watermark in different scales in curvelet domain is implemented and the results are compared
using proper metric. The visual quality of watermarked image, efficiency of data hiding and the quality of extracted watermark of curvelet domain embedding techniques with wavelet Domain at different number of decomposition levels are compared. Experimental results show that embedding in curvelet domain yields best visual quality in watermarked image, the quality of extracted watermark, robustness of the watermark and the data hiding efficiency.
Mitigating Link Failures & Implementing Security Mechanism in Multipath Flows...Eswar Publications
The transmission of a traffic flows with a certain bandwidth demand over a single network path is either not possible or not cost-effective. In these cases, it is veritably periodic usable to improve focus the network's bandwidth appliance by breaking the traffic flow upon multiple qualified paths. Using multiple paths for the equivalent traffic flow increases the certainty of the network, it absorbs deluxe forwarding resources from the
network nodes and also it overcomes link failure provide security. In this paper, we illustrate several problems related to splitting a traffic flow over multiple paths while minimizing the absorption of forwarding resources mitigates failures and implementing security.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
This document summarizes a research paper that proposes a framework for continuous query processing for mobile users in peer-to-peer environments without centralized servers. The framework allows users to specify quality of service parameters for query answers and collaborate with peers to continuously maintain answers. Key aspects of the framework include allowing users to specify desired levels of coverage and accuracy for query answers, and designing a continuous answer maintenance scheme where users collaborate with peers to refine answers if local caches do not satisfy quality requirements. Experimental results showed the framework was efficient and scalable while providing a tradeoff between communication overhead and answer quality.
IMPROVING SCHEDULING OF DATA TRANSMISSION IN TDMA SYSTEMScsandit
In an era where communication has a most important role in modern societies, designing efficient
algorithms for data transmission is of the outmost importance. TDMA is a technology used in many
communication systems such as satellites and cell phones. In order to transmit data in such systems we
need to cluster them in packages. To achieve a faster transmission we are allowed to preempt the
transmission of any packet in order to resume at a later time. Such preemptions though come with a delay
in order to setup for the next transmission. In this paper we propose an algorithm which yields improved
transmission scheduling. This algorithm we call MGA. We have proven an approximation ratio for MGA
and ran experiments to establish that it works even better in practice. In order to conclude that MGA will
be a very helpful tool in constructing an improved schedule for packet routing using preemtion with a setup
cost, we compare its results to two other efficient algorithms designed by researchers in the past.
A NURBS-optimized dRRM solution in a mono-channel condition for IEEE 802.11 e...IJECEIAES
This document describes a NURBS-optimized dynamic radio resource management (dRRM) solution for IEEE 802.11 enterprise WLAN networks called N-WLCx. The authors present their original dRRM solution called WLCx, which uses a novel per-beam coverage representation approach. To reduce the high processing time of WLCx, they developed an optimization based on NURBS (Non-Uniform Rational B-Spline) surfaces. Simulation results show N-WLCx achieves a 92.58% reduction in processing time compared to the basic WLCx solution. The authors conclude N-WLCx optimization could be extended to enhance other vendors' and researchers' RRM solutions for improved efficiency
Performance Analysis of Enhanced Opportunistic Minimum Cost Routingin Mobile ...IJERA Editor
Mobile Ad-Hoc Network (MANET) is a collection of wireless mobile nodes forming a temporary network with
infrastructure less environment to establish a data transmission between nodes within the network. A routing
protocol is used to discover routes between nodes. In this paper, we study the three existing routing protocols
namely AODV, DSDV and DSR to analyze theirperformance based on set of parameters.AODV and DSR
deliver almost all the packets compared to DSDV. Hence we try to modify the AODVprotocol and use in the
cooperative transmission.
In this paper, we study the cooperative transmission at the network layer and cooperative diversity at the
physical layer as a joint optimization of the transmission power in a Mobile Ad-Hoc Network (MANET) with
static channel. However due to variable wireless channels static routing is suboptimal. Proposed protocol
proactively selects forwarding nodes that work cooperatively forwarding the packet towards the destination.
Cooperative transmission side diversity helps in reducing interference. Diversity can be achieved at the physical
layer by coordinating the multiple nodes. Nodes are equipped with Omni-directional antenna and take the
advantages of transmission side diversity to achieve energy saving, under the assumption that channel gains are
available at the transmitters.
The proposed Opportunistic Minimum Cost Cooperative Transmission Shortest Path (OMCTSP) algorithms
select the best optimum route with minimum cost in terms of energy, number of hops, available bandwidth, link
quality (SNR) and outage probability. As the network becomes larger, finding optimal routes becomes
computationally intractable as the complexity of the dynamic programming (DP) approach increases as o (22n)
where n is the number of nodes in the networks. Hence we develop two suboptimal algorithms have complexity
of o (n2) perform as same as optimal algorithm. Also developthe Opportunistic Cooperative Routing in MANET
(O_CORMAN), which is a network layer opportunistic routing scheme for mobile ad hoc networks. Nodes in
the network use the components proactive routing protocol, forwarder list update and local re-transmission. We
evaluate the performance using NS 2.32 simulator there is significant performance improvement with respect to
energy, throughput packet delivery, and delay compared with Modified AODV (OMCTSP).
The Coexistence of Device -to- Device (D2D) Communication under Heterogeneous...amal algedir
This document discusses device-to-device (D2D) communication in heterogeneous networks (HetNets). It contains 3 key contributions:
1. Analyzing whether D2D communication can improve throughput in HetNets when small cells reuse the same spectrum as macro cells. A sequential max search algorithm is proposed for resource allocation.
2. Proposing ways to enhance energy efficiency in D2D-powered HetNets through dynamic mode selection, resource allocation, and power control. Both dedicated and reuse modes of D2D communication are considered.
3. Developing a stochastic analytical model to quantify the impact of LTE scheduler type on D2D communication in HetNets.
IJCER (www.ijceronline.com) International Journal of computational Engineerin...ijceronline
Call for paper 2012, hard copy of Certificate, research paper publishing, where to publish research paper,
journal publishing, how to publish research paper, Call For research paper, international journal, publishing a paper, IJCER, journal of science and technology, how to get a research paper published, publishing a paper, publishing of journal, publishing of research paper, research and review articles, IJCER Journal, How to publish your research paper, publish research paper, open access engineering journal, Engineering journal, Mathematics journal, Physics journal, Chemistry journal, Computer Engineering, Computer Science journal, how to submit your paper, peer review journal, indexed journal, research and review articles, engineering journal, www.ijceronline.com, research journals,
yahoo journals, bing journals, International Journal of Computational Engineering Research, Google journals, hard copy of Certificate,
journal of engineering, online Submission
IJCER (www.ijceronline.com) International Journal of computational Engineerin...ijceronline
This document summarizes a study that evaluates and compares the performance of two routing protocols (DSDV and DSR) in mobile ad hoc networks using network simulation. It finds that DSDV has shorter delays but higher routing load as network size increases, making it unsuitable for large, dynamic networks. DSR has moderate routing load and longer delays, making it better for medium-sized networks without high delay requirements. The study uses ns-2 simulation with varying network sizes from 10 to 50 nodes to measure metrics like end-to-end delay, jitter, and normalized routing load under different traffic patterns.
Device-to-device (D2D) communications underlaying a cellular infrastructure has been proposed as a means of taking advantage of the physical proximity of communicating devices, increasing resource utilization, and improving cellular coverage. Relative to the traditional cellular methods, there is a need to design new peer discovery methods, physical layer procedures, and radio resource management algorithms that help realize the potential article we use the 3GPP Long Term Evolution system as a baseline for D2D design, review some of the key design challenges, and propose solution approaches that allow cellular devices and D2D pairs to share spectrum resources and thereby increase the spectrum and energy efficiency of traditional cellular networks. Sim- ulation results illustrate the viability of the proposed design.
International Journal of Engineering Research and Development (IJERD)IJERD Editor
journal publishing, how to publish research paper, Call For research paper, international journal, publishing a paper, IJERD, journal of science and technology, how to get a research paper published, publishing a paper, publishing of journal, publishing of research paper, reserach and review articles, IJERD Journal, How to publish your research paper, publish research paper, open access engineering journal, Engineering journal, Mathemetics journal, Physics journal, Chemistry journal, Computer Engineering, Computer Science journal, how to submit your paper, peer reviw journal, indexed journal, reserach and review articles, engineering journal, www.ijerd.com, research journals,
yahoo journals, bing journals, International Journal of Engineering Research and Development, google journals, hard copy of journal
Flexible channel allocation using best Secondary user detection algorithmijsrd.com
This document proposes a flexible channel allocation algorithm for cooperative cognitive radio networks using secondary user detection. It introduces Flexible Channel Cooperation (FLEC) which allows secondary users to optimize their use of resources including channels and time slots from primary users. The document develops efficient resource allocation algorithms for FLEC, including a distributed bargaining algorithm and centralized heuristic algorithm. It evaluates the performance of FLEC and shows it provides throughput improvements of 20-60% over conventional identical channel cooperation. A centralized heuristic algorithm achieves near-optimal performance with only 5% loss compared to the optimal centralized algorithm, providing a good tradeoff between performance and complexity.
Multiple Binary Images Watermarking in Spatial and Frequency Domainssipij
Editing, reproduction and distribution of the digital multimedia are becoming extremely easier and faster with the existence of the internet and the availability of pervasive and powerful multimedia tools. Digital watermarking has emerged as a possible method to tackle these issues. This paper proposes a scheme using which more data can be inserted into an image in different domains using different techniques. This increases the embedding capacity. Using the proposed scheme 24 binary images can be embedded in the DCT domain and 12 binary images can be embedded in the spatial domain using LSB substitution technique in a single RGB image. The proposed scheme also provides an extra level of security to the watermark image by scrambling the image before embedding it into the host image. Experimental results show that the proposed watermarking method results in almost invisible difference between the watermarked image and the original image and is also robust against various image processing attacks.
A genetic algorithm for constructing broadcast trees with cost and delay cons...IJCNCJournal
We refer to the problem of constructing broadcast trees with cost and delay constraints in the networks as a delay-constrained minimum spanning tree problem in directed networks. Hence it is necessary determining a spanning tree of minimal cost to connect the source node to all nodes subject to delay constraints on broadcast routing. In this paper, we proposed a genetic algorithm for solving broadcast routing by finding the low-cost broadcast tree with minimum cost and delay constraints. In this research we present a genetic algorithm to find the broadcast routing tree of a given network in terms of its links. The algorithm uses the connection matrix of the given network to find the spanning trees and considers the weights of the links to obtain the minimum spanning tree. Our proposed algorithm is able to find a better solution, fast convergence speed and high reliability. The scalability and the performance of the algorithm with increasing number of network nodes are also encouraging.
This document proposes an Adaptive Resolution Enhancement Algorithm (AREA) using an Edge Targeted Filter (ETF) and Dual Tree Complex Wavelet Transform (DTCWT) to enhance the resolution and image quality of low-quality, low-resolution images. The ETF first detects edges in an input image and generates a mask. It then focuses on improving edge reconstruction. The output is input to DTCWT, which analyzes subband coefficients to detect flaws and interpolates coefficients to enhance spectral resolution. The inverse DTCWT produces a spatially enhanced output image with improved resolution up to 17% compared to existing techniques. Simulation results demonstrate the effectiveness of the proposed algorithm.
Location updation for energy efficient geographic routing in maneteSAT Journals
Abstract Routing in mobile ad-hoc networks with a large number of nodes or with high mobility is a very difficult task and energy conservation is very important for mobile devices. In geographic routing each node require information about neighbors to forward data packets. Earlier periodic updations are used for location updation but it consumes much amount of node energy and bandwidth utilized for unnecessary updation where there is no changes in the location information. In this paper adaptive position update used with less energy consumption and utilize the bandwidth for location updation only when there is a change in the network. The GPSR protocol used for packet forwarding in both greedy forwarding and perimeter forwarding. This adaptive updation utilize only less amount of node energy than other beaconing scheme. Index Terms:Routing protocols, Beacon updation scheme, Wireless communication, Greedy forwarding, Adaptive position updation.
In a Mobile Ad hoc Network (MANET), due to mobility, limited battery power and poor features of nodes,
network partitioning and nodes disconnecting occur frequently. To improve data availability, database
systems create multiple copies of each data object and allocate them on different nodes. This paper
proposes Automated Re-allocator of Replicas Over MANET (ARROM), that addresses these issues.
ARROM reduces the average response time of requests between clients and database servers by
reallocating replicas frequently. In addition, ARROM increases the average throughput in the network. Our
performance study indicates that ARROM improves average response time and average network
throughput in MANET as compared to resent existing scheme.
THRESHOLD BASED VM PLACEMENT TECHNIQUE FOR LOAD BALANCED RESOURCE PROVISIONIN...IJCNCJournal
The unbalancing load issue is a multi-variation, multi-imperative issue that corrupts the execution and productivity of processing assets. Workload adjusting methods give solutions of load unbalancing circumstances for two bothersome aspects over-burdening and under-stacking. Cloud computing utilizes planning and workload balancing for a virtualized environment, resource partaking in cloud foundation. These two factors must be handled in an improved way in cloud computing to accomplish ideal resource sharing. Henceforth, there requires productive resource, asset reservation for guaranteeing load advancement in the cloud. This work aims to present an incorporated resource, asset reservation, and workload adjusting calculation for effective cloud provisioning. The strategy develops a Priority-based Resource Scheduling Model to acquire the resource, asset reservation with threshold-based load balancing for improving the proficiency in cloud framework. Extending utilization of Virtual Machines through the suitable and sensible outstanding task at hand modifying is then practiced by intensely picking a job from submitting jobs using Priority-based Resource Scheduling Model to acquire resource asset reservation. Experimental evaluations represent, the proposed scheme gives better results by reducing execution time, with minimum resource cost and improved resource utilization in dynamic resource provisioning conditions.
OPTIMAL POWER ALLOCATION FOR MULTIPLE ACCESS CHANNELijwmn
This paper considers the problem of power allocation between the two senders in the multiple access channel. Two power allocation criteria are developed. In particular, in the first criterion, the total available power is allocated between the two users such that the two users have the same achievable rate.
In addition, the second criterion allocates the total available power such that the sum rate is maximized. In addition, many numerical examples are shown to show the value of power allocation and also to compare between the proposed criteria
This document discusses a cooperative transmission protocol for wireless sensor networks. The protocol aims to improve energy efficiency and transmission reliability. It establishes cooperative clusters during data transmission where neighboring nodes help each other. The cluster head recruits nodes to assist in communication. The protocol is analyzed based on factors like capacity, end-to-end robustness to packet loss, and the tradeoff between energy consumption and error rate. Simulation results show the protocol increases transmission reliability and achieves a longer network lifetime compared to non-cooperative schemes.
DIGITAL WATERMARKING TECHNIQUE BASED ON MULTI-RESOLUTION CURVELET TRANSFORMijfcstjournal
In this paper an efficient & robust non-blind watermarking technique based on multi-resolution geometric analysis named curvelet transform is proposed. Curvelet transform represent edges along curve much more efficiently than the wavelet transform and other traditional transforms. The proposed algorithm of embedding watermark in different scales in curvelet domain is implemented and the results are compared
using proper metric. The visual quality of watermarked image, efficiency of data hiding and the quality of extracted watermark of curvelet domain embedding techniques with wavelet Domain at different number of decomposition levels are compared. Experimental results show that embedding in curvelet domain yields best visual quality in watermarked image, the quality of extracted watermark, robustness of the watermark and the data hiding efficiency.
Mitigating Link Failures & Implementing Security Mechanism in Multipath Flows...Eswar Publications
The transmission of a traffic flows with a certain bandwidth demand over a single network path is either not possible or not cost-effective. In these cases, it is veritably periodic usable to improve focus the network's bandwidth appliance by breaking the traffic flow upon multiple qualified paths. Using multiple paths for the equivalent traffic flow increases the certainty of the network, it absorbs deluxe forwarding resources from the
network nodes and also it overcomes link failure provide security. In this paper, we illustrate several problems related to splitting a traffic flow over multiple paths while minimizing the absorption of forwarding resources mitigates failures and implementing security.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
This document summarizes a research paper that proposes a framework for continuous query processing for mobile users in peer-to-peer environments without centralized servers. The framework allows users to specify quality of service parameters for query answers and collaborate with peers to continuously maintain answers. Key aspects of the framework include allowing users to specify desired levels of coverage and accuracy for query answers, and designing a continuous answer maintenance scheme where users collaborate with peers to refine answers if local caches do not satisfy quality requirements. Experimental results showed the framework was efficient and scalable while providing a tradeoff between communication overhead and answer quality.
IMPROVING SCHEDULING OF DATA TRANSMISSION IN TDMA SYSTEMScsandit
In an era where communication has a most important role in modern societies, designing efficient
algorithms for data transmission is of the outmost importance. TDMA is a technology used in many
communication systems such as satellites and cell phones. In order to transmit data in such systems we
need to cluster them in packages. To achieve a faster transmission we are allowed to preempt the
transmission of any packet in order to resume at a later time. Such preemptions though come with a delay
in order to setup for the next transmission. In this paper we propose an algorithm which yields improved
transmission scheduling. This algorithm we call MGA. We have proven an approximation ratio for MGA
and ran experiments to establish that it works even better in practice. In order to conclude that MGA will
be a very helpful tool in constructing an improved schedule for packet routing using preemtion with a setup
cost, we compare its results to two other efficient algorithms designed by researchers in the past.
A NURBS-optimized dRRM solution in a mono-channel condition for IEEE 802.11 e...IJECEIAES
This document describes a NURBS-optimized dynamic radio resource management (dRRM) solution for IEEE 802.11 enterprise WLAN networks called N-WLCx. The authors present their original dRRM solution called WLCx, which uses a novel per-beam coverage representation approach. To reduce the high processing time of WLCx, they developed an optimization based on NURBS (Non-Uniform Rational B-Spline) surfaces. Simulation results show N-WLCx achieves a 92.58% reduction in processing time compared to the basic WLCx solution. The authors conclude N-WLCx optimization could be extended to enhance other vendors' and researchers' RRM solutions for improved efficiency
Performance Analysis of Enhanced Opportunistic Minimum Cost Routingin Mobile ...IJERA Editor
Mobile Ad-Hoc Network (MANET) is a collection of wireless mobile nodes forming a temporary network with
infrastructure less environment to establish a data transmission between nodes within the network. A routing
protocol is used to discover routes between nodes. In this paper, we study the three existing routing protocols
namely AODV, DSDV and DSR to analyze theirperformance based on set of parameters.AODV and DSR
deliver almost all the packets compared to DSDV. Hence we try to modify the AODVprotocol and use in the
cooperative transmission.
In this paper, we study the cooperative transmission at the network layer and cooperative diversity at the
physical layer as a joint optimization of the transmission power in a Mobile Ad-Hoc Network (MANET) with
static channel. However due to variable wireless channels static routing is suboptimal. Proposed protocol
proactively selects forwarding nodes that work cooperatively forwarding the packet towards the destination.
Cooperative transmission side diversity helps in reducing interference. Diversity can be achieved at the physical
layer by coordinating the multiple nodes. Nodes are equipped with Omni-directional antenna and take the
advantages of transmission side diversity to achieve energy saving, under the assumption that channel gains are
available at the transmitters.
The proposed Opportunistic Minimum Cost Cooperative Transmission Shortest Path (OMCTSP) algorithms
select the best optimum route with minimum cost in terms of energy, number of hops, available bandwidth, link
quality (SNR) and outage probability. As the network becomes larger, finding optimal routes becomes
computationally intractable as the complexity of the dynamic programming (DP) approach increases as o (22n)
where n is the number of nodes in the networks. Hence we develop two suboptimal algorithms have complexity
of o (n2) perform as same as optimal algorithm. Also developthe Opportunistic Cooperative Routing in MANET
(O_CORMAN), which is a network layer opportunistic routing scheme for mobile ad hoc networks. Nodes in
the network use the components proactive routing protocol, forwarder list update and local re-transmission. We
evaluate the performance using NS 2.32 simulator there is significant performance improvement with respect to
energy, throughput packet delivery, and delay compared with Modified AODV (OMCTSP).
The Coexistence of Device -to- Device (D2D) Communication under Heterogeneous...amal algedir
This document discusses device-to-device (D2D) communication in heterogeneous networks (HetNets). It contains 3 key contributions:
1. Analyzing whether D2D communication can improve throughput in HetNets when small cells reuse the same spectrum as macro cells. A sequential max search algorithm is proposed for resource allocation.
2. Proposing ways to enhance energy efficiency in D2D-powered HetNets through dynamic mode selection, resource allocation, and power control. Both dedicated and reuse modes of D2D communication are considered.
3. Developing a stochastic analytical model to quantify the impact of LTE scheduler type on D2D communication in HetNets.
IJCER (www.ijceronline.com) International Journal of computational Engineerin...ijceronline
Call for paper 2012, hard copy of Certificate, research paper publishing, where to publish research paper,
journal publishing, how to publish research paper, Call For research paper, international journal, publishing a paper, IJCER, journal of science and technology, how to get a research paper published, publishing a paper, publishing of journal, publishing of research paper, research and review articles, IJCER Journal, How to publish your research paper, publish research paper, open access engineering journal, Engineering journal, Mathematics journal, Physics journal, Chemistry journal, Computer Engineering, Computer Science journal, how to submit your paper, peer review journal, indexed journal, research and review articles, engineering journal, www.ijceronline.com, research journals,
yahoo journals, bing journals, International Journal of Computational Engineering Research, Google journals, hard copy of Certificate,
journal of engineering, online Submission
IJCER (www.ijceronline.com) International Journal of computational Engineerin...ijceronline
This document summarizes a study that evaluates and compares the performance of two routing protocols (DSDV and DSR) in mobile ad hoc networks using network simulation. It finds that DSDV has shorter delays but higher routing load as network size increases, making it unsuitable for large, dynamic networks. DSR has moderate routing load and longer delays, making it better for medium-sized networks without high delay requirements. The study uses ns-2 simulation with varying network sizes from 10 to 50 nodes to measure metrics like end-to-end delay, jitter, and normalized routing load under different traffic patterns.
Device-to-device (D2D) communications underlaying a cellular infrastructure has been proposed as a means of taking advantage of the physical proximity of communicating devices, increasing resource utilization, and improving cellular coverage. Relative to the traditional cellular methods, there is a need to design new peer discovery methods, physical layer procedures, and radio resource management algorithms that help realize the potential article we use the 3GPP Long Term Evolution system as a baseline for D2D design, review some of the key design challenges, and propose solution approaches that allow cellular devices and D2D pairs to share spectrum resources and thereby increase the spectrum and energy efficiency of traditional cellular networks. Sim- ulation results illustrate the viability of the proposed design.
International Journal of Engineering Research and Development (IJERD)IJERD Editor
journal publishing, how to publish research paper, Call For research paper, international journal, publishing a paper, IJERD, journal of science and technology, how to get a research paper published, publishing a paper, publishing of journal, publishing of research paper, reserach and review articles, IJERD Journal, How to publish your research paper, publish research paper, open access engineering journal, Engineering journal, Mathemetics journal, Physics journal, Chemistry journal, Computer Engineering, Computer Science journal, how to submit your paper, peer reviw journal, indexed journal, reserach and review articles, engineering journal, www.ijerd.com, research journals,
yahoo journals, bing journals, International Journal of Engineering Research and Development, google journals, hard copy of journal
This document summarizes a research paper that analyzes the performance of decode-and-forward relaying techniques for cellular communication networks. It introduces a new technique called network coded cooperative relaying that combines network coding strategies with cooperative relaying. Simulation results show that this approach outperforms conventional relaying and non-relaying schemes by achieving a higher diversity order and lower blocking probability. Specifically, it is shown that network coded cooperative relaying provides improved performance for both cell center and cell edge users when the distance of the relay station is between 0.4 and 0.6 of the distance to the base station.
Application of diversity techniques for multi user idma communication systemAlexander Decker
1) The document discusses applying diversity techniques like maximal ratio combining (MRC) to mitigate fading in interleave-division multiple access (IDMA) communication systems.
2) It analyzes both receiver diversity using a 1:2 antenna configuration and transmit diversity using a 2:1 antenna configuration for the MRC approach with IDMA.
3) Simulation results show significant performance improvements when applying MRC diversity to IDMA compared to without diversity, for both random and tree-based interleavers.
This document summarizes a study on efficient resource allocation for device-to-device (D2D) communication underlying an LTE network. It describes the network model including Evolved Packet Core components. It also outlines the radio resource and access technologies used in LTE such as OFDMA. The document defines the problem of intelligently selecting shared radio blocks to improve network throughput. It presents the simulation methodology used to evaluate random and heuristic D2D resource assignment algorithms. The results demonstrate that a greedy heuristic algorithm improves network performance in terms of total throughput without harming the primary network.
A bipartite graph based proportional fair scheduling strategy to improve thr...IJECEIAES
The fifth-generation wireless communication is expected to provide a huge amount of capacity to cater to the need of an increasing number of mobile consumers, which can be satisfied by device-to-device (D2D) communication. Reusing the cellular user’s resources in an efficient manner helps to increase the spectrum efficiency of the network but it leads to severe interference. The important point in reusing cellular user resources is that D2D communication should not affect the cellular user’s efficiency. After achieving this requirement, the focus is now turned toward the allocation of resources to D2D communication. This resource allocation strategy is to be designed in such a way that it will not affect communication among the cellular user (CU). This scheme improves various performance objectives. This paper aims at designing a proportional fair resource allocation algorithm based on the bipartite graph which maintains the quality of service (QoS) of CUs while providing D2D communication. This algorithm can be merged with any other scheme of resource allocation for improving QoS and adopting changing channels. In this scheme, a D2D pair can be allocated with one or more than one resource blocks. The MATLAB simulations analyze the performance of the proposed scheme.
This document discusses resource allocation for dense millimeter wave (mmWave) cellular networks assisted by device-to-device (D2D) communication. It formulates the problem into two sub-problems: 1) joint access and backhaul resource allocation and 2) joint D2D access and forwarding link resource allocation. It proposes using game theory to model the sub-problems as non-cooperative games and develops centralized and decentralized algorithms to obtain resource allocation solutions. Simulation results show the algorithms can effectively mitigate the impact of blockages on network performance.
Improved Algorithm for Throughput Maximization in MC-CDMAVLSICS Design
The Multi-Carrier Code Division Multiple Access (MC-CDMA) is becoming a very significant downlink multiple access technique for high-rate data transmission in the fourth generation wireless communication systems. By means of efficient resource allocation higher data rate i.e. throughput can be achieved. This paper evaluates the performance of group (subchannel) allocation criteria employed in downlink transmission, which results in throughput maximization. Proposed algorithm gives the modified technique of sub channel allocation in the downlink transmission of MC-CDMA systems. Simulation are carried out for all the three combining schemes, results shows that for the given power and BER proposed algorithm comparatively gives far better results .
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Digital watermarking with a new algorithmeSAT Journals
Abstract Everyday millions of data need to transmit through a distinct channel for various purposes; as a result there is a certain chance of third person interruption on that data. In this regards digital watermarking is one of the best solution. This paper proposes a new embedding algorithm (NEA) of digital watermarking. The algorithm is performed for digital image as data. The performance is compared for NEA and well established Cox's modified embedding algorithm. The watermarking is based on discrete wavelet transforms (DWT) and discrete cosine transforms (DCT). The acceptance of the new algorithm is measured by the two requirements of digital watermarking. One is imperceptibility of the watermarked image, measured by peak signal to noise ratio (PSNR) in dB; another one is robustness of the mark image, measured by correlation of original mark image and recovering mark image. Here a 512×512 gray scale "Lena" and "Cameraman's" image is taken as host images, and a 128×128 gray scale image is taken as mark image for 2 level of DWT. The simulation results for different attacking conditions such as salt and pepper attack, additive white Gaussian noise (AWGN) attack, jpg compression attack, gamma attack, histogram attack, cropping attack, sharpening attack etc. After different attacks the changing tendency PSNR for both algorithms are similar. But the mean square error (MSE) value of NEA is always less than Cox’s modified algorithm, which means that after embedding the changes of the host image property lower for NEA than Cox’s algorithm. From the simulation results it can be said that NEA will be a substitute of modified Cox’s algorithm with better performance. Keywords: Digital watermark, DWT, DCT, Cox’s modified algorithm, Lena image, Cameraman image, AWGN, JPG, salt and pepper attack, PSNR, correlation, MSE.
QoS Based Capacity Enhancement for WCDMA Network with Coding SchemeVLSICS Design
The wide-band code division multiple access (WCDMA) based 3G and beyond cellular mobile wireless networks are expected to provide a diverse range of multimedia services to mobile users with guaranteed quality of service (QoS). To serve diverse quality of service requirements of these networks it necessitates new radio resource management strategies for effective utilization of network resources with coding schemes. Call admission control CAC) is a significant component in wireless networks to guarantee quality of service requirements and also to enhance the network resilience. In this paper capacity enhancement for WCDMA network with convolutional coding scheme is discussed and compared with block code and without coding scheme to achieve a better balance between resource utilization and quality of service provisioning. The model of this network is valid for the real-time (RT) and non-real-time (NRT) services having different data rate. Simulation results demonstrate the effectiveness of the network using convolutional code in terms of capacity enhancement and QoS of the voice and video services.
Improving thrpoughput and energy efficiency by pctar protocol in wirelessIaetsd Iaetsd
The document discusses a proposed Prioritized Congestion and Traffic Aware Routing (PCTAR) protocol for wireless sensor networks. PCTAR aims to improve throughput and energy efficiency. It does so by dynamically discovering routing zones using hybrid potential fields that consider both depth (distance to sink) and queue length, as well as data priority. Simulation results showed PCTAR improved overall throughput by 70% compared to the TADR protocol. PCTAR is suitable for applications in healthcare monitoring and military domains by prioritizing data delivery and reducing congestion.
Constructing Minimum Connected Dominating Set in Mobile Ad Hoc NetworksGiselleginaGloria
One of the most important challenges of a Mobile Ad Hoc Network (MANET) is to ensure efficient routing among its nodes. A Connected Dominating Set (CDS) is a widely used concept by many protocols for broadcasting and routing in MANETs. Those existing protocols require significant message overhead in construction of CDS. In this paper, we propose a simple, inexpensive and novel algorithm of computing a minimum CDS. The proposed algorithm saves time and message overhead in forming a CDS while supporting node mobility efficiently. Simulation results show that the proposed algorithm is efficient in terms of both message complexity and the size of the CDS.
Efficient radio resource allocation scheme for 5G networks with device-to-devi...IJECEIAES
A vital technology in the next-generation cellular network is device-to-device (D2D) communication. Cellular user enabled with D2D communication provides high spectral efficiency and further increases the coverage area of the cell, especially for the end-cell users and blind spot areas. However, the implementation of D2D communication increases interference among the cellular and D2D users. In this paper, we proposed a radio resource allocation (RRA) algorithm to manage the interference using fractional frequency reuse (FFR) scheme and Hungarian algorithm. The proposed algorithm is divided into three parts. First, the FFR scheme allocates different frequency bands among the cell (inner and outer region) for both the cellular and the D2D users to reduce the interference. Second, the Hungarian weighted bipartite matching algorithm is used to allocate the resources to D2D users with the minimum total system interference, while maintaining the total system sum rate. The cellular users share the resources with more than one D2D pair. Lastly, the local search technique of swapping is used for further allocation to minimize the interference. We implemented two types of assignments, fair multiple assignment, and restricted multiple assignment. We compared our results with existing algorithms which verified that our proposed algorithm provides outstanding results in aspects like interference reduction and system sum rate. For restricted multiple assignment, 60-70% of the D2D users are allocated in average cases.
SLGC: A New Cluster Routing Algorithm in Wireless Sensor Network for Decrease...IJCSEA Journal
Decrease energy consumption and maximizing network lifetime are important parameters in designing and protocols for wireless sensor network (WSN).Clustering is one of the efficient methods in energy consumption by Cluster-Head in WSN. Besides, CH can process and aggregate data sent by cluster members, thus reducing network traffic for sending data to sink. In this paper presents a new cluster routing algorithm by dividing network into grids. In each grid computes the center-gravity and threshold of energy for selecting the node that has the best condition base on these parameters in grid for selecting Cluster-Head in current round, also SLGC selecting Cluster-Heads for next rounds thereby this CHs reduce the volume of controlling messages for next rounds and inform nodes for sending data into CH of respective round. This algorithm prolong network lifetime and decrease energy consumption by selecting CH in grid and sending data of grid to sink by this CH. Result of simulation shows that SLGC algorithm in comparison with the previous clustering algorithm has maximizing network lifetime and decrease energy consumption in network.
The document discusses using network coding to optimize routing schemes for multicasting in mobile ad-hoc networks. It defines the problem and assumptions, such as independent information sources and specifying multicast requirements. Network coding is described as employing coding at nodes rather than just relaying data. Simulations show that calculating the optimal routing scheme is much less complex with network coding compared to conventional routing, and the network coding solution uses close to the minimum possible energy.
An investigation-on-efficient-spreading-codes-for-transmitter-based-technique...Cemal Ardil
This document summarizes research on efficient spreading codes for transmitter-based techniques to mitigate interference in time division duplex code division multiple access (TDD/CDMA) downlink systems. It investigates bitwise and blockwise multiuser transmission schemes that transfer complexity to the transmitter. Different spreading codes are evaluated based on correlation properties to determine suitability for techniques like precoding, pre-rake, and rake diversity. Performance is measured by bit error rate with varying numbers of users to identify the most efficient codes for interference mitigation.
Similar to Sequentail Max Search (SMS) resouce allocation algorithm (20)
ACEP Magazine edition 4th launched on 05.06.2024Rahul
This document provides information about the third edition of the magazine "Sthapatya" published by the Association of Civil Engineers (Practicing) Aurangabad. It includes messages from current and past presidents of ACEP, memories and photos from past ACEP events, information on life time achievement awards given by ACEP, and a technical article on concrete maintenance, repairs and strengthening. The document highlights activities of ACEP and provides a technical educational article for members.
Advanced control scheme of doubly fed induction generator for wind turbine us...IJECEIAES
This paper describes a speed control device for generating electrical energy on an electricity network based on the doubly fed induction generator (DFIG) used for wind power conversion systems. At first, a double-fed induction generator model was constructed. A control law is formulated to govern the flow of energy between the stator of a DFIG and the energy network using three types of controllers: proportional integral (PI), sliding mode controller (SMC) and second order sliding mode controller (SOSMC). Their different results in terms of power reference tracking, reaction to unexpected speed fluctuations, sensitivity to perturbations, and resilience against machine parameter alterations are compared. MATLAB/Simulink was used to conduct the simulations for the preceding study. Multiple simulations have shown very satisfying results, and the investigations demonstrate the efficacy and power-enhancing capabilities of the suggested control system.
International Conference on NLP, Artificial Intelligence, Machine Learning an...gerogepatton
International Conference on NLP, Artificial Intelligence, Machine Learning and Applications (NLAIM 2024) offers a premier global platform for exchanging insights and findings in the theory, methodology, and applications of NLP, Artificial Intelligence, Machine Learning, and their applications. The conference seeks substantial contributions across all key domains of NLP, Artificial Intelligence, Machine Learning, and their practical applications, aiming to foster both theoretical advancements and real-world implementations. With a focus on facilitating collaboration between researchers and practitioners from academia and industry, the conference serves as a nexus for sharing the latest developments in the field.
Literature Review Basics and Understanding Reference Management.pptxDr Ramhari Poudyal
Three-day training on academic research focuses on analytical tools at United Technical College, supported by the University Grant Commission, Nepal. 24-26 May 2024
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODELgerogepatton
As digital technology becomes more deeply embedded in power systems, protecting the communication
networks of Smart Grids (SG) has emerged as a critical concern. Distributed Network Protocol 3 (DNP3)
represents a multi-tiered application layer protocol extensively utilized in Supervisory Control and Data
Acquisition (SCADA)-based smart grids to facilitate real-time data gathering and control functionalities.
Robust Intrusion Detection Systems (IDS) are necessary for early threat detection and mitigation because
of the interconnection of these networks, which makes them vulnerable to a variety of cyberattacks. To
solve this issue, this paper develops a hybrid Deep Learning (DL) model specifically designed for intrusion
detection in smart grids. The proposed approach is a combination of the Convolutional Neural Network
(CNN) and the Long-Short-Term Memory algorithms (LSTM). We employed a recent intrusion detection
dataset (DNP3), which focuses on unauthorized commands and Denial of Service (DoS) cyberattacks, to
train and test our model. The results of our experiments show that our CNN-LSTM method is much better
at finding smart grid intrusions than other deep learning algorithms used for classification. In addition,
our proposed approach improves accuracy, precision, recall, and F1 score, achieving a high detection
accuracy rate of 99.50%.
CHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECTjpsjournal1
The rivalry between prominent international actors for dominance over Central Asia's hydrocarbon
reserves and the ancient silk trade route, along with China's diplomatic endeavours in the area, has been
referred to as the "New Great Game." This research centres on the power struggle, considering
geopolitical, geostrategic, and geoeconomic variables. Topics including trade, political hegemony, oil
politics, and conventional and nontraditional security are all explored and explained by the researcher.
Using Mackinder's Heartland, Spykman Rimland, and Hegemonic Stability theories, examines China's role
in Central Asia. This study adheres to the empirical epistemological method and has taken care of
objectivity. This study analyze primary and secondary research documents critically to elaborate role of
china’s geo economic outreach in central Asian countries and its future prospect. China is thriving in trade,
pipeline politics, and winning states, according to this study, thanks to important instruments like the
Shanghai Cooperation Organisation and the Belt and Road Economic Initiative. According to this study,
China is seeing significant success in commerce, pipeline politics, and gaining influence on other
governments. This success may be attributed to the effective utilisation of key tools such as the Shanghai
Cooperation Organisation and the Belt and Road Economic Initiative.
Understanding Inductive Bias in Machine LearningSUTEJAS
This presentation explores the concept of inductive bias in machine learning. It explains how algorithms come with built-in assumptions and preferences that guide the learning process. You'll learn about the different types of inductive bias and how they can impact the performance and generalizability of machine learning models.
The presentation also covers the positive and negative aspects of inductive bias, along with strategies for mitigating potential drawbacks. We'll explore examples of how bias manifests in algorithms like neural networks and decision trees.
By understanding inductive bias, you can gain valuable insights into how machine learning models work and make informed decisions when building and deploying them.
Harnessing WebAssembly for Real-time Stateless Streaming PipelinesChristina Lin
Traditionally, dealing with real-time data pipelines has involved significant overhead, even for straightforward tasks like data transformation or masking. However, in this talk, we’ll venture into the dynamic realm of WebAssembly (WASM) and discover how it can revolutionize the creation of stateless streaming pipelines within a Kafka (Redpanda) broker. These pipelines are adept at managing low-latency, high-data-volume scenarios.
3. The growth of data traffic has dramatically increased in recent years, primarily due to wireless smart devices
(e.g., smartphones, mobile PC, tablet) and their applications.
The tremendous amount of data traffic has motivated researchers to develop new technologies for
enhancing user experience and network performance.
Long Term Evolution-Advanced (LTE-A) release 12 introduced a new technology named Device-to-Device
communication (D2D).
D2D communication enables direct communication between user equipment located within close proximity
without go throughout cellular base stations (BS).
Introduction
3
4. Advantages of D2D Communications
Proximity gain
Hop gain
Reuse gain
Potential Benefits
Higher date rate /capacity
Lower latency
Higher spectrum, energy, and cost-efficiency
Better robustness
Challenging
control of level of interference.
High complication of resource allocation
procedure and power control
WhyD2DCommunications
Underlay:
Cellular and D2D communication share the same
radio resources.
Overlay :
Cellular and D2D are given dedicated resources
Direct link
4
Direct link
5. Motivation
• The coexistence of D2D communication with small cells in HetNets is still an open area
for research.
• Most of existing work consider D2D in Uplink spectrum sharing under conventional
cellular network; a few works study the Downlink sharing under HetNets.
• In DL sharing spectrum, the interference from the cellular transmission to the D2D
originates from the BS and depends only on the D2D receiver location. Therefore, D2D
interference to the DL users can be controlled by an efficient resource allocation.
5
6. LTE resourcesgridstructure
• Resources are grouped into two dimensional Resources Blocks (RBs).
• RB contains 12 subcarriers (180kHz in total) and 7 consecutive symbols (normal CP) or
6 symbols (extended CP).
• A pair of RBs (in time domain) is minimum unit an eNodeB scheduler can allocate.
• Number of resource blocks attached to a user defines the user data rate.
One subframe 6
7. 7
In this work, Adaptive D2D resources allocation algorithm, a Sequential Max Search
(SMS) algorithm, is developed. (SMS) is a less computationally demanding approach
Our proposed algorithm accounts for co-channel interference between different tier
users as well as satisfying various rate requirements for cellular and D2D users
Based on space search reduction from SMS algorithm, we applied Brute-force search
to find the optimal resources allocation
The results from SMS were compared to Brute-force search results
Contribution
8. SystemModel
• HetNets consists of one cell serving by one macro base
station (MB) located at the center.
• A small base station (SB) is placed within the converge of
the macro cell.
• There are N users uniformly distributed within the coverage
of MB.
• Total bandwidth B is divided to K Physical Resource Blocks
(PRBs).
• frequency reuse of one between the SB and MB stations
• The MB, SB, and D2D_TX will transmit at their maximum
power
• Fully loaded network.
• Downlink spectrum sharing.
• Users under the same BS are assigned orthogonal RBs,
one RB per cellular user.
• Only one D2D pair can share RB with preassigned
cellular user. One RB is assigned for D2D user
• Cellular users allocation is not considered in this work.
Assumption
8
10. ProblemFormulation
• Objective: maximize overall throughput
• Variables: D2D channel allocation
• Constraints: minimum rate requirement of users all users
𝑃1: max
𝑋𝑘,𝐷
𝑘=1
𝐾
𝑇 𝑈 𝑀 𝑋 𝑘,𝑑 + 𝑇 𝑈 𝑆 𝑋 𝑘,𝑑 + 𝑇 𝑈 𝐷(𝑋 𝑘,𝑑) MINLP Problem
C2: indicates only one RB is assigned to each D2D pair.
C3: indicates RB cannot be used by more than one D2D pair.
10
11. The problem (P1) is the Mixed Integer Nonlinear Problem (MINLP).
Mixed Integer Nonlinear Program (MINLP) is (NP –hard) [1].
The complexity of finding an optimal solution for MINLP is too high.
A low complexity algorithm is proposed to allocate D2D users.
C4: C6 Represent various QoS requirements
For cellular and D2D users
11
12. • Maximum allowed interference threshold at 𝑘 𝑡ℎ
RB is calculated by solving the constraints (C4) and (C5)
Sequential MaxSearchAlgorithm
(𝑂. 𝐼) 𝑘is an accumulated interference in 𝑘 𝑡ℎ RB before allocating D2D pairs.
1- Set Maximum Interference Threshold
12
13. • Compute the interference imposed by D2D pairs at 𝑘 𝑡ℎ
RB for both SB users and MB users
• An initial set of reuse RBs for pair (d) is found by comparing Interference (𝐼 𝑑,𝑚
𝑘
, 𝐼 𝑑,𝑠
𝑘
) from equations with the maximum
threshold ( 𝐼 𝑘
𝑇ℎ
) ,The optimal set of RBs 𝜓 𝑅𝐵𝑠
∗
is found
2- Identify Optimal Resource Blocks Candidate
13
17. BruteForceSearch
• By finding 𝜓 𝑅𝐵𝑠
∗
in the SMS algorithm, the search space for each D2D user is reduced
• The brute-force search is applied to determine the optimal allocation solution
17
18. NetworkPerformance
• Monte-Carlo is performed to evaluate the
algorithms.
• distance-dependent path loss and shadowing
fading presented in (3GPP).
Table (1) simulation parameters
18
20. As the separation distance between D2Dtx and
D2Drx increases, gain achieved from both
algorithms decreases
the separation
distance between D2Dtx and D2Drx increases, gain
achieved from both algorithms decreases. The
achieved
gain from D2D pairs in the guard distance topology
is
higher than the gain achieved in the no guard
distance
topology.
Effect of The Number of D2D Pairs • Effect of D2D separation distance
SMS shows an improvement in throughput with and without D2D
distance guard.
Achieved gain with guard distance is higher than gain achieved
without guard distance.
Results demonstrate that when compared with brute-force, SMS can
converge a suboptimal solution.
Existing a saturation point for the D2D pairs
The gain achieved from both algorithms decreases as the
separation distance increases.
The achieved gain from D2D pairs in the guard distance topology
is higher than the gain achieved in the no guard distance
topology.
20
21. D2DbasedonRSSvalues
User association problem is formulated as (P1) to maximize RSS from users’ desire to communicate.
𝑌𝑖,𝑗 binary indicator shows user 𝑖 connected to mode J= {𝐷, 𝑆, 𝑀} .
D= D2D communication S = assign with SB, M=assign with MB.
Subject to
21
23. • The effect of number and position in
overall throughput is clear. Out of 250
users, there were 32 users
communicating via the D2D link.
• The majority of them were located at a
significant distance of MB (i.e., D2D
exposed to low interference). This
yields to a higher achieved throughput
• Alternatively, the majority of D2D
users in topologies N = (125, 200) were
located extremely close to MB and
exposed to high interference, which
results in low throughput.
23
24. 24
Conclusion
The overall (EE) optimization of HetNets –support D2D is performed in terms of
throughput maximization.
D2D resources allocation algorithm is developed and named a Sequential Max Search
(SMS).
The SMS algorithm maximizes the overall throughput and accounts for cross tiers
interference.
The SMS fulfills various rate requirements for cellular and D2D users.