Mobile Ad hoc Networks (MANETs) are dynamic networks populated by mobile stations, or mobile nodes
(MNs). Specifically, MANETs consist of a collection of nodes randomly placed in a line (not necessarily
straight). MANETs do appear in many real-world network applications such as a vehicular MANETs built
along a highway in a city environment or people in a particular location. MNs in MANETs are usually
laptops, PDAs or mobile phones. These devices may use Bluetooth and/or IEEE 802.11 (Wi-Fi) network
interfaces and communicate in a decentralized manner. Mobility is a key feature of MANETs. Each node
may work as a router and the network can dynamically change with time; when new nodes can join, and
other nodes can leave the network.
This paper presents comparative results that have been carried out via Matlab software simulation. The
study investigates the impact of mobile nodes’ parameters such as the speed, the arrival rate and the size of
mobile nodes in a given area using Poisson distribution. The results have indicated that mobile nodes’
arrival rates may have influence on MNs population (as a larger number) in a location.
Message Propagation in Vehicular Ad hoc Networks under free flow and congeste...ijasuc
. Vehicular Ad hoc Network (VANET), a subclass of mobile ad hoc networks (MANETs), is a
promising approach for the intelligent transportation system (ITS). The key difference of VANET and
MANET is the special mobility pattern and rapidly changeable topology. Temporary network
fragmentation problem and the broadcast storm problem are further considered for designing Message
propagation in VANETs. The temporary network fragmentation problem which happens in free flow caused
by rapidly changeable topology influence on the performance of data transmissions. The broadcast storm
problem in congested flow network seriously affects the successful rate of message delivery in VANETs.
This paper presents a connectivity analysis under free flow and congested flow scenario in Vehicular Ad
hoc Networks.
Derivative threshold actuation for single phase wormhole detection with reduc...ijdpsjournal
Communication in mobile Ad hoc networks is completed via multi
-
hop ways. Owing to the distributed
specification and restricted resource of nodes, MANET is a lot prone
to wormhole attacks i.e. wormhole
attacks place severe threats to each Ad hoc routing protocol and a few security enhancements. Thus,
so as
to discover wormholes, totally different techniques are in use. In all those techniques fixation of
threshold
is mer
ely by trial & error methodology or by random manner. Conjointly wormhole detection is in twin
part by putting the nodes that is higher than the edge in a suspicious set, however predicting the n
ode as a
wormhole by using some other algorithms. Our aim in
this paper is to deduce the traffic threshold level by
derivational approach for identifying wormholes in a very single phase in relay network having dissi
milar
characteristics.
An Opportunistic AODV Routing Scheme : A Cognitive Mobile Agents Approachijasuc
In Manet’s Dynamics and Robustness are the key features of the nodes and are governed by several routing protocols such as AODV, DSR and so on. However in the network the growing resource demand leads to resource scarcity. The Node Mobility often leads to the link breakages and high routing overhead
decreasing the stability and reliability of the network connectivity. In this context, the paper proposes a novel opportunistic AODV routing scheme which implements a cognitive agent based intelligent technique to set up a stable connectivity over the Manet. The Scheme computes the routing metric (rf) based on the collaboration sensitivity levels of the nodes obtained based through the knowledge-based decision. This Routing Metric is subsequently used to set up the stable path for network connectivity. Thus minimizes the route overhead and increases the stability of the path. The Performance evaluation is conducted in comparison with the AODV and sleep AODV routing protocol and validated.
Advancement in VANET Routing by Optimize the Centrality with ANT Colony Approachijceronline
In a wireless ad hoc network, an opportunistic routing strategy is a strategy where there is no predefined rule for choosing the next node to destination (as it is the case in conventional schemes such as OLSR, DSR or even Geo-Routing). A popular example of opportunistic routing is the “delay tolerant” forwarding to VANET network when a direct path to destination does not exist. Conventional routing in this case would just “drop” the packet. With opportunistic routing, a node acts upon the available information, In this thesis optimize the routing by centrality information then refine by ant colony metaheuristics. In this method validate our approach on different parameter like overhead, throughput.
A ROUTING MECHANISM BASED ON SOCIAL NETWORKS AND BETWEENNESS CENTRALITY IN DE...ijcsit
With the growing popularity of mobile smart devices, the existing networks are unable to meet the requirement of many complex scenarios; current network architectures and protocols do not work well with the network with high latency and frequent disconnections. To improve the performance of these networks some scholars opened up a new research field, delay-tolerant networks, in which one of the important
research subjects is the forwarding and routing mechanism of data packets. This paper presents a routing
scheme based on social networks owing to the fact that nodes in computer networks and social networks
have high behavioural similarity. To further improve efficiency this paper also suggests a mechanism,which is the improved version of an existing betweenness centrality based routing algorithm [1]. The experiments showed that the proposed scheme has better performance than the existing friendship routing algorithms.
Message Propagation in Vehicular Ad hoc Networks under free flow and congeste...ijasuc
. Vehicular Ad hoc Network (VANET), a subclass of mobile ad hoc networks (MANETs), is a
promising approach for the intelligent transportation system (ITS). The key difference of VANET and
MANET is the special mobility pattern and rapidly changeable topology. Temporary network
fragmentation problem and the broadcast storm problem are further considered for designing Message
propagation in VANETs. The temporary network fragmentation problem which happens in free flow caused
by rapidly changeable topology influence on the performance of data transmissions. The broadcast storm
problem in congested flow network seriously affects the successful rate of message delivery in VANETs.
This paper presents a connectivity analysis under free flow and congested flow scenario in Vehicular Ad
hoc Networks.
Derivative threshold actuation for single phase wormhole detection with reduc...ijdpsjournal
Communication in mobile Ad hoc networks is completed via multi
-
hop ways. Owing to the distributed
specification and restricted resource of nodes, MANET is a lot prone
to wormhole attacks i.e. wormhole
attacks place severe threats to each Ad hoc routing protocol and a few security enhancements. Thus,
so as
to discover wormholes, totally different techniques are in use. In all those techniques fixation of
threshold
is mer
ely by trial & error methodology or by random manner. Conjointly wormhole detection is in twin
part by putting the nodes that is higher than the edge in a suspicious set, however predicting the n
ode as a
wormhole by using some other algorithms. Our aim in
this paper is to deduce the traffic threshold level by
derivational approach for identifying wormholes in a very single phase in relay network having dissi
milar
characteristics.
An Opportunistic AODV Routing Scheme : A Cognitive Mobile Agents Approachijasuc
In Manet’s Dynamics and Robustness are the key features of the nodes and are governed by several routing protocols such as AODV, DSR and so on. However in the network the growing resource demand leads to resource scarcity. The Node Mobility often leads to the link breakages and high routing overhead
decreasing the stability and reliability of the network connectivity. In this context, the paper proposes a novel opportunistic AODV routing scheme which implements a cognitive agent based intelligent technique to set up a stable connectivity over the Manet. The Scheme computes the routing metric (rf) based on the collaboration sensitivity levels of the nodes obtained based through the knowledge-based decision. This Routing Metric is subsequently used to set up the stable path for network connectivity. Thus minimizes the route overhead and increases the stability of the path. The Performance evaluation is conducted in comparison with the AODV and sleep AODV routing protocol and validated.
Advancement in VANET Routing by Optimize the Centrality with ANT Colony Approachijceronline
In a wireless ad hoc network, an opportunistic routing strategy is a strategy where there is no predefined rule for choosing the next node to destination (as it is the case in conventional schemes such as OLSR, DSR or even Geo-Routing). A popular example of opportunistic routing is the “delay tolerant” forwarding to VANET network when a direct path to destination does not exist. Conventional routing in this case would just “drop” the packet. With opportunistic routing, a node acts upon the available information, In this thesis optimize the routing by centrality information then refine by ant colony metaheuristics. In this method validate our approach on different parameter like overhead, throughput.
A ROUTING MECHANISM BASED ON SOCIAL NETWORKS AND BETWEENNESS CENTRALITY IN DE...ijcsit
With the growing popularity of mobile smart devices, the existing networks are unable to meet the requirement of many complex scenarios; current network architectures and protocols do not work well with the network with high latency and frequent disconnections. To improve the performance of these networks some scholars opened up a new research field, delay-tolerant networks, in which one of the important
research subjects is the forwarding and routing mechanism of data packets. This paper presents a routing
scheme based on social networks owing to the fact that nodes in computer networks and social networks
have high behavioural similarity. To further improve efficiency this paper also suggests a mechanism,which is the improved version of an existing betweenness centrality based routing algorithm [1]. The experiments showed that the proposed scheme has better performance than the existing friendship routing algorithms.
PRIVACY ENHANCEMENT OF NODE IN OPPORTUNISTIC NETWORK BY USING VIRTUAL-IDijsc
An entrepreneurial system is one of the sort of remote system. Delay resistance system is correspondence
organizing proposition which empowers the correspondence in such a situation where end to end way
might never be exist. Message is forward on the premise of chance. Time interim to convey a message is
long we can't evaluate or anticipate the time until we get the message. There is a security issue in these
sorts of system. In this paper we will proposed another procedure which will expand the protection of the
system and build execution of the system.
International Journal of Computational Engineering Research(IJCER) is an intentional online Journal in English monthly publishing journal. This Journal publish original research work that contributes significantly to further the scientific knowledge in engineering and Technology
MODELING SOCIAL GAUSS-MARKOV MOBILITY FOR OPPORTUNISTIC NETWORK csandit
Mobility is attracting more and more interests due to its importance for data forwarding
mechanisms in many networks such as mobile opportunistic network. In everyday life mobile
nodes are often carried by human. Thus, mobile nodes’ mobility pattern is inevitable affected by
human social character. This paper presents a novel mobility model (HNGM) which combines
social character and Gauss-Markov process together. The performance analysis on this
mobility model is given and one famous and widely used mobility model (RWP) is chosen to
make comparison..
To Get any Project for CSE, IT ECE, EEE Contact Me @ 09849539085, 09966235788 or mail us - ieeefinalsemprojects@gmail.co¬m-Visit Our Website: www.finalyearprojects.org
AN GROUP BEHAVIOR MOBILITY MODEL FOR OPPORTUNISTIC NETWORKS csandit
Mobility is regarded as a network transport mechanism for distributing data in many networks.
However, many mobility models ignore the fact that peer nodes often carried by people and
thus move in group pattern according to some kind of social relation. In this paper, we propose
one mobility model based on group behavior character which derives from real movement
scenario in daily life. This paper also gives the character analysis of this mobility model and
compares with the classic Random Waypoint Mobility model.
To Get any Project for CSE, IT ECE, EEE Contact Me @ 09849539085, 09966235788 or mail us - ieeefinalsemprojects@gmail.co¬m-Visit Our Website: www.finalyearprojects.org
PERUSAL OF INTRUSION DETECTION AND PREVENTION SYSTEM ON A MANET WITH BLACK HO...ijsptm
MANET is a self configuring network of nodes which is a wireless . The nodes in this network move
randomly .Mobility of nodes is more. The nodes are dynamic and infrastructure less ,self maintainable. In
MANET there are many types of security attacks like Blackhole, greyhole attack, wormhole, jellyfish etc.
When the MANET is under blackhole attack there is a loss of energy which is high at the node resulting in
loss of battery backup and also excess of bandwidth may be consumed by the attacker. The attacker is an
insider. Among various mobility models to generate mobility patterns the Random waypoint mobility
model is used .To solve these issues an IDPS framework for MANET using image processing techniques
under blackhole attack is proposed to detect the blackhole attack RREP by providing security services like
authentication and confidentiality.
A Novel Approach for Detection of Routes with Misbehaving Nodes in MANETsIDES Editor
Network nodes in MANET’s are free to move randomly.
Therefore, the network topology may change rapidly.
Routing protocol for MANET’s are used for delivery of data
packets from source to the desired destination, Routing protocols
are also designed based on the assumption that all the
participating nodes are fully cooperative. However, due to the
scarcely available battery based energy, node behaviours may
exist. One such routing misbehaviours is that some nodes may
be selfish by participating in route discovery and maintenance
process, but refuse to forward the packet in order to save its
energy. To solve this problem we propose a reputation based
scheme where the watch dog uses a passive overhearing of
nodes and assign a value to it as an appreciation or add nuggets
to them. In this proposal, nodes with highest value are
highly recommended for data forwarding and allow nodes to
avoid the use of misbehaving nodes in future route selection.
AdHoc On Demand Distance vector routing protocol may be
used to get the recommendation details of the node intended
to forward the packet from the neighbouring nodes. This paper
proposes a novel method to mitigate the route with misbehaving
nodes and also suggests a way to find if any intruder is
present in the cluster of participating nodes using security
aware AODV protocol.
ConNeKTion: A Tool for Exploiting Conceptual Graphs Automatically Learned fro...University of Bari (Italy)
Studying, understanding and exploiting the content of a digital library, and extracting useful information thereof, require automatic techniques that can effectively support the users. To this aim, a relevant role can be played by concept taxonomies. Unfortunately, the availability of such a kind of resources is limited, and their manual building and maintenance are costly and error-prone. This work presents ConNeKTion, a tool for conceptual graph learning and exploitation. It allows to learn conceptual graphs from plain text and to enrich them by finding concept generalizations. The resulting graph can be used for several purposes: finding relationships between concepts (if any), filtering the concepts from a particular perspective, keyword extraction and information retrieval. A suitable control panel is provided for the user to comfortably carry out these activities.
ROBUST TEXT DETECTION AND EXTRACTION IN NATURAL SCENE IMAGES USING CONDITIONA...ijiert bestjournal
In Natural Scene Image,Text detection is important tasks which are used for many content based image analysis. A maximally stable external region based method is us ed for scene detection .This MSER based method incl udes stages character candidate extraction,text candida te construction,text candidate elimination & text candidate classification. Main limitations of this method are how to detect highly blurred text in low resolutio n natural scene images. The current technology not focuses on any t ext extraction method. In proposed system a Conditi onal Random field (CRF) model is used to assign candidat e component as one of the two classes (text& Non Te xt) by Considering both unary component properties and bin ary contextual component relationship. For this pur pose we are using connected component analysis method. The proposed system also performs a text extraction usi ng OCR
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Community aware opportunistic routin...IEEEGLOBALSOFTTECHNOLOGIES
To Get any Project for CSE, IT ECE, EEE Contact Me @ 09849539085, 09966235788 or mail us - ieeefinalsemprojects@gmail.com-Visit Our Website: www.finalyearprojects.org
A Study of Secure Efficient Ad hoc Distance Vector Routing Protocols for MANETsIJMER
International Journal of Modern Engineering Research (IJMER) is Peer reviewed, online Journal. It serves as an international archival forum of scholarly research related to engineering and science education.
International Journal of Modern Engineering Research (IJMER) covers all the fields of engineering and science: Electrical Engineering, Mechanical Engineering, Civil Engineering, Chemical Engineering, Computer Engineering, Agricultural Engineering, Aerospace Engineering, Thermodynamics, Structural Engineering, Control Engineering, Robotics, Mechatronics, Fluid Mechanics, Nanotechnology, Simulators, Web-based Learning, Remote Laboratories, Engineering Design Methods, Education Research, Students' Satisfaction and Motivation, Global Projects, and Assessment…. And many more.
Present new mechanisms for modelling multiple interfaces on a node, support for interference-limited links and a frame-work for modelling complex applications running on the nodes. Furthermore, provide an overview of concrete use cases where the simulator has been successfully exploited to study a variety of aspects related to opportunistic, message-based communications. Node movement is implemented by movement models. These are either synthetic models or existing movement traces. Connectivity between the nodes is based on their location, communication range and the bit-rate. The routing function is implemented by routing modules that decide which messages to forward over existing contacts. Finally, the messages themselves are generated either through event generators that generate random traffic between the nodes, or through applications that generate traffic based on application interactions. The main functions of the simulator are the modelling of node movement, inter-node contacts using various interfaces, routing, message handling and application interactions. Result collection and analysis are done through visualization, reports and post-processing tools.
International Journal of Computational Engineering Research(IJCER) is an intentional online Journal in English monthly publishing journal. This Journal publish original research work that contributes significantly to further the scientific knowledge in engineering and Technology.
An Efficient DTN Routing Algorithm for Automatic Crime Information Sharing fo...IJSRD
Delay Tolerant Network shows many issues that are exist in traditional network. Opportunistic network emerge as interesting evolution in MANET. Mobile nodes in the opportunistic network communicate with each other even in case of no route connection. In this paper a kiosk (or hub station) that is connected to villages to establish internet connection. Such kiosk is placed where traffic frequency is high. We will use high frequency sensor in vehicles. When passing through kiosk, high frequency sensor will establish connection to kiosk & kiosk will connect villages to internet. This system is very useful in crime information sharing services. As an example, if there are a person who is victim of any crime or in a trouble condition. He/she have mobile devices connect to internet. They send a trouble message which is passed to near kiosk and passed on to vehicles and forward their information to police station. This system is helpful in villages, where network communication is not proper.
An Analytical Analysis Of Neighbour And Isolatednodefor Geocast Routing In Va...pijans
Geocasting is a special variant of multicasting, where data packet or message is transmitted to a predefined
geographical location i.e., known as geocast region. The applications of geocasting in VANET are to
disseminate information like, collision warning, advertising, alerts message, etc. The topology of VANET
changes frequently and rapidly due to the fast movement of vehicles. Therefore, the link time between two
neighbouring vehicles exist for a short span of time. This makes delivery of messages to a geocast region
most challenging issue in VANET. In this paper, we have proposed a probabilisticanalytical model based
on neighbour node and isolatednode on the highway. Where highway is divided in to cells.For the better
network connectivity in multi hop vehicular ad hoc network each cell should have at least one node. The
numerical results show how connectivity between nodes depends on the transmission range, network
density and total network area.
PERFORMANCE ANALYSIS OF OLSR PROTOCOL IN MANET CONSIDERING DIFFERENT MOBILITY...ijwmn
A Mobile Ad Hoc Network (MANET) is created when an independent mobile node network is connected
dynamically via wireless links. MANET is a self-organizing network that does not rely on pre-existing
infrastructure such as wired or wireless network routers. Mobile nodes in this network move randomly,
thus, the topology is always changing. Routing protocols in MANET are critical in ensuring dependable
and consistent connectivity between the mobile nodes. They conclude logically based on the interaction
between mobile nodes in MANET routing and encourage them to choose the optimum path between source
and destination. Routing protocols are classified as proactive, reactive, or hybrid. The focus of this project
will be on Optimized Link State Routing (OLSR) protocol, a proactive routing technique. OLSR is known as
the optimized variant of link state routing in which packets are sent throughout the network using the
multipoint relay (MPR) mechanism. This article evaluates the performance of the OLSR routing protocol
under condition of changing mobility speed and network density. The study's performance indicators are
average packet throughput, packet delivery ratio (PDR), and average packet latency. Network Simulator 2
(NS-2) and an external patch UM-OLSR are used to simulate and evaluate the performance of such
protocol. As a result of research, the approach of implementing the MPR mechanism are able to minimise
redundant data transmission during the normal message broadcast. The MPRs enhance the link state
protocols’ traditional diffusion mechanism by selecting the right MPRs. Hence, the number of undesired
broadcasts can be reduced and limited. Further research will focus on different scenario and environment
using different mobility model
PERFORMANCE ANALYSIS OF OLSR PROTOCOL IN MANET CONSIDERING DIFFERENT MOBILITY...ijwmn
A Mobile Ad Hoc Network (MANET) is created when an independent mobile node network is connected dynamically via wireless links. MANET is a self-organizing network that does not rely on pre-existing infrastructure such as wired or wireless network routers. Mobile nodes in this network move randomly, thus, the topology is always changing. Routing protocols in MANET are critical in ensuring dependable and consistent connectivity between the mobile nodes. They conclude logically based on the interaction between mobile nodes in MANET routing and encourage them to choose the optimum path between source and destination. Routing protocols are classified as proactive, reactive, or hybrid. The focus of this project will be on Optimized Link State Routing (OLSR) protocol, a proactive routing technique. OLSR is known as the optimized variant of link state routing in which packets are sent throughout the network using the multipoint relay (MPR) mechanism. This article evaluates the performance of the OLSR routing protocol under condition of changing mobility speed and network density. The study's performance indicators are average packet throughput, packet delivery ratio (PDR), and average packet latency. Network Simulator 2 (NS-2) and an external patch UM-OLSR are used to simulate and evaluate the performance of such protocol. As a result of research, the approach of implementing the MPR mechanism are able to minimise redundant data transmission during the normal message broadcast. The MPRs enhance the link state protocols’ traditional diffusion mechanism by selecting the right MPRs. Hence, the number of undesired broadcasts can be reduced and limited. Further research will focus on different scenario and environment using different mobility model.
PRIVACY ENHANCEMENT OF NODE IN OPPORTUNISTIC NETWORK BY USING VIRTUAL-IDijsc
An entrepreneurial system is one of the sort of remote system. Delay resistance system is correspondence
organizing proposition which empowers the correspondence in such a situation where end to end way
might never be exist. Message is forward on the premise of chance. Time interim to convey a message is
long we can't evaluate or anticipate the time until we get the message. There is a security issue in these
sorts of system. In this paper we will proposed another procedure which will expand the protection of the
system and build execution of the system.
International Journal of Computational Engineering Research(IJCER) is an intentional online Journal in English monthly publishing journal. This Journal publish original research work that contributes significantly to further the scientific knowledge in engineering and Technology
MODELING SOCIAL GAUSS-MARKOV MOBILITY FOR OPPORTUNISTIC NETWORK csandit
Mobility is attracting more and more interests due to its importance for data forwarding
mechanisms in many networks such as mobile opportunistic network. In everyday life mobile
nodes are often carried by human. Thus, mobile nodes’ mobility pattern is inevitable affected by
human social character. This paper presents a novel mobility model (HNGM) which combines
social character and Gauss-Markov process together. The performance analysis on this
mobility model is given and one famous and widely used mobility model (RWP) is chosen to
make comparison..
To Get any Project for CSE, IT ECE, EEE Contact Me @ 09849539085, 09966235788 or mail us - ieeefinalsemprojects@gmail.co¬m-Visit Our Website: www.finalyearprojects.org
AN GROUP BEHAVIOR MOBILITY MODEL FOR OPPORTUNISTIC NETWORKS csandit
Mobility is regarded as a network transport mechanism for distributing data in many networks.
However, many mobility models ignore the fact that peer nodes often carried by people and
thus move in group pattern according to some kind of social relation. In this paper, we propose
one mobility model based on group behavior character which derives from real movement
scenario in daily life. This paper also gives the character analysis of this mobility model and
compares with the classic Random Waypoint Mobility model.
To Get any Project for CSE, IT ECE, EEE Contact Me @ 09849539085, 09966235788 or mail us - ieeefinalsemprojects@gmail.co¬m-Visit Our Website: www.finalyearprojects.org
PERUSAL OF INTRUSION DETECTION AND PREVENTION SYSTEM ON A MANET WITH BLACK HO...ijsptm
MANET is a self configuring network of nodes which is a wireless . The nodes in this network move
randomly .Mobility of nodes is more. The nodes are dynamic and infrastructure less ,self maintainable. In
MANET there are many types of security attacks like Blackhole, greyhole attack, wormhole, jellyfish etc.
When the MANET is under blackhole attack there is a loss of energy which is high at the node resulting in
loss of battery backup and also excess of bandwidth may be consumed by the attacker. The attacker is an
insider. Among various mobility models to generate mobility patterns the Random waypoint mobility
model is used .To solve these issues an IDPS framework for MANET using image processing techniques
under blackhole attack is proposed to detect the blackhole attack RREP by providing security services like
authentication and confidentiality.
A Novel Approach for Detection of Routes with Misbehaving Nodes in MANETsIDES Editor
Network nodes in MANET’s are free to move randomly.
Therefore, the network topology may change rapidly.
Routing protocol for MANET’s are used for delivery of data
packets from source to the desired destination, Routing protocols
are also designed based on the assumption that all the
participating nodes are fully cooperative. However, due to the
scarcely available battery based energy, node behaviours may
exist. One such routing misbehaviours is that some nodes may
be selfish by participating in route discovery and maintenance
process, but refuse to forward the packet in order to save its
energy. To solve this problem we propose a reputation based
scheme where the watch dog uses a passive overhearing of
nodes and assign a value to it as an appreciation or add nuggets
to them. In this proposal, nodes with highest value are
highly recommended for data forwarding and allow nodes to
avoid the use of misbehaving nodes in future route selection.
AdHoc On Demand Distance vector routing protocol may be
used to get the recommendation details of the node intended
to forward the packet from the neighbouring nodes. This paper
proposes a novel method to mitigate the route with misbehaving
nodes and also suggests a way to find if any intruder is
present in the cluster of participating nodes using security
aware AODV protocol.
ConNeKTion: A Tool for Exploiting Conceptual Graphs Automatically Learned fro...University of Bari (Italy)
Studying, understanding and exploiting the content of a digital library, and extracting useful information thereof, require automatic techniques that can effectively support the users. To this aim, a relevant role can be played by concept taxonomies. Unfortunately, the availability of such a kind of resources is limited, and their manual building and maintenance are costly and error-prone. This work presents ConNeKTion, a tool for conceptual graph learning and exploitation. It allows to learn conceptual graphs from plain text and to enrich them by finding concept generalizations. The resulting graph can be used for several purposes: finding relationships between concepts (if any), filtering the concepts from a particular perspective, keyword extraction and information retrieval. A suitable control panel is provided for the user to comfortably carry out these activities.
ROBUST TEXT DETECTION AND EXTRACTION IN NATURAL SCENE IMAGES USING CONDITIONA...ijiert bestjournal
In Natural Scene Image,Text detection is important tasks which are used for many content based image analysis. A maximally stable external region based method is us ed for scene detection .This MSER based method incl udes stages character candidate extraction,text candida te construction,text candidate elimination & text candidate classification. Main limitations of this method are how to detect highly blurred text in low resolutio n natural scene images. The current technology not focuses on any t ext extraction method. In proposed system a Conditi onal Random field (CRF) model is used to assign candidat e component as one of the two classes (text& Non Te xt) by Considering both unary component properties and bin ary contextual component relationship. For this pur pose we are using connected component analysis method. The proposed system also performs a text extraction usi ng OCR
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Community aware opportunistic routin...IEEEGLOBALSOFTTECHNOLOGIES
To Get any Project for CSE, IT ECE, EEE Contact Me @ 09849539085, 09966235788 or mail us - ieeefinalsemprojects@gmail.com-Visit Our Website: www.finalyearprojects.org
A Study of Secure Efficient Ad hoc Distance Vector Routing Protocols for MANETsIJMER
International Journal of Modern Engineering Research (IJMER) is Peer reviewed, online Journal. It serves as an international archival forum of scholarly research related to engineering and science education.
International Journal of Modern Engineering Research (IJMER) covers all the fields of engineering and science: Electrical Engineering, Mechanical Engineering, Civil Engineering, Chemical Engineering, Computer Engineering, Agricultural Engineering, Aerospace Engineering, Thermodynamics, Structural Engineering, Control Engineering, Robotics, Mechatronics, Fluid Mechanics, Nanotechnology, Simulators, Web-based Learning, Remote Laboratories, Engineering Design Methods, Education Research, Students' Satisfaction and Motivation, Global Projects, and Assessment…. And many more.
Present new mechanisms for modelling multiple interfaces on a node, support for interference-limited links and a frame-work for modelling complex applications running on the nodes. Furthermore, provide an overview of concrete use cases where the simulator has been successfully exploited to study a variety of aspects related to opportunistic, message-based communications. Node movement is implemented by movement models. These are either synthetic models or existing movement traces. Connectivity between the nodes is based on their location, communication range and the bit-rate. The routing function is implemented by routing modules that decide which messages to forward over existing contacts. Finally, the messages themselves are generated either through event generators that generate random traffic between the nodes, or through applications that generate traffic based on application interactions. The main functions of the simulator are the modelling of node movement, inter-node contacts using various interfaces, routing, message handling and application interactions. Result collection and analysis are done through visualization, reports and post-processing tools.
International Journal of Computational Engineering Research(IJCER) is an intentional online Journal in English monthly publishing journal. This Journal publish original research work that contributes significantly to further the scientific knowledge in engineering and Technology.
An Efficient DTN Routing Algorithm for Automatic Crime Information Sharing fo...IJSRD
Delay Tolerant Network shows many issues that are exist in traditional network. Opportunistic network emerge as interesting evolution in MANET. Mobile nodes in the opportunistic network communicate with each other even in case of no route connection. In this paper a kiosk (or hub station) that is connected to villages to establish internet connection. Such kiosk is placed where traffic frequency is high. We will use high frequency sensor in vehicles. When passing through kiosk, high frequency sensor will establish connection to kiosk & kiosk will connect villages to internet. This system is very useful in crime information sharing services. As an example, if there are a person who is victim of any crime or in a trouble condition. He/she have mobile devices connect to internet. They send a trouble message which is passed to near kiosk and passed on to vehicles and forward their information to police station. This system is helpful in villages, where network communication is not proper.
An Analytical Analysis Of Neighbour And Isolatednodefor Geocast Routing In Va...pijans
Geocasting is a special variant of multicasting, where data packet or message is transmitted to a predefined
geographical location i.e., known as geocast region. The applications of geocasting in VANET are to
disseminate information like, collision warning, advertising, alerts message, etc. The topology of VANET
changes frequently and rapidly due to the fast movement of vehicles. Therefore, the link time between two
neighbouring vehicles exist for a short span of time. This makes delivery of messages to a geocast region
most challenging issue in VANET. In this paper, we have proposed a probabilisticanalytical model based
on neighbour node and isolatednode on the highway. Where highway is divided in to cells.For the better
network connectivity in multi hop vehicular ad hoc network each cell should have at least one node. The
numerical results show how connectivity between nodes depends on the transmission range, network
density and total network area.
PERFORMANCE ANALYSIS OF OLSR PROTOCOL IN MANET CONSIDERING DIFFERENT MOBILITY...ijwmn
A Mobile Ad Hoc Network (MANET) is created when an independent mobile node network is connected
dynamically via wireless links. MANET is a self-organizing network that does not rely on pre-existing
infrastructure such as wired or wireless network routers. Mobile nodes in this network move randomly,
thus, the topology is always changing. Routing protocols in MANET are critical in ensuring dependable
and consistent connectivity between the mobile nodes. They conclude logically based on the interaction
between mobile nodes in MANET routing and encourage them to choose the optimum path between source
and destination. Routing protocols are classified as proactive, reactive, or hybrid. The focus of this project
will be on Optimized Link State Routing (OLSR) protocol, a proactive routing technique. OLSR is known as
the optimized variant of link state routing in which packets are sent throughout the network using the
multipoint relay (MPR) mechanism. This article evaluates the performance of the OLSR routing protocol
under condition of changing mobility speed and network density. The study's performance indicators are
average packet throughput, packet delivery ratio (PDR), and average packet latency. Network Simulator 2
(NS-2) and an external patch UM-OLSR are used to simulate and evaluate the performance of such
protocol. As a result of research, the approach of implementing the MPR mechanism are able to minimise
redundant data transmission during the normal message broadcast. The MPRs enhance the link state
protocols’ traditional diffusion mechanism by selecting the right MPRs. Hence, the number of undesired
broadcasts can be reduced and limited. Further research will focus on different scenario and environment
using different mobility model
PERFORMANCE ANALYSIS OF OLSR PROTOCOL IN MANET CONSIDERING DIFFERENT MOBILITY...ijwmn
A Mobile Ad Hoc Network (MANET) is created when an independent mobile node network is connected dynamically via wireless links. MANET is a self-organizing network that does not rely on pre-existing infrastructure such as wired or wireless network routers. Mobile nodes in this network move randomly, thus, the topology is always changing. Routing protocols in MANET are critical in ensuring dependable and consistent connectivity between the mobile nodes. They conclude logically based on the interaction between mobile nodes in MANET routing and encourage them to choose the optimum path between source and destination. Routing protocols are classified as proactive, reactive, or hybrid. The focus of this project will be on Optimized Link State Routing (OLSR) protocol, a proactive routing technique. OLSR is known as the optimized variant of link state routing in which packets are sent throughout the network using the multipoint relay (MPR) mechanism. This article evaluates the performance of the OLSR routing protocol under condition of changing mobility speed and network density. The study's performance indicators are average packet throughput, packet delivery ratio (PDR), and average packet latency. Network Simulator 2 (NS-2) and an external patch UM-OLSR are used to simulate and evaluate the performance of such protocol. As a result of research, the approach of implementing the MPR mechanism are able to minimise redundant data transmission during the normal message broadcast. The MPRs enhance the link state protocols’ traditional diffusion mechanism by selecting the right MPRs. Hence, the number of undesired broadcasts can be reduced and limited. Further research will focus on different scenario and environment using different mobility model.
Effects of mobility models and nodes distribution on wireless sensors networksijasuc
Wireless sensor networks (WSN) is an important future technology, in several applications in military,
health, environment and industries. Currently the integration of social and sensor is very important by
considering the characteristics of social networks in designing wireless sensor networks WSN for
improvement such as (number of messages from source to destination, radius of coverage, connectivity, and
spreading). This area has not received much attention and few researches focus on the performance
evaluation. In this paper we have studied the impact of different mobility and distribution models which is a
variable one should define which model is best for the infrastructure given their differences, also study
include the exact effect of nodes distribution and analyzed by calculation the number of messages of 12
cases to get a real performance evaluation under different conditions and same routing techniques. This
work provides us a greater understanding and clear an idea of the effect of mobility plus distribution.
Route Stability in Mobile Ad-Hoc Networksarpublication
A Mobile Ad Hoc Network (MANET) is a wireless network consisting of mobile nodes, which can communicate with each other without any infrastructure support. In these networks, nodes typically cooperate with each other, by forwarding packets for nodes which are not in the communication range of the source node. A fundamental issue arising in mobile ad-hoc networks (MANETs) is the selection of the optimal path between any two nodes. A method that has been advocated to improve routing efficiency is to select the most stable path so as to reduce the latency and the overhead due to route reconstruction. In this work we study the stability of a routing path, which is subject to link failures caused by node mobility, and we consider as metrics of interest the duration and the availability of a path. Moreover, using the results on path duration and availability, we show how to determine the optimal path in terms of route stability, under the Random Direction mobility models.
SHADOWING EFFECTS ON ROUTING PROTOCOL OF MULTIHOP AD HOC NETWORKSijasuc
Two-ray ground reflection model has been widely used as the propagation model to investigate the
performance of an ad hoc network. But two-ray model is too simple to represent a real world network. A
more realistic model namely shadowing propagation model has been used in this investigation. Under
shadowing propagation model, a mobile node may receive a packet at a signal level that is below a
required threshold level. This low signal level affects the routing protocol as well as the medium access
control protocol of a network. An analytical model has been presented in this paper to investigate the
shadowing effects on the network performance. The analytical model has been verified via simulation
results. Simulation results show that the performance of a network becomes very poor if shadowing
propagation model is used in compare to the simple two-ray model. Two solutions have also been proposed
in this paper to overcome the effects of shadowing. One solution is a physical layer solution and the other
one is a Medium Access Control (MAC) layer solution. Simulation results show that these two solutions
reduce the shadowing effect and improve network performance.
SHADOWING EFFECTS ON ROUTING PROTOCOL OF MULTIHOP AD HOC NETWORKSijasuc
Two-ray ground reflection model has been widely used as the propagation model to investigate the
performance of an ad hoc network. But two-ray model is too simple to represent a real world network. A
more realistic model namely shadowing propagation model has been used in this investigation. Under
shadowing propagation model, a mobile node may receive a packet at a signal level that is below a
required threshold level. This low signal level affects the routing protocol as well as the medium access
control protocol of a network. An analytical model has been presented in this paper to investigate the
shadowing effects on the network performance. The analytical model has been verified via simulation
results. Simulation results show that the performance of a network becomes very poor if shadowing
propagation model is used in compare to the simple two-ray model. Two solutions have also been proposed
in this paper to overcome the effects of shadowing. One solution is a physical layer solution and the other
one is a Medium Access Control (MAC) layer solution. Simulation results show that these two solutions
reduce the shadowing effect and improve network performance.
SHADOWING EFFECTS ON ROUTING PROTOCOL OF MULTIHOP AD HOC NETWORKSijasuc
Two-ray ground reflection model has been widely used as the propagation model to investigate the
performance of an ad hoc network. But two-ray model is too simple to represent a real world network. A
more realistic model namely shadowing propagation model has been used in this investigation. Under
shadowing propagation model, a mobile node may receive a packet at a signal level that is below a
required threshold level. This low signal level affects the routing protocol as well as the medium access
control protocol of a network. An analytical model has been presented in this paper to investigate the
shadowing effects on the network performance. The analytical model has been verified via simulation
results. Simulation results show that the performance of a network becomes very poor if shadowing
propagation model is used in compare to the simple two-ray model. Two solutions have also been proposed
in this paper to overcome the effects of shadowing. One solution is a physical layer solution and the other
one is a Medium Access Control (MAC) layer solution. Simulation results show that these two solutions
reduce the shadowing effect and improve network performance.
In this paper we propose a system that allows a safe and secure data transfer in MANETs between the source and the destination. As MANETs are unplanned networks and networks of instant communication, they are prone to attacks like disclosure, brute force attacks etc. In this paper we mainly concentrate on limiting the disclosure attacks in MANETs. Disclosure attack means that the network is monitored quietly without modifying it. The monitoring of network is possible only if the traffic is known. Hiding of traffic between the source and destination would prevent disclosure attacks in MANETs. To hide the traffic between the source and destination we must identify it. The traffic is identified using STARS(Statistical Traffic Pattern Discovery System for MANETs) technique. Using this technique, the traffic is made observable only for the intermediary nodes and the data is sent via intermediary nodes to the destination as single hop. The data which is sent as single hop by hop via intermediary nodes prevents the malicious node from knowing the original source and destination and thus preventing MANETs from disclosure attack.
Manets: Increasing N-Messages Delivery Probability Using Two-Hop Relay with E...ijceronline
International Journal of Computational Engineering Research(IJCER) is an intentional online Journal in English monthly publishing journal. This Journal publish original research work that contributes significantly to further the scientific knowledge in engineering and Technology.
COMMUNITY DETECTION USING INTER CONTACT TIME AND SOCIAL CHARACTERISTICS BASED...ijasuc
Delay Tolerant Networks (DTNs) where the node connectivity is opportunistic and end-to-end path between
any pair of source and destination is not guaranteed most of the time. Hence the messages are transferred
from source to destination via intermediate nodes on hop to hop basis using store-carry-forward paradigm.
Due to quick advancement in hand held devices such as smart phone and laptop with support of wireless
communication interface carried by human being, it is possible in coming days to use DTNs for message
dissemination without setting up infrastructure. The routing task becomes challenging in DTNs due to
intermittent network connectivity and the connection opportunity arises only when node comes in
transmission range of each other. The performance of the routing protocols depend on the selection of
appropriate relay node which can deliver the message to final destination in case of source and destination
do not meet at all. Many social characteristics are exhibited by the human being like friendship,
community, similarity and centrality which can be exploited by the routing protocol in order to take the
forwarding decisions. Literature shows that by using these characteristics, the performance of DTN routing
protocols have been improved in terms of delivery probability. The existing routing schemes used
community detection using aggregated contact duration and contact frequency which does not change over
the time period. We propose community detection through Inter Contact Time (ICT) between node pair
using power law distribution where the members of community are added and removed dynamically. We
also considered single copy of each message in entire network to reduce the network overhead. The
proposed routing protocol named Social Based Single Copy Routing (SBSCR) selects the suitable relay
node from the community members only based on the social metrics such as similarity and friendship
together. ICTs show power law nature in human mobility which is used to detect the community structure at
each node. A node maintains its own community and social metrics such as similarity and friendship with
other nodes. Whenever node has to select the relay node then it selects from its community with higher
value of social metric. The simulations are conducted using ONE simulator on the real traces of campus
and conference environments. SBSCR is compared with existing schemes and results show that it
outperforms in terms of delivery probability and delivery delay with comparable overhead ratio.
Community Detection Using Inter Contact Time and Social Characteristics Based...jake henry
Delay Tolerant Networks (DTNs) where the node connectivity is opportunistic and end-to-end path between
any pair of source and destination is not guaranteed most of the time. Hence the messages are transferred
from source to destination via intermediate nodes on hop to hop basis using store-carry-forward paradigm.
Due to quick advancement in hand held devices such as smart phone and laptop with support of wireless
communication interface carried by human being, it is possible in coming days to use DTNs for message
dissemination without setting up infrastructure. The routing task becomes challenging in DTNs due to
intermittent network connectivity and the connection opportunity arises only when node comes in
transmission range of each other. The performance of the routing protocols depend on the selection of
appropriate relay node which can deliver the message to final destination in case of source and destination
do not meet at all. Many social characteristics are exhibited by the human being like friendship,
community, similarity and centrality which can be exploited by the routing protocol in order to take the
forwarding decisions. Literature shows that by using these characteristics, the performance of DTN routing
protocols have been improved in terms of delivery probability. The existing routing schemes used
community detection using aggregated contact duration and contact frequency which does not change over
the time period. We propose community detection through Inter Contact Time (ICT) between node pair
using power law distribution where the members of community are added and removed dynamically. We
also considered single copy of each message in entire network to reduce the network overhead. The
proposed routing protocol named Social Based Single Copy Routing (SBSCR) selects the suitable relay
node from the community members only based on the social metrics such as similarity and friendship
together. ICTs show power law nature in human mobility which is used to detect the community structure at
each node. A node maintains its own community and social metrics such as similarity and friendship with
other nodes. Whenever node has to select the relay node then it selects from its community with higher
value of social metric. The simulations are conducted using ONE simulator on the real traces of campus
and conference environments. SBSCR is compared with existing schemes and results show that it
outperforms in terms of delivery probability and delivery delay with comparable overhead ratio.
COMMUNITY DETECTION USING INTER CONTACT TIME AND SOCIAL CHARACTERISTICS BASED...ijasuc
Delay Tolerant Networks (DTNs) where the node connectivity is opportunistic and end-to-end path between
any pair of source and destination is not guaranteed most of the time. Hence the messages are transferred
from source to destination via intermediate nodes on hop to hop basis using store-carry-forward paradigm.
Due to quick advancement in hand held devices such as smart phone and laptop with support of wireless
communication interface carried by human being, it is possible in coming days to use DTNs for message
dissemination without setting up infrastructure. The routing task becomes challenging in DTNs due to
intermittent network connectivity and the connection opportunity arises only when node comes in
transmission range of each other. The performance of the routing protocols depend on the selection of
appropriate relay node which can deliver the message to final destination in case of source and destination
do not meet at all. Many social characteristics are exhibited by the human being like friendship,
community, similarity and centrality which can be exploited by the routing protocol in order to take the
forwarding decisions. Literature shows that by using these characteristics, the performance of DTN routing
protocols have been improved in terms of delivery probability. The existing routing schemes used
community detection using aggregated contact duration and contact frequency which does not change over
the time period. We propose community detection through Inter Contact Time (ICT) between node pair
using power law distribution where the members of community are added and removed dynamically. We
also considered single copy of each message in entire network to reduce the network overhead. The
proposed routing protocol named Social Based Single Copy Routing (SBSCR) selects the suitable relay
node from the community members only based on the social metrics such as similarity and friendship
together. ICTs show power law nature in human mobility which is used to detect the community structure at
each node. A node maintains its own community and social metrics such as similarity and friendship with
other nodes. Whenever node has to select the relay node then it selects from its community with higher
value of social metric. The simulations are conducted using ONE simulator on the real traces of campus
and conference environments. SBSCR is compared with existing schemes and results show that it
outperforms in terms of delivery probability and delivery delay with comparable overhead ratio.
PERFORMANCE STUDY AND SIMULATION OF AN ANYCAST PROTOCOL FOR WIRELESS MOBILE A...ijwmn
This paper conducts a detailed simulation study of stateless anycast routing in a mobile wireless ad hoc
network. The model covers all the fundamental aspects of such networks with a routing mechanism using
a scheme of orientation-dependent inter-node communication links. The simulation system Winsim is used
which explicitly represents parallelism of events and processes in the network. The purpose of these
simulations is to investigate the effect of node’s maximum speed, and different TTL over the network
performance under two different scenarios. Simulation study investigates five practically important
performance metrics of a wireless mobile ad hoc network and shows the dependence of this metrics on
the transmission radius, link availability, and maximal possible node speed
Similar to THE IMPACT OF MOBILE NODES ARRIVAL PATTERNS IN MANETS USING POISSON MODELS (20)
MULTIMODAL COURSE DESIGN AND IMPLEMENTATION USING LEML AND LMS FOR INSTRUCTIO...IJMIT JOURNAL
Traditionally, teaching has been centered around classroom delivery. However, the onslaught of the
COVID-19 pandemic has cultivated usage of technology, teaching, and learning methodologies for course
delivery. We investigate and describe different modes of course delivery that maintain the integrity of
teaching and learning. This paper answers to the research questions: 1) What course delivery method our
academic institutions use and why? 2) How can instructors validate the guidelines of the institutions? 3)
How courses should be taught to provide student learning outcomes? Using the Learning Environment
Modeling Language (LEML), we investigate the design and implementation of courses for delivery in the
following environments: face-to-face, online synchronous, asynchronous, hybrid, and hyflex. A good
course design and implementation are key components of instructional alignment. Furthermore, we
demonstrate how to design, implement, and deliver courses in synchronous, asynchronous, and hybrid
modes and describe our proposed enhancements to LEML.
Novel R&D Capabilities as a Response to ESG Risks-Lessons From Amazon’s Fusio...IJMIT JOURNAL
Environmental, Social, and Governance (ESG) management is essential for transforming corporate
financial performance-oriented business strategies into Finance (F) + ESG optimization strategies to
achieve the Sustainable Development Goals (SDGs).
In this trend, the rise of ESG risks has divided firms into two categories. Former incorporates a growthmindset that creates a passion for learning, and urges it to improve itself by endeavoring Research and
development (R&D) -driven challenges, while the other category, characterized by risk aversion, avoids
challenging highly uncertain R&D activities and seeks more manageable endeavors.
This duality underscores the complexity of corporate R&D strategies in addressing ESG risks and
necessitates the development of novel R&D capabilities for corporate R&D transformation strategies
towards F + ESG optimization.
International Journal of Managing Information Technology (IJMIT) ** WJCI IndexedIJMIT JOURNAL
The International Journal of Managing Information Technology (IJMIT) is a quarterly open access peer-reviewed journal that publishes articles that contribute new results in all areas of the strategic application of information technology (IT) in organizations. The journal focuses on innovative ideas and best practices in using IT to advance organizations – for-profit, non-profit, and governmental. The goal of this journal is to bring together researchers and practitioners from academia, government, and industry to focus on understanding both how to use IT to support the strategy and goals of the organization and to employ IT in new ways to foster greater collaboration, communication, and information sharing both within the organization and with its stakeholders. The International Journal of Managing Information Technology seeks to establish new collaborations, new best practices, and new theories in these areas.
International Journal of Managing Information Technology (IJMIT) ** WJCI IndexedIJMIT JOURNAL
The International Journal of Managing Information Technology (IJMIT) is a quarterly open access peer-reviewed journal that publishes articles that contribute new results in all areas of the strategic application of information technology (IT) in organizations. The journal focuses on innovative ideas and best practices in using IT to advance organizations – for-profit, non-profit, and governmental. The goal of this journal is to bring together researchers and practitioners from academia, government, and industry to focus on understanding both how to use IT to support the strategy and goals of the organization and to employ IT in new ways to foster greater collaboration, communication, and information sharing both within the organization and with its stakeholders. The International Journal of Managing Information Technology seeks to establish new collaborations, new best practices, and new theories in these areas.
NOVEL R & D CAPABILITIES AS A RESPONSE TO ESG RISKS- LESSONS FROM AMAZON’S FU...IJMIT JOURNAL
Environmental, Social, and Governance (ESG) management is essential for transforming corporate
financial performance-oriented business strategies into Finance (F) + ESG optimization strategies to
achieve the Sustainable Development Goals (SDGs).
In this trend, the rise of ESG risks has divided firms into two categories. Former incorporates a growthmindset that creates a passion for learning, and urges it to improve itself by endeavoring Research and
development (R&D) -driven challenges, while the other category, characterized by risk aversion, avoids
challenging highly uncertain R&D activities and seeks more manageable endeavors.
This duality underscores the complexity of corporate R&D strategies in addressing ESG risks and
necessitates the development of novel R&D capabilities for corporate R&D transformation strategies
towards F + ESG optimization.
Building on this premise, this paper conducts an empirical analysis, utilizing reliable firms data on ESG
risk and brand value, with a focus on 100 global R&D leader firms. It analyzes R&D and actions for ESG
risk mitigation, and assesses the development of new functions that fulfill F + ESG optimization through
R&D. The analysis also highlights the significance of network externality effects, with a specific focus on
Amazon, a leading R&D company, providing insights into the direction for transforming R&D strategies
towards F + ESG optimization.
The dynamics of stakeholder engagement in F + ESG optimization are indicated with the example of
amazon's activities. Through the analysis, it became evident that Amazon's capacity encompassing growth
and scalability, specifically its ability to grow and expand, is accelerating high-level research and
development by gaining the trust of stakeholders in the "synergy through R&D-driven ESG risk
mitigation."
Finally, as examples of these initiatives, the paper discussed the Climate Pledge led by Amazon and the
transformation of Japan's management system.
A REVIEW OF STOCK TREND PREDICTION WITH COMBINATION OF EFFECTIVE MULTI TECHNI...IJMIT JOURNAL
It is important for investors to understand stock trends and market conditions before trading stocks. Both
these capabilities are very important for an investor in order to obtain maximized profit and minimized
losses. Without this capability, investors will suffer losses due to their ignorance regarding stock trends
and market conditions. Technical analysis helps to understand stock prices behavior with regards to past
trends, the signals given by indicators and the major turning points of the market price. This paper reviews
the stock trend predictions with a combination of the effective multi technical indicator strategy to increase
investment performance by taking into account the global performance and the proposed combination of
effective multi technical indicator strategy model.
INTRUSION DETECTION SYSTEM USING CUSTOMIZED RULES FOR SNORTIJMIT JOURNAL
These days the security provided by the computer systems is a big issue as it always has the threats of
cyber-attacks like IP address spoofing, Denial of Service (DOS), token impersonation, etc. The security
provided by the blue team operations tends to be costly if done in large firms as a large number of systems
need to be protected against these attacks. This leads these firms to turn to less costly security
configurations like IDS Suricata and IDS Snort. The main theme of the project is to improve the services
provided by Snort which is a tool used in creating a vague defense against cyber-attacks like DDOS
attacks which are done on both physical and network layers. These attacks in turn result in loss of
extremely important data. The rules defined in this project will result in monitoring traffic, analyzing it,
and taking appropriate action to not only stop the attack but also locate its source IP address. This whole
process uses different tools other than Snort like Wireshark, Wazuh and Splunk. The product of this will
result in not only the detection of the attack but also the source IP address of the machine on which the
attack is initiated and completed. The end product of this research will result in sets of default rules for the
Snort tool which will not only be able to provide better security than its previous versions but also be able
to provide the user with the IP address of the attacker or the person conducting the attack. The system
involves the integration of Wazuh with Snort tool in order to make it more efficient than IDS Suricata
which is another intrusion detection system capable of detecting all these types of attacks as mentioned.
Splunk is another tool used in this project which increases the firewall efficiency to pass the no. of bits to
be scanned and the no. of bits scanned successfully. Wazuh is used in this system as it is the best choice for
traffic monitoring and incident response than any other of its alternatives in the market. Since this system
is used in firms which are known to handle big amounts of data and for this purpose, we use Splunk tool as
it is very efficient in handling big amounts of data. Wireshark is used in this system in order to give the IDS
automation in its capability to capture and report the malicious packets found during the network scan. All
of this gives the IDS a capability of a low budget automated threat detection system. This paper gives
complete guidelines for authors submitting papers for the AIRCC Journals.
Artificial Intelligence (AI) has rapidly become a critical technology for businesses seeking to improve
efficiency and profitability. One area where AI is proving particularly impactful is in service operations
management, where it is used to create AI-powered service operations (AIServiceOps) that deliver highvalue services to customers. AIServiceOps involve the use of AI to automate and optimize various business
processes, such as customer service, sales, marketing, and supply chain management. The rapid
development of Artificial Intelligence has prompted many changes in the field of Information Technology
(IT) Service Operations. IT Service Operations are driven by AI, i.e., AIServiceOps. AI has empowered
new vitality and addressed many challenges in IT Service Operations. However, there is a literature gap on
the Business Value Impact of Artificial intelligence (AI) Powered IT Service Operations. It can help IT
build optimized business resilience by creating value in complex and ever-changing environments as
product organizations move faster than IT can handle. So, this research paper examines how AIServiceOps
creates business value and sustainability, basically how AIServiceOps makes the IT staff liberation from a
low-level, repetitive workout and traditional IT practices for a continuously optimized process. One of the
research objectives is to compare Traditional IT Service Operations with AIServiceOPs. This paper
provides the basis for how enterprises can evaluate AIServiceOps and consider it a digital transformation
tool. The paper presents a case study of a company that implemented AI-powered service operations
(AIServiceOps) and analyzes the resulting business outcomes. The study shows that AIServiceOps can
significantly improve service delivery, reduce response times, and increase customer satisfaction.
Furthermore, it demonstrates how AIServiceOps can deliver substantial cost savings, such as reducing
labor costs and minimizing downtime.
MEDIATING AND MODERATING FACTORS AFFECTING READINESS TO IOT APPLICATIONS: THE...IJMIT JOURNAL
Although IOT seems to be the upcoming trend, it is still in its infancy; especially in the banking industry.
There is a clear gap in literature, as only few studies identify factors affecting readiness to IOT
applications in banks in general, and almost negligible investigations on mediating and moderating
factors. Accordingly, this research aims to investigate the main factors that affect employees’ readiness to
IOT applications, while highlighting the mediating and moderating factors in the Egyptian banking sector.
The importance of Egypt stems from its high population and steady steps taken towards technology
adoption. 479 valid questionnaires were distributed over HR employees in banks. Data collected was
statistically analysed using Regression and SEM. Results showed a significant impact of ‘Security’,
‘Networking’, ‘Software Development’ and ‘Regulations’ on ‘readiness to IOT applications. Thus, the
readiness acceptance level is high‘Security’ and ‘User Intention’ were proven to mediate the relationship
between research variables and readiness to IOT applications, and only a partial moderation role was
proven for ‘Efficiency’. The study contributes to increasing literature on IOT applications in general, and
fills a gap on the Egyptian banking context in particular. Finally, it provides decision makers at banks with
useful guidelines on how to optimally promote IOT applications among employees.
EFFECTIVELY CONNECT ACQUIRED TECHNOLOGY TO INNOVATION OVER A LONG PERIODIJMIT JOURNAL
IT (Information and Communication Technology) companies are facing the dilemma of decreasing
productivity despite increasing research and development efforts. M&A (Merger and Acquisition) is being
considered as a breakthrough solution. From existing research, it has been pointed out that M&A leads to
the emergence of new innovations. Purpose of this study was to discuss the efficient ways of acquisition and
to resolve the dilemma of productivity decline by clarifying how the technology obtained through M&A
leads to the creation of new innovations. Hypothesis 1 was that the technology acquired through M&A is
utilized for innovation creation, Hypothesis 2 was that the acquired technology is utilized over a long
period of time, and Hypothesis 3 was that a long-term utilization has a positive impact on corporate
performance. The results, using sports prosthetics as a case study and using patents as a proxy variable,
confirmed all the hypotheses set. We have revealed that long-term utilization of technology obtained
through M&A is effective for creating new innovations.
International Journal of Managing Information Technology (IJMIT) ** WJCI IndexedIJMIT JOURNAL
The International Journal of Managing Information Technology (IJMIT) is a quarterly open access peer-reviewed journal that publishes articles that contribute new results in all areas of the strategic application of information technology (IT) in organizations. The journal focuses on innovative ideas and best practices in using IT to advance organizations – for-profit, non-profit, and governmental. The goal of this journal is to bring together researchers and practitioners from academia, government, and industry to focus on understanding both how to use IT to support the strategy and goals of the organization and to employ IT in new ways to foster greater collaboration, communication, and information sharing both within the organization and with its stakeholders. The International Journal of Managing Information Technology seeks to establish new collaborations, new best practices, and new theories in these areas.
Authors are solicited to contribute to the journal by submitting articles that illustrate research results, projects, surveying works and industrial experiences that describe significant advances in the areas of information technology and management
4th International Conference on Cloud, Big Data and IoT (CBIoT 2023)IJMIT JOURNAL
4th International Conference on Cloud, Big Data and IoT (CBIoT 2023) will act as a major forum for the presentation of innovative ideas, approaches, developments, and research projects in the areas of Cloud, Big Data and IoT. It will also serve to facilitate the exchange of information between researchers and industry professionals to discuss the latest issues and advancement in the area of Cloud, Big Data and IoT.
Authors are solicited to contribute to the conference by submitting articles that illustrate research results, projects, surveying works and industrial experiences that describe significant advances in Cloud, Big Data and IoT.
TRANSFORMING SERVICE OPERATIONS WITH AI: A CASE FOR BUSINESS VALUEIJMIT JOURNAL
Artificial Intelligence (AI) has rapidly become a critical technology for businesses seeking to improve
efficiency and profitability. One area where AI is proving particularly impactful is in service operations
management, where it is used to create AI-powered service operations (AIServiceOps) that deliver highvalue services to customers. AIServiceOps involve the use of AI to automate and optimize various business
processes, such as customer service, sales, marketing, and supply chain management. The rapid
development of Artificial Intelligence has prompted many changes in the field of Information Technology
(IT) Service Operations. IT Service Operations are driven by AI, i.e., AIServiceOps. AI has empowered
new vitality and addressed many challenges in IT Service Operations. However, there is a literature gap on
the Business Value Impact of Artificial intelligence (AI) Powered IT Service Operations. It can help IT
build optimized business resilience by creating value in complex and ever-changing environments as
product organizations move faster than IT can handle. So, this research paper examines how AIServiceOps
creates business value and sustainability, basically how AIServiceOps makes the IT staff liberation from a
low-level, repetitive workout and traditional IT practices for a continuously optimized process. One of the
research objectives is to compare Traditional IT Service Operations with AIServiceOPs. This paper
provides the basis for how enterprises can evaluate AIServiceOps and consider it a digital transformation
tool. The paper presents a case study of a company that implemented AI-powered service operations
(AIServiceOps) and analyzes the resulting business outcomes. The study shows that AIServiceOps can
significantly improve service delivery, reduce response times, and increase customer satisfaction.
Furthermore, it demonstrates how AIServiceOps can deliver substantial cost savings, such as reducing
labor costs and minimizing downtime.
DESIGNING A FRAMEWORK FOR ENHANCING THE ONLINE KNOWLEDGE-SHARING BEHAVIOR OF ...IJMIT JOURNAL
The main objective of this paper is to identify the factors that influence academic staff's digital knowledgesharing behaviors in Ethiopian higher education. A structural equation model was used to validate the
research framework using survey data from 210 respondents. The collected data has been analyzed using
Smart PLS software. The results of the study show that trust, self-motivation, and altruism are positively
related to attitude. Contrary to our expectations, knowledge technology negatively affects attitude.
However, reward systems and empowerment by leaders are significantly associated with knowledgesharing intentions.Knowledge-sharing intention, in turn, was significantly related to digital knowledgesharing behavior. The contributions of this study are twofold. The framework may serve as a roadmap for
future researchers and managers considering their strategy to enhance digital knowledge sharing in HEI.
The findings will benefit academic staff and university administrations.The study will also help academic
staff enhance their knowledge-sharing practices.
BUILDING RELIABLE CLOUD SYSTEMS THROUGH CHAOS ENGINEERINGIJMIT JOURNAL
Cloud computing systems need to be reliable so that they can be accessed and used for computing at any
given point in time. The complex nature of cloud systems is the motivation to conduct research in novel
ways of ensuring that cloud systems are built with reliability in mind. In building cloud systems, it is
expected that the cloud system will be able to deal with high demands and unexpected events that affect the
reliability and performance of the system.
In this paper, chaos engineering is considered a heuristic method that can be used to build reliable cloud
systems. Chaos engineering is aimed at exposing weaknesses in systems that are in production. Chaos
engineering will help identify system weaknesses and strengths when a system is exposed to unexpected
knocks and shocks while it is in production.
Chaos engineering allows system developers and administrators to get insights into how the cloud system
will behave when it is exposed to unexpected occurrences.
A REVIEW OF STOCK TREND PREDICTION WITH COMBINATION OF EFFECTIVE MULTI TECHNI...IJMIT JOURNAL
It is important for investors to understand stock trends and market conditions before trading stocks. Both
these capabilities are very important for an investor in order to obtain maximized profit and minimized
losses. Without this capability, investors will suffer losses due to their ignorance regarding stock trends
and market conditions. Technical analysis helps to understand stock prices behavior with regards to past
trends, the signals given by indicators and the major turning points of the market price. This paper reviews
the stock trend predictions with a combination of the effective multi technical indicator strategy to increase
investment performance by taking into account the global performance and the proposed combination of
effective multi technical indicator strategy model.
NETWORK MEDIA ATTENTION AND GREEN TECHNOLOGY INNOVATIONIJMIT JOURNAL
This paper will provide a novel empirical study for the relationship between network media attention and
green technology innovation and examine how network media attention can ease financing constraints. It
collected data from listed companies in China's heavy pollution industry and performed rigorous
regression analysis, in order to innovatively explore the environmental governance functions of the media.
It found that network media attention significantly promotes green technology innovation. By analyzing the
inner mechanism further, it found that network media attention can promote green innovation by easing
financing constraints. Besides, network media attention has a significant positive impact on green invention
patents while not affecting green utility model patents.
INCLUSIVE ENTREPRENEURSHIP IN HANDLING COMPETING INSTITUTIONAL LOGICS FOR DHI...IJMIT JOURNAL
Information System (IS) research advocates employing collaborative and loose coupling strategies to address contradictory issues to address diversified actors’ interests than the prescriptive and unilateral Information Technology (IT) governance mechanisms’, yet it is rarely depicting how managers employ these strategies in Health Information System (HIS) implementation, particularly in a resource-constrained setting where IS implementation activities have highly relied on multiple international organizations resources. This study explored how managers in resource-constrained settings employ collaborative IT governance mechanisms in the case of District Health Information System 2 (DHIS2) adoption with an interpretative case study approach and the institutional logic concept. The institutional logic concept was used to identify the major actors’ logics underpinning the DHIS2 adoption. The study depicted the importance of high-level officials' distance from the dominant systemic logic to consider new alternative, and to employ inclusive IT governance mechanisms which separated resource from the system that facilitated stakeholders’ collaboration in DHIS2 adoption based on their capacity and interest.
DEEP LEARNING APPROACH FOR EVENT MONITORING SYSTEMIJMIT JOURNAL
With an increasing number of extreme events and complexity, more alarms are being used to monitor
control rooms. Operators in the control rooms need to monitor and analyze these alarms to take suitable
actions to ensure the system’s stability and security. Security is the biggest concern in the modern world. It
is important to have a rigid surveillance that should guarantee protection from any sought of hazard.
Considering security, Closed Circuit TV (CCTV) cameras are being utilized for reconnaissance, but these
CCTV cameras require a person for supervision. As a human being, there can be a possibility to be tired
off in supervision at any point of time. So, we need a system to detect automatically. Thus, we came up with
a solution using YOLO V5. We have taken a data set and used robo-flow framework to enhance the existing
images into numerous variations where it will create a copy of grey scale image, a copy of its rotation and
a copy of its blurred version which will be used to get an enlarged data set. This work mainly focuses on
providing a secure environment using CCTV live footage as a source to detect the weapons. Using YOLO
algorithm, it divides an image from the video into grid system and each grid detects an object within itself
MULTIMODAL COURSE DESIGN AND IMPLEMENTATION USING LEML AND LMS FOR INSTRUCTIO...IJMIT JOURNAL
Traditionally, teaching has been centered around classroom delivery. However, the onslaught of the
COVID-19 pandemic has cultivated usage of technology, teaching, and learning methodologies for course
delivery. We investigate and describe different modes of course delivery that maintain the integrity of
teaching and learning. This paper answers to the research questions: 1) What course delivery method our
academic institutions use and why? 2) How can instructors validate the guidelines of the institutions? 3)
How courses should be taught to provide student learning outcomes? Using the Learning Environment
Modeling Language (LEML), we investigate the design and implementation of courses for delivery in the
following environments: face-to-face, online synchronous, asynchronous, hybrid, and hyflex. A good
course design and implementation are key components of instructional alignment. Furthermore, we
demonstrate how to design, implement, and deliver courses in synchronous, asynchronous, and hybrid
modes and describe our proposed enhancements to LEML.
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...Amil Baba Dawood bangali
Contact with Dawood Bhai Just call on +92322-6382012 and we'll help you. We'll solve all your problems within 12 to 24 hours and with 101% guarantee and with astrology systematic. If you want to take any personal or professional advice then also you can call us on +92322-6382012 , ONLINE LOVE PROBLEM & Other all types of Daily Life Problem's.Then CALL or WHATSAPP us on +92322-6382012 and Get all these problems solutions here by Amil Baba DAWOOD BANGALI
#vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore#blackmagicformarriage #aamilbaba #kalajadu #kalailam #taweez #wazifaexpert #jadumantar #vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore #blackmagicforlove #blackmagicformarriage #aamilbaba #kalajadu #kalailam #taweez #wazifaexpert #jadumantar #vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore #Amilbabainuk #amilbabainspain #amilbabaindubai #Amilbabainnorway #amilbabainkrachi #amilbabainlahore #amilbabaingujranwalan #amilbabainislamabad
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptxR&R Consult
CFD analysis is incredibly effective at solving mysteries and improving the performance of complex systems!
Here's a great example: At a large natural gas-fired power plant, where they use waste heat to generate steam and energy, they were puzzled that their boiler wasn't producing as much steam as expected.
R&R and Tetra Engineering Group Inc. were asked to solve the issue with reduced steam production.
An inspection had shown that a significant amount of hot flue gas was bypassing the boiler tubes, where the heat was supposed to be transferred.
R&R Consult conducted a CFD analysis, which revealed that 6.3% of the flue gas was bypassing the boiler tubes without transferring heat. The analysis also showed that the flue gas was instead being directed along the sides of the boiler and between the modules that were supposed to capture the heat. This was the cause of the reduced performance.
Based on our results, Tetra Engineering installed covering plates to reduce the bypass flow. This improved the boiler's performance and increased electricity production.
It is always satisfying when we can help solve complex challenges like this. Do your systems also need a check-up or optimization? Give us a call!
Work done in cooperation with James Malloy and David Moelling from Tetra Engineering.
More examples of our work https://www.r-r-consult.dk/en/cases-en/
Explore the innovative world of trenchless pipe repair with our comprehensive guide, "The Benefits and Techniques of Trenchless Pipe Repair." This document delves into the modern methods of repairing underground pipes without the need for extensive excavation, highlighting the numerous advantages and the latest techniques used in the industry.
Learn about the cost savings, reduced environmental impact, and minimal disruption associated with trenchless technology. Discover detailed explanations of popular techniques such as pipe bursting, cured-in-place pipe (CIPP) lining, and directional drilling. Understand how these methods can be applied to various types of infrastructure, from residential plumbing to large-scale municipal systems.
Ideal for homeowners, contractors, engineers, and anyone interested in modern plumbing solutions, this guide provides valuable insights into why trenchless pipe repair is becoming the preferred choice for pipe rehabilitation. Stay informed about the latest advancements and best practices in the field.
Saudi Arabia stands as a titan in the global energy landscape, renowned for its abundant oil and gas resources. It's the largest exporter of petroleum and holds some of the world's most significant reserves. Let's delve into the top 10 oil and gas projects shaping Saudi Arabia's energy future in 2024.
Democratizing Fuzzing at Scale by Abhishek Aryaabh.arya
Presented at NUS: Fuzzing and Software Security Summer School 2024
This keynote talks about the democratization of fuzzing at scale, highlighting the collaboration between open source communities, academia, and industry to advance the field of fuzzing. It delves into the history of fuzzing, the development of scalable fuzzing platforms, and the empowerment of community-driven research. The talk will further discuss recent advancements leveraging AI/ML and offer insights into the future evolution of the fuzzing landscape.
Automobile Management System Project Report.pdfKamal Acharya
The proposed project is developed to manage the automobile in the automobile dealer company. The main module in this project is login, automobile management, customer management, sales, complaints and reports. The first module is the login. The automobile showroom owner should login to the project for usage. The username and password are verified and if it is correct, next form opens. If the username and password are not correct, it shows the error message.
When a customer search for a automobile, if the automobile is available, they will be taken to a page that shows the details of the automobile including automobile name, automobile ID, quantity, price etc. “Automobile Management System” is useful for maintaining automobiles, customers effectively and hence helps for establishing good relation between customer and automobile organization. It contains various customized modules for effectively maintaining automobiles and stock information accurately and safely.
When the automobile is sold to the customer, stock will be reduced automatically. When a new purchase is made, stock will be increased automatically. While selecting automobiles for sale, the proposed software will automatically check for total number of available stock of that particular item, if the total stock of that particular item is less than 5, software will notify the user to purchase the particular item.
Also when the user tries to sale items which are not in stock, the system will prompt the user that the stock is not enough. Customers of this system can search for a automobile; can purchase a automobile easily by selecting fast. On the other hand the stock of automobiles can be maintained perfectly by the automobile shop manager overcoming the drawbacks of existing system.
Final project report on grocery store management system..pdfKamal Acharya
In today’s fast-changing business environment, it’s extremely important to be able to respond to client needs in the most effective and timely manner. If your customers wish to see your business online and have instant access to your products or services.
Online Grocery Store is an e-commerce website, which retails various grocery products. This project allows viewing various products available enables registered users to purchase desired products instantly using Paytm, UPI payment processor (Instant Pay) and also can place order by using Cash on Delivery (Pay Later) option. This project provides an easy access to Administrators and Managers to view orders placed using Pay Later and Instant Pay options.
In order to develop an e-commerce website, a number of Technologies must be studied and understood. These include multi-tiered architecture, server and client-side scripting techniques, implementation technologies, programming language (such as PHP, HTML, CSS, JavaScript) and MySQL relational databases. This is a project with the objective to develop a basic website where a consumer is provided with a shopping cart website and also to know about the technologies used to develop such a website.
This document will discuss each of the underlying technologies to create and implement an e- commerce website.
Quality defects in TMT Bars, Possible causes and Potential Solutions.PrashantGoswami42
Maintaining high-quality standards in the production of TMT bars is crucial for ensuring structural integrity in construction. Addressing common defects through careful monitoring, standardized processes, and advanced technology can significantly improve the quality of TMT bars. Continuous training and adherence to quality control measures will also play a pivotal role in minimizing these defects.
About
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
• Remote control: Parallel or serial interface.
• Compatible with MAFI CCR system.
• Compatible with IDM8000 CCR.
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
• Easy in configuration using DIP switches.
Technical Specifications
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
Key Features
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
• Remote control: Parallel or serial interface
• Compatible with MAFI CCR system
• Copatiable with IDM8000 CCR
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
Application
• Remote control: Parallel or serial interface.
• Compatible with MAFI CCR system.
• Compatible with IDM8000 CCR.
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
• Easy in configuration using DIP switches.
Welcome to WIPAC Monthly the magazine brought to you by the LinkedIn Group Water Industry Process Automation & Control.
In this month's edition, along with this month's industry news to celebrate the 13 years since the group was created we have articles including
A case study of the used of Advanced Process Control at the Wastewater Treatment works at Lleida in Spain
A look back on an article on smart wastewater networks in order to see how the industry has measured up in the interim around the adoption of Digital Transformation in the Water Industry.
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdffxintegritypublishin
Advancements in technology unveil a myriad of electrical and electronic breakthroughs geared towards efficiently harnessing limited resources to meet human energy demands. The optimization of hybrid solar PV panels and pumped hydro energy supply systems plays a pivotal role in utilizing natural resources effectively. This initiative not only benefits humanity but also fosters environmental sustainability. The study investigated the design optimization of these hybrid systems, focusing on understanding solar radiation patterns, identifying geographical influences on solar radiation, formulating a mathematical model for system optimization, and determining the optimal configuration of PV panels and pumped hydro storage. Through a comparative analysis approach and eight weeks of data collection, the study addressed key research questions related to solar radiation patterns and optimal system design. The findings highlighted regions with heightened solar radiation levels, showcasing substantial potential for power generation and emphasizing the system's efficiency. Optimizing system design significantly boosted power generation, promoted renewable energy utilization, and enhanced energy storage capacity. The study underscored the benefits of optimizing hybrid solar PV panels and pumped hydro energy supply systems for sustainable energy usage. Optimizing the design of solar PV panels and pumped hydro energy supply systems as examined across diverse climatic conditions in a developing country, not only enhances power generation but also improves the integration of renewable energy sources and boosts energy storage capacities, particularly beneficial for less economically prosperous regions. Additionally, the study provides valuable insights for advancing energy research in economically viable areas. Recommendations included conducting site-specific assessments, utilizing advanced modeling tools, implementing regular maintenance protocols, and enhancing communication among system components.
Immunizing Image Classifiers Against Localized Adversary Attacksgerogepatton
This paper addresses the vulnerability of deep learning models, particularly convolutional neural networks
(CNN)s, to adversarial attacks and presents a proactive training technique designed to counter them. We
introduce a novel volumization algorithm, which transforms 2D images into 3D volumetric representations.
When combined with 3D convolution and deep curriculum learning optimization (CLO), itsignificantly improves
the immunity of models against localized universal attacks by up to 40%. We evaluate our proposed approach
using contemporary CNN architectures and the modified Canadian Institute for Advanced Research (CIFAR-10
and CIFAR-100) and ImageNet Large Scale Visual Recognition Challenge (ILSVRC12) datasets, showcasing
accuracy improvements over previous techniques. The results indicate that the combination of the volumetric
input and curriculum learning holds significant promise for mitigating adversarial attacks without necessitating
adversary training.
Immunizing Image Classifiers Against Localized Adversary Attacks
THE IMPACT OF MOBILE NODES ARRIVAL PATTERNS IN MANETS USING POISSON MODELS
1. International Journal of Managing Information Technology (IJMIT) Vol.4, No.3, August 2012
DOI : 10.5121/ijmit.2012.4305 55
THE IMPACT OF MOBILE NODES ARRIVAL
PATTERNS IN MANETS USING POISSON
MODELS
John Tengviel1
, K. A. Dotche2
and K. Diawuo3
1
Department of Computer Engineering, Sunyani Polytechnic, Sunyani, Ghana
john2001gh@yahoo.com
2
Department of Telecommunications Engineering, KNUST, Kumasi, Ghana
kdotche2004@gmail.com
3
Department of Computer Engineering, KNUST, Kumasi, Ghana
kdiawuo@yahoo.com
Abstract
Mobile Ad hoc Networks (MANETs) are dynamic networks populated by mobile stations, or mobile nodes
(MNs). Specifically, MANETs consist of a collection of nodes randomly placed in a line (not necessarily
straight). MANETs do appear in many real-world network applications such as a vehicular MANETs built
along a highway in a city environment or people in a particular location. MNs in MANETs are usually
laptops, PDAs or mobile phones. These devices may use Bluetooth and/or IEEE 802.11 (Wi-Fi) network
interfaces and communicate in a decentralized manner. Mobility is a key feature of MANETs. Each node
may work as a router and the network can dynamically change with time; when new nodes can join, and
other nodes can leave the network.
This paper presents comparative results that have been carried out via Matlab software simulation. The
study investigates the impact of mobile nodes’ parameters such as the speed, the arrival rate and the size of
mobile nodes in a given area using Poisson distribution. The results have indicated that mobile nodes’
arrival rates may have influence on MNs population (as a larger number) in a location.
Keywords
MANETs, Mobility models, Mobile nodes distribution, Arrival Patterns, Poisson distribution.
1. INTRODUCTION
Mobile Ad-hoc NETworks (MANETs) is a collection of wireless mobile nodes configured to
communicate amongst each other without the aid of an existing infrastructure. MANETS are
Multi-Hop wireless networks since one node may not be indirect communication range of other
node. In such cases the data from the original sender has to travel a number of hops (hop is one
communication link) in order to reach the destination. The intermediate nodes act as routers and
forward the data packets till the destination is reached [1, 14].
Like other networks the performance of ad hoc networks is affected by its topology. However, in
ad-hoc networks the role of topology becomes more critical due to nodes’ mobility [1, 2].
2. International Journal of Managing Information Technology (IJMIT) Vol.4, No.3, August 2012
56
Consequently, many simulation tools are being used for ad hoc networks studies with help of
mathematical models known as mobility models to generate various kinds of network topologies.
The initial entry point and distribution of a Mobile Node (MN) may be far random and may be
influenced by various factors (time of day, traffic conditions, weather conditions, rescue mission,
and so on).
Ad hoc networks are viewed to be suitable for all situations in which a temporary communication
is desired. The technology was initially developed keeping in mind the military applications [3]
such as battle field in an unknown territory where an infrastructured network is almost impossible
to have or maintain. In such situations, the ad hoc networks having self-organizing [4, 14]
capability can be effectively used where other technologies either fail or cannot be effectively
deployed. The entire network is mobile, and the individual terminals are allowed to move freely.
Since, the nodes are mobile; the network topology is thus dynamic. This leads to frequent and
unpredictable connectivity changes. In this dynamic topology, some pairs of terminals may not be
able to communicate directly with each other and have to rely on some other terminals so that the
messages are been delivered to their destinations. Such networks are often referred to as multi-
hops or store-and-forward networks [5, 14].
This paper presents a study on mobile nodes in MANETs using Poisson models. We have decided
to use the Poisson distribution since it has some properties that make it very tractable to mobile
nodes arrival pattern. Though not very realistic from a practical point of view, a model based on
the exponential distribution can be of great importance to provide an insight into the mobile
nodes arrival pattern. The section 2 illustrates a brief review on MANETs studies. The section 3
introduces the Poisson distribution models. The simulation procedures and considered parameters
are presented in section 4. The obtained results are objects in section 5 and the section 6 conclude
the paper to further research works.
2. RELATED WORKS
The study of mobility models have shown that currently there are two types used in simulation of
networks [6, 7]. These are traces and synthetic models. Traces are those mobility patterns that are
observed in real-life systems. Traces provide accurate information, especially when they involve
a large number of mobile nodes (MNs) and appropriate long observation period. On the other
hand, synthetic models attempt to realistically represent the behaviour of MNs without the use of
traces. They are divided into two categories, entity mobility models and group mobility models
[8, 9]. The entity mobility models randomise the movements of each individual node and
represent MNs whose movements are independent of each other. However, the group mobility
models are a set of groups’ nodes that stay close to each other and then randomise the movements
of the group and represent MNs whose movements are dependent on each other. The node
positions may also vary randomly around the group reference point. In [10], the mobility study in
ad hoc has been approximated to pedestrian in the street, willing to exchange content (multimedia
files, mp3, etc.) with their handset whilst walking at a relative low speed. All pedestrians have
been assumed to be within a predefine range of communication and do not collide with each other
as it is a case in a dense network. The semi-analytic study has shown that it is possible for
communication devices in urban areas to be made up of an efficient MANETs where they work
and efficiently share content through a unique server. It is important to recall that Mobility
models should be able to mimic the distribution and movement pattern of nodes as in real-life
scenarios. Some researchers have proposed indigenously mobility models such as Random Walk,
3. International Journal of Managing Information Technology (IJMIT) Vol.4, No.3, August 2012
57
Random Waypoint, [3, 4], etc. for performance comparison of various routing protocols. The
concern with indigenously designed models is that they represent a specific scenarios not often
found in real lives. Hence their use in ad hoc network studies is very limited. Random Walk or
Random Waypoint model though simple and elegant, produce random source of entry into a
location with scattered pattern around the simulation area. In real-life, this may not really be the
case.
3. MODELS OF STUDY
3.1. POISSON ARRIVAL DISTRIBUTION (NUMBER OF NODES)
When arrivals occur at random, the information of interest is the probability of n arrivals in a
given time period, where n = 0, 1, 2, . ……n-1
Let ג be a constant representing the average rate of arrival of nodes and consider a small time
interval ∆t, with ∆t →0. The assumptions for this process are as follows:
• The probability of one arrival in an interval of ∆t seconds, say (t, t+∆t) is ∆גt,
independent of arrivals in any time interval not overlapping (t, t+∆t).
• The probability of no arrivals in ∆t seconds is 1-∆גt, under such conditions, it can be
shown that the probability of exactly n nodes arriving during an interval of length of t is
given by the Poisson distribution law [12-14] in equation 1:
۾ሺܖሻ =
ሺૃܜሻܖ܍షૃܜ
!ܖ
, where 1
The assumption of Poisson MN arrivals also implies a distribution of the time intervals between
the arrivals of successive MN in a location. Let being greater than or equal to the time interval t,
so from Equation 1:
۾ሺሻ = ۾ሾૌ ݐሿ = ܍ିૃܜ
2
This MNs distribution in a location is known as the negative exponential distribution and is often
simply referred to as the exponential distribution.
A. INTER-ARRIVAL TIME EXPONENTIAL DISTRIBUTION
This method of arrival specifies the time between arrivals. In this case one indicates the
probability distribution of a continuous random variable which measures the time from one
arrival to the next. If the arrivals follow a Poisson distribution, it can be shown mathematically
that the interarrival time will be distributed according to the exponential distribution [13, 14].
Let assume, if P[tnt] is just the probability that no arrivals occur in (0, t), that is P0(t). Therefore,
we have A(t) = 1 - P0(t). That is the Probability Distribution Function [PDF] is given as in
equation 3.
ܣሺݐሻ = 1 − ݁ିఒ௧
Or ܲܨܦሾܣሺݐሻሿ = 1 − ݁ିఒ௧
, ݐ ≥ 0 3
and its probability density function (pdf) is given by the equation 4.
4. International Journal of Managing Information Technology (IJMIT) Vol.4, No.3, August 2012
58
݂ሺݐሻ =
డሺ௧ሻ
డ௧
= ߣ݁ିఒ௧
, ݐ ≥ 0 4
4. METHODOLOGY
4.1. Queueing System
The queueing system can be described as in Figure 1. by the following characteristics:
i. Arriving Nodes: this is specified by the distribution of inter-arrivals time of nodes, that is
arrival patterns
ii. Exiting Nodes: it is specified by the distribution of the time taken to complete service,
which is assume to be departures
iii. Server: It has a single server or location
iv. Input Source: The number of nodes that arrive in the service facility
v. Queueing Discipline: The first – comes – first serves (FCFS) is assumed as the service
discipline.
Figure 1: M/M/1 Queueing System Model
The Queueing Theory Model allows probabilistic predictions of the MNs movement. The system
model can also be illustrated as in Figure 1. The Assumptions on the mobile nodes and the
network in this study are:
• Independent and identically distributed (IID) - Stationary (Time homogeneity),
• The system (location) consists of a set of n independent MNs communicating over a wireless
network.
• All communication links are bidirectional, i.e., all nodes have the same transmission range,
• Nodes communicate without interference and collision, i.e., a free space propagation model is
considered.
4.2. Simulation Tools and Considerations
The section deals with the simulations in order to study the performance indicators of the
queueing mobility model. A brief description of the simulation environment, the metrices
collected and the various simulations perform follows. The computer program (or simulation)
was run with several random values and the modeled behaviours were recorded for analysis and
displayed in form of snapshot.
4.2.1. MATrix LABoratory (MATLAB) Simulator
The simulations have been carried out by using MatLab [15]. Matlab is developed by
MathsWorks. It is commercially available. It is a high performance language for technical
computing mostly used by engineers and researchers. It can be integrated to oriented languages as
5. International Journal of Managing Information Technology (IJMIT) Vol.4, No.3, August 2012
59
C++, and contains a variety of tools capable of computation and mathematical modeling,
algorithm development and analysis, modeling and simulation, data analysis etc. Hardware and
operating system (OS) configurations for performing simulations were specified as in Table 1
Table 1: Hardware and Software Configuration
Processor Pentium D, CPU 3GHz
RAM 8GB
Hard Drive 350GB
Operating System (OS) Windows Vista/7
MatLab 8
4.2.2. Algorithm
The majority of current research in MANETs assumes that the nodes are uniformly randomly
placed over the system area. Such a homogeneous initial point of entry is convenient in the
network simulations. In real networks, however, the nodes are in general not uniformly
distributed initially but have a common source of entry or exit. We therefore model the nodes
initial entry point by designing inhomogeneous node placement for both QMM and RWMM. We
also considered the important properties of the resulting distribution as the simulation progresses,
as well as the probability density of the arrival patterns of the MNs. The section also considered
the algorithms and flowcharts for the simulation presented. The QMM uses arrival and departure
rates to calculate the queue mobility part from time t to time t+1, which also include the RM
component. The new position for each MN is then calculated by summing the random motion
with the new queueing mobility. Below are the algorithms and flowcharts for the simulation of
both QMM and Random walk model.
A. Algorithm for QMM
Step1. Start
Step2. Read N, lambda, mu, st, s, t
Step3. I = 0
Step4. R = rand(n, 1)
Step5. Iat = -1/lambda * log(r)
Step6. X = zeros(n, 1)
Step5. Y = zeros(n, 1)
Step6. X(1) = iat(1)
Step7. x(i) = x(i-1)+ iat(i)
Step9. Y = -1/mu * log(r)
Step10. Y(1) = X(1) + st(1)
6. International Journal of Managing Information Technology (IJMIT) Vol.4, No.3, August 2012
60
Step11. Y(i) = max(x(i) + st(i), y(i-1) + st(i))
Step8. I = i+1
Step12. If i=n then go to 7
Step13. Plot x, y
Step14. While I t
Step15. Drawnow
Step16. Pause(p)
Step17. X = x+s*rand(n, 1)
Step18. Y= y+s*rand(n, 1)
Step19. End
7. International Journal of Managing Information Technology (IJMIT) Vol.4, No.3, August 2012
61
Figure 2: Flowchart For Queueing Mobility Model
8. International Journal of Managing Information Technology (IJMIT) Vol.4, No.3, August 2012
62
B. Algorithm for Random Walk Model
Step1. Start
Step2. Input n, s, t, i
Step3. X = rand(n, 1)
Step4. Y = rand(n, 1)
Step5. H = plot(X, Y,’.’)
Step6. Set axis
Step7. I=0
Step9. While I t
Step10. Drawnow
Step11. Pause(p)
Step12. X = X+s*rand(n, 1)
Step13. Y= Y+s*rand(n, 1)
Step14. I =i+1
Step15. If I =t Go to step10
Step16. End
9. International Journal of Managing Information Technology (IJMIT) Vol.4, No.3, August 2012
63
4.2.3. Simulation of Queuing Mobility Model
The flexibility of MANETs provides that each node can move arbitrarily but in reality, the nodes
have a specific behavior which is dependent on the location and the intension of a node. Mobility
is one of the main advantages of MANETs where the nodes can move arbitrarily with nearly no
restriction. Such movements yield to different node distributions, arrival patterns and to different
speeds.
4.3. VARYING OF ARRIVAL RATES FOR NODE DISTRIBUTION
The arrival pattern of mobile nodes has an impact on the performance of the network. In this
scope, we have decided to analysis the effect of arrival distribution on the MNs population in a
given area by using Poisson distribution as in equation 1. In most real-world MANETs, the node
Figure 3 1: Flowchart For Random Walk Model
Figure 3: Flowchart For Random Walk Model
10. International Journal of Managing Information Technology (IJMIT) Vol.4, No.3, August 2012
64
population in an area of interest varies with time. In this simulation, it is therefore necessary to
investigate the impact of arrivals of MNs on the MANETs mobility.
The simulation area does not change as the arrival rate changes. The different values of arrival
rates being considered in this study are shown in Table 2.
Table 2: Varying Arrival Rates
Scenario 1 2 3 4 5
Arrival rates 0.3 0.4 0.5 0.8 0.9
During the simulation, nodes were allowed to enter the location from a common source (0
degrees) but not from different sources. The number of MNs that entered the location was
assumed to be Poisson distributed with varying arrival rates.
4.4. COMPARISON BETWEEN QUEUEING MOBILITY AND RANDOM WALK MOBILITY
MODELS
Simulation setup - Starting from an initial node distribution – which represents inhomogeneity, a
mobility model was applied to all the nodes with a simulation steps. After the simulation steps
elapses a snapshot of the node distribution was observed and analysed. The simulations were
based on Queueing Mobility Model (QMM) to study the mobility of MNs from one area to
another in a location. The simulations of the models are to be done using MatLab software. The
user was allowed to input the number of nodes n, the number of mobility steps to perform for
each simulation k and the speed of MNs s. Nodes were initiated from the origin of the simulation
area. The simulation area was made up of square area of 300m X 300m. The table 1 shows details
of the parameters used for the simulation of both QMM and random walk models.
Table 3:Simulation Parameters
Parameters Values
Simulation Area 300m X 300m
Number of Nodes 50, 100, 150, 200, 300
Mobility Steps 500, 1000, 10000, 20000, 30000, 40000, 50000
Speeds 0.1m/s to1m/s
5. RESULTS AND DISCUSSION
5.1 Effect of Varying Arrival Rates
In Figure 1, the effect of varying nodes’ arrival rate is computed using Poisson model. Nodes may
arrive at a location either in some regular pattern or in a totally random fashion. The arrival rates
have shown to impact on the number of nodes in a particular location, although every location has
a limited capacity. A high number of nodes typically translate into a higher average number of
neighbours per node, which influences the route availability.
11. International Journal of Managing Information Technology (IJMIT) Vol.4, No.3, August 2012
65
Figure 4: For Twenty Number of Nodes for varying Arrival rates
In reality, the total connection time of a node over a specific interval depends on the nodes
encounter rate and the time in each encounter, both of which depend on the relative mobility of
nodes.
Figure 5: For Fifty Number of Nodes for varying Arrival rates
0 2 4 6 8 10 12 14 16 18 20
0
0.02
0.04
0.06
0.08
0.1
0.12
0.14
0.16
0.18
Probabilty
Distribution
Number of Nodes
Nodes Arriving During Time t
Arrival Rate = 0.3
Arrival Rate = 0.4
Arrival Rate =0.5
Arrival Rate =0.8
Arrival Rate =0.9
0 5 10 15 20 25 30 35 40 45 50
0
0.02
0.04
0.06
0.08
0.1
0.12
0.14
0.16
0.18
Probabilty
Distribution
Number of Nodes
Nodes Arriving During Time t
Arrival Rate = 0.3
Arrival Rate = 0.4
Arrival Rate =0.5
Arrival Rate =0.8
Arrival Rate =0.9
12. International Journal of Managing
Although a high node arrivals results in more node encounters, the network would eventually
become congested. The impact of this relationship is that nodes can and will be tightly packed (ie.
High density) if their arrival rates is high (congestion), but if the arrivals is low
be farther apart (low density). For instance it is clear that there is some congestion for arrivals of
MNs, since they have to follow some holding paths.
As the value of arrival rate increases, the shape of the distribution changes dramatically to a more
symmetrical (”normal'') form and the probability of a larger number of arrivals increases with
increasing number of MNs. An interesting observation is that
properties of the Poisson distribution approach those of the normal distribution as in Figures
and 2.
The first arrival processes of nodes give higher contact probabilities at higher arriving rates. This
is due to the nodes’ contiguity one
record the actual number of arrivals over a period and then compare the frequency of distribution
of the observed number of arrival to the Poisson distribution to
the arrival distribution.
5.2 COMPARATIVE STUDY OF
For the comparative study, we have
same entrance point. We also predefine the number of iterations for the simulation process of the
nodes. We compare the QMM against mobility models such as random walk or Brownian
mobility models. The program starts with user input window as shown in Figure
Figure 6: Input command window in Matlab software
The analysis in Figure 7 may indicate that if MNs have been forced to move in a certain
order their trajectory therefore is similar to hunts movement. This shows out a typical
human behavior when an area is being affected by a natural disaster or unexpected
catastrophe. It may recall that a group of hunt always moves in group from a common
source point; such a behavior is amendable for self
International Journal of Managing Information Technology (IJMIT) Vol.4, No.3, August 2012
arrivals results in more node encounters, the network would eventually
become congested. The impact of this relationship is that nodes can and will be tightly packed (ie.
High density) if their arrival rates is high (congestion), but if the arrivals is lower, the nodes must
be farther apart (low density). For instance it is clear that there is some congestion for arrivals of
MNs, since they have to follow some holding paths.
As the value of arrival rate increases, the shape of the distribution changes dramatically to a more
symmetrical (”normal'') form and the probability of a larger number of arrivals increases with
increasing number of MNs. An interesting observation is that as the arrival rate increases, the
properties of the Poisson distribution approach those of the normal distribution as in Figures
irst arrival processes of nodes give higher contact probabilities at higher arriving rates. This
’ contiguity one to another making mobility difficult. In practice, one
record the actual number of arrivals over a period and then compare the frequency of distribution
of the observed number of arrival to the Poisson distribution to investigate its approximation of
TUDY OF MOBILITY MODELS
have introduced the notion of a common source where MNs have a
same entrance point. We also predefine the number of iterations for the simulation process of the
nodes. We compare the QMM against mobility models such as random walk or Brownian
starts with user input window as shown in Figure 6.
: Input command window in Matlab software
may indicate that if MNs have been forced to move in a certain
order their trajectory therefore is similar to hunts movement. This shows out a typical
human behavior when an area is being affected by a natural disaster or unexpected
call that a group of hunt always moves in group from a common
source point; such a behavior is amendable for self-organized system as in Mobile
Information Technology (IJMIT) Vol.4, No.3, August 2012
66
arrivals results in more node encounters, the network would eventually
become congested. The impact of this relationship is that nodes can and will be tightly packed (ie.
er, the nodes must
be farther apart (low density). For instance it is clear that there is some congestion for arrivals of
As the value of arrival rate increases, the shape of the distribution changes dramatically to a more
symmetrical (”normal'') form and the probability of a larger number of arrivals increases with
as the arrival rate increases, the
properties of the Poisson distribution approach those of the normal distribution as in Figures 1
irst arrival processes of nodes give higher contact probabilities at higher arriving rates. This
making mobility difficult. In practice, one may
record the actual number of arrivals over a period and then compare the frequency of distribution
approximation of
the notion of a common source where MNs have a
same entrance point. We also predefine the number of iterations for the simulation process of the
nodes. We compare the QMM against mobility models such as random walk or Brownian
may indicate that if MNs have been forced to move in a certain
order their trajectory therefore is similar to hunts movement. This shows out a typical
human behavior when an area is being affected by a natural disaster or unexpected
call that a group of hunt always moves in group from a common
organized system as in Mobile
13. International Journal of Managing
Ad’hoc Networks. The radio nodes are assumed to be reconfigurable and acting as router
but having a coordinator point, as in MANETs mesh, or cluster topology.
Figure 7: Spatial nodes distribution at the 1000th simulation steps
In Figure 7, the simulation results on the usage of
MNs shows that the MNs span
smaller amount of time to cover an area completely
walk model with the same parameters such as speed, number of nodes, simulation steps and
simulation area do not give the same pattern
walk model, may not give an effective transmission deployment of radio nodes when being used
in a case of a natural misfortune alike an earthquake. The radio may
information since it shows a total stacking of radio nodes. Meanwhile for the Poisson model each
radio point shows a forwarding movement then, any radio may be viewed as having adequate
radius range of transmission. The informat
mobile nodes, with a minimum colliding. It may show a proven for nodes deployment in wireless
sensor networks for effective environment monitoring in remote areas.
Emphasis is made on Figures 7
forming line(s) and their departure into various areas within the location.
Each mobility model first places the mobile nodes in their initial locations and defines the way
that the nodes move within the network.
International Journal of Managing Information Technology (IJMIT) Vol.4, No.3, August 2012
Ad’hoc Networks. The radio nodes are assumed to be reconfigurable and acting as router
point, as in MANETs mesh, or cluster topology.
: Spatial nodes distribution at the 1000th simulation steps
the simulation results on the usage of QMM with a chosen common starting point for
the MNs span towards to the ground in a given amount of time and take a
smaller amount of time to cover an area completely, whereas the obtained results using
with the same parameters such as speed, number of nodes, simulation steps and
do not give the same pattern. This may be explained by the fact that the random
walk model, may not give an effective transmission deployment of radio nodes when being used
in a case of a natural misfortune alike an earthquake. The radio may not be able to forward the
information since it shows a total stacking of radio nodes. Meanwhile for the Poisson model each
radio point shows a forwarding movement then, any radio may be viewed as having adequate
radius range of transmission. The information reliability is shown to be flexible in the mobility of
mobile nodes, with a minimum colliding. It may show a proven for nodes deployment in wireless
sensor networks for effective environment monitoring in remote areas.
to 9 to illustrate the process of entry to a location from a source,
forming line(s) and their departure into various areas within the location.
Each mobility model first places the mobile nodes in their initial locations and defines the way
ove within the network.
Information Technology (IJMIT) Vol.4, No.3, August 2012
67
Ad’hoc Networks. The radio nodes are assumed to be reconfigurable and acting as router
with a chosen common starting point for
ground in a given amount of time and take a
obtained results using random
with the same parameters such as speed, number of nodes, simulation steps and
This may be explained by the fact that the random
walk model, may not give an effective transmission deployment of radio nodes when being used
not be able to forward the
information since it shows a total stacking of radio nodes. Meanwhile for the Poisson model each
radio point shows a forwarding movement then, any radio may be viewed as having adequate
ion reliability is shown to be flexible in the mobility of
mobile nodes, with a minimum colliding. It may show a proven for nodes deployment in wireless
to illustrate the process of entry to a location from a source,
Each mobility model first places the mobile nodes in their initial locations and defines the way
14. International Journal of Managing
Figure 8: Spatial nodes distribution at the 10000th simulation steps
The QMM may show to have a smaller first entrance time than the random walk model and forms
a line or queue from zero degrees to forty
distribution of nodes in steady state. Once nodes have arrived in a location, the nodes will m
around the location waiting for the arrival of others. Sometimes MNs arrive in a location waiting
for their assign task while others are also joining them resulting to a queue. Hence, the influence
of the mobility pattern and/or of the initial distribu
number of mobility steps on nodes distribution is also observed. The uniformity of the nodes’
spatial distribution shows the dependency with the nodes speeds.
Figure 9: Spatial
The observation in Figure 8 to 9
distribution compared to the random walk model as the number of simulation steps is higher
real-world situations, MNs move to a particular destination for specific purpose
of nodes may move in groups towards areas of interest or service areas to receive services,
International Journal of Managing Information Technology (IJMIT) Vol.4, No.3, August 2012
: Spatial nodes distribution at the 10000th simulation steps
a smaller first entrance time than the random walk model and forms
a line or queue from zero degrees to forty-five degrees direction and this leads to a uniform
distribution of nodes in steady state. Once nodes have arrived in a location, the nodes will m
around the location waiting for the arrival of others. Sometimes MNs arrive in a location waiting
for their assign task while others are also joining them resulting to a queue. Hence, the influence
of the mobility pattern and/or of the initial distribution on the spatial distribution after a large
number of mobility steps on nodes distribution is also observed. The uniformity of the nodes’
dependency with the nodes speeds.
: Spatial nodes distribution at the 50000th simulation steps
8 to 9 may illustrate that the QMM has “more uniform” nodes
distribution compared to the random walk model as the number of simulation steps is higher
MNs move to a particular destination for specific purposes. More number
of nodes may move in groups towards areas of interest or service areas to receive services,
Information Technology (IJMIT) Vol.4, No.3, August 2012
68
a smaller first entrance time than the random walk model and forms
five degrees direction and this leads to a uniform
distribution of nodes in steady state. Once nodes have arrived in a location, the nodes will move
around the location waiting for the arrival of others. Sometimes MNs arrive in a location waiting
for their assign task while others are also joining them resulting to a queue. Hence, the influence
tion on the spatial distribution after a large
number of mobility steps on nodes distribution is also observed. The uniformity of the nodes’
that the QMM has “more uniform” nodes
distribution compared to the random walk model as the number of simulation steps is higher. In
. More number
of nodes may move in groups towards areas of interest or service areas to receive services,
15. International Journal of Managing Information Technology (IJMIT) Vol.4, No.3, August 2012
69
sometimes wait or depart or exit immediately. MNs may also select the service areas to visit;
there may be other nodes too which are also visiting the same service facility resulting in forming
of queues/groups.
The random walk may show a different type of group mobility which may refer to hunts
movement when they meet an obstruction or a disturbance a sudden sound they turn around in a
scattered manner before proceeding. These may explain why MANETs with a random walk
configuration do not find application in military battlefields. The point of entry which was at 0
degree but as they move away from the source to their destinations they begin to disperse just like
the QMM. With the QMM nodes are distributed evenly in the simulation area in the long run
unlike the random walks which has more nodes at the location closer to the source.
MNS at the front of the queue depart or exit the simulation area as early as possible compared to
those at the tail of the queue at the beginning. Some of MNs may return whilst others may move
away from the initial group and queue forming subgroups. For a vast simulation period MNs in
the group initially dispersed into separate groupings with some of them even moving
independently. In the Random Walk model, the mobile nodes were considered moving
independently from one another. This kind of mobility model is classified as entity mobility
model and however in some scenarios including battlefield communication and museum touring,
rescue missions etc., the movement pattern of a mobile node may be influenced by other nodes in
the neighborhood.
6. CONCLUSION
We have shown the effect of arrival rates on MNs distribution and population in a location. It
may claim that as the various arrival rates increased the mean number of MNs may also increased
but to a certain limit. It is therefore the indication that every location has a limited capacity. The
arrival patterns have shown some impact on the network population, as the arrival rate increases
the MNs population also increases to a peak and then decays rapidly to the x-axis.
It may subsequently be admitted that mobility in MANETs is a difficult work and actually. It is
an interesting research area that has been growing in recent years. Its difficulty is mainly
generated because of the continuous changes in the network topology with time. The topological
changes have impact on mobility techniques developed for infrastructure-based networks thus
may not be directly applied to mobile adhoc networks. We have investigated through simulation
mobility prediction of MNs using the queueing model. It has indicated that the initial MN
position may not be uniform (non-homogeneous) at source, however, with time, the distribution
of MN positions tend to be homogeneous in the simulation area for QMM. Also with the RWM
the distribution of the MN position may be non-homogeneous, that is the trend turn to be dense
toward the source and the middle of the simulation area.
Our future work will investigate MNs mobility and its effects on end to end delay and on routing
protocol of MANETs. It may be necessary to implement it, by using traces in order to validate the
QMM and its reality.
16. International Journal of Managing Information Technology (IJMIT) Vol.4, No.3, August 2012
70
REFERENCES
[1] J. Boleng, T. Camp, and V. Tolety. “A Suvey of Mobility Models for Ad hoc Network Research”, In
Wireless Communication and Mobile Computing (WCMC), Vol. 2, No. 5, pages 483 – 502, 2002.
[2] Subir Kumar Sarkar, T. G. Basavaraju, C. Puttamadappa, “Mobility Models for Mobile Ad Hoc
Networks”, 2007, Page 267 – 277, Auerbach Publications – www.auerbach-publications.com Volume
2, No.5, 2002.
[3] C. Rajabhushanam and A. Kathirvel, “Survey of Wireless MANET Application in Battlefield
Operations”, (IJACSA) International Journal of Advanced Computer Science and Applications, Vol.
2, No.1, January 2011.
[4] Buttyan L., and Hubaux J. P., “Stimulating cooperation in self-organizing mobile ad hoc networks.
Mobile Networks and Applications: Special Issue on Mobile Ad Hoc Networks, 8(5), 2003.
[5] C.P.Agrawal, O.P.Vyas and M.K Tiwari, “Evaluation of Varrying Mobility Models Network Loads
on DSDV Protocol of MANETs”, International Journal on Computer Science and Engineering Vol.1
(2), 2009, pp. 40 - 46.
[6] P. N. Pathirana, A. V. Savkin S. K. Jha. “Mobility modeling and trajectory prediction for cellular
networks with mobile base stations”. MobiHoc 2003: 213 -221.
[7] Mohd Izuan Mohd Saad and Zuriati Ahmad Zukarnain, “Performance Analysis of Random-Based
Mobility Models in MANET Routing Protocol, EuroJournals Publishing, Inc. 2009, ISSN 1450-216X
Vol.32 No.4 (2009), pp.444-454 http://www.eurojournals.com/ejsr.htm
[8] Zainab R. Zaidi, Brian L. Mark: “A Distributed Mobility Tracking Scheme for Ad-Hoc Networks
Based on an Autoregressive Model”. The 6th International Workshop of Distributed Computing,
Kolkata, India (2004) 447(458)
[9] Abdullah, Sohail Jabbar, Shaf Alam and Abid Ali Minhas, “Location Prediction for Improvement of
Communication Protocols in Wireless Communications: Considerations and Future Directions”,
Proceedings of the World Congress on Engineering and Computer Science 2011 Vol. II WCECS
2011, October 19-21, 2011, San Francisco, USA
[10] Gunnar Karisson et al., “A Mobility Model for Pedestrian Content Distribution”, SIMUTools ’09
workshops, March 2-6, 2009, Rome Italy
[11] D.B. Hoang and K.J. Pye. “Introduction to Queueing Theory” – Computer Communication Networks,
School of Electronic Engineering, La Trobe University1995 edition (7.54 p.m. 31January, 1996, P91-
104)
[12] Ivo Adan and Jacques Resing. “Queueing Theory”, Department of Mathematics and Computing
Science, Eindhoven University of Technology, The Netherlands, February 14, 2001, pp. 29 – 32)
[13] Anreas Willig, “A Short Introduction to Queueing Theory”, Technical University Berlin,
Telecommunication Networks Group, Berlin, July 21, 1999, page 3 - 4.
[14] M.E. Kohl, N.M. Steiger, F.B Armsstrong and J.A. Joines, “An efficient Performance Extrapolation
For Queueing Models in Transient Analysis”, Proceedings of the 2005 Winter Simulation
Conference.
17. International Journal of Managing Information Technology (IJMIT) Vol.4, No.3, August 2012
71
[15] “Mathworks, Inc, developer and distributor of technical computing software matlab.”
http://www.mathworks.com/products/matlab.
Authors
Short Biography
John Tengviel
He is a holder of a BSc. Computer Science from University of Science and
Technology (KNUST) in 2001 and currently candidate of MSc. Telecommunication
Engineering from College of Engineering at the same university. He is a senior
instructor with the Department of Computer Science at Sunyani Polytechnic. His
research interests include Mobile Ad hoc Networks and Mobility modeling in
MANETs.
K. A. Dotche
He is a holder of a BSc. Electrical Eng. from University of Lome and MSc. Telecom.
Eng. from College of Engineering at Kwame Nkrumah University of Science and
Technology (KNUST); respectively 2004 and MSc 2010. He is currently a Ph. D.
research candidate with the Department of Telecommunications Engineering, at
KNUST. His research interests include Energy efficiency in wireless sensor
networks, antennas and E-M propagation in cellular layered networks.
Nana (Dr.) Kwasi Diawuo is a senior lecturer of the Department of Computer Engineering at Kwame
Nkrumah University of Science and Technology (KNUST), Kumasi, Ghana. He earned a BSc. (Electrical/
Electronic Engineering) from KNUST, M.Sc., Ph.D, MGhIE. He is a member of the Institution of
Electrical and Electronic Engineers (IEEE) and Computer Society (of IEEE).