The document discusses research on cognitive communication networks. It defines cognitive communication networks as networks that can (1) sense changes in their internal and external environments, (2) analyze and learn from these changes, and (3) automatically adjust communication resources and capabilities according to user demands. The key aspects covered are: the environments cognitive networks can sense; the connotation of cognitive network technology; and the sensing, learning, decision-making, and action process of cognitive networks.
Iaetsd implementation of chaotic algorithm for secure imageIaetsd Iaetsd
This document proposes a system for secure image transcoding using chaotic algorithm encryption. The system encrypts images using a chaotic key-based algorithm (CKBA) before transcoding. It involves applying the discrete cosine transform, CKBA encryption, quantization, and entropy encoding like Huffman coding. A transcoder block then converts the data to a lower bit rate format while maintaining security. At the receiver, the inverse processes are applied to reconstruct the image. The system aims to provide efficient content delivery with end-to-end security for multimedia applications like mobile web browsing.
Ensuring Privacy in opportunistic NetworkIOSR Journals
This document discusses ensuring privacy in opportunistic networks. It begins by defining opportunistic networks and how they differ from mobile ad hoc networks (MANETs) in their lack of constant connectivity between source and destination. The document then outlines some common attacks on opportunistic networks like viruses and worms. It proposes using public-private cryptography techniques like encryption and decryption to ensure privacy of user data as it is forwarded through intermediate nodes in opportunistic networks. The algorithm is implemented in the NS2 network simulator to test maintaining privacy while still allowing opportunistic forwarding of messages.
Fragmentation of Data in Large-Scale System For Ideal Performance and SecurityEditor IJCATR
Cloud computing is becoming prominent trend which offers the number of significant advantages. One of the ground laying
advantage of the cloud computing is the pay-as-per-use, where according to the use of the services, the customer has to pay. At present,
user’s storage availability improves the data generation. There is requiring farming out such large amount of data. There is indefinite
large number of Cloud Service Providers (CSP). The Cloud Service Providers is increasing trend for many number of organizations and
as well as for the customers that decreases the burden of the maintenance and local data storage. In cloud computing transferring data to
the third party administrator control will give rise to security concerns. Within the cloud, compromisation of data may occur due to
attacks by the unauthorized users and nodes. So, in order to protect the data in cloud the higher security measures are required and also
to provide security for the optimization of the data retrieval time. The proposed system will approach the issues of security and
performance. Initially in the DROPS methodology, the division of the files into fragments is done and replication of those fragmented
data over the cloud node is performed. Single fragment of particular file can be stored on each of the nodes which ensure that no
meaningful information is shown to an attacker on a successful attack. The separation of the nodes is done by T-Coloring in order to
prohibit an attacker to guess the fragment’s location. The complete data security is ensured by DROPS methodology
Comparative Study of Optic Fibre and Wireless Technologies in Internet Connec...Editor IJCATR
Most of the activities going on in the world today demand information and data sharing in one form or the other.
Consequently, the Internet and its connectivity has gradually become a household concern. The connection to the Internet requires
physical transfer of signal (data/information) from one point to another. This can either be through physical medium (wire) or through
the air (wireless). This paper a comparative study of Fiber Optics and Wireless Technologies in Internet connectivity seeks to identify
which of the two technologies is better for signal transmission in terms of bandwidth utilization, performance, reliability, cost
effectiveness, resilience, and security. The study adopted the use of secondary sources for the sourcing of materials. A lot of journal
articles, research publications, testbooks, white papers and many more were critically studies and comparatively analysed. It was clear
that both media have hitches and challenges. The study showed that although initial cost of acquisition is an inhibitive factor for fibre
optic connection, unlimited bandwidth delivery and high Quality of Service (QoS) placed Fiber optics above wireless connectivity in
their overall performance.
11.signaling for multimedia conferencing in stand alone mobile ad hoc networksAlexander Decker
This document summarizes a research paper about signaling for multimedia conferencing in mobile ad hoc networks (MANETs). The key points are:
1. MANETs pose challenges for signaling due to their infrastructureless and dynamic nature. The paper proposes a novel cluster-based signaling architecture to address these challenges.
2. In the proposed architecture, nodes dynamically form application-level clusters for conferencing. Cluster heads are elected based on capabilities, and clusters split based on size. This allows for scalability.
3. The paper implements the architecture using Session Initiation Protocol (SIP) and evaluates performance through simulation using OPNET. Results show the cluster-based approach meets requirements for MANET conferencing signaling.
Signaling for multimedia conferencing in stand alone mobile ad hoc networksAlexander Decker
This document summarizes a research paper on signaling for multimedia conferencing in mobile ad hoc networks (MANETs). The paper proposes a novel cluster-based architecture where nodes that act as cluster heads are elected based on their capabilities. The cluster heads establish and manage multimedia conferences within their clusters. The paper discusses the requirements for multimedia conferencing signaling in MANETs, reviews existing solutions, and presents the cluster-based architecture and its implementation using SIP. It also evaluates the performance of the proposed architecture through simulations.
The increasing use of electronic forms of communication presents
new opportunities in the study of mental health, including the
ability to investigate the manifestations of psychiatric diseases un-
obtrusively and in the setting of patients’ daily lives. A pilot study to
explore the possible connections between bipolar affective disorder
and mobile phone usage was conducted. In this study, participants
were provided a mobile phone to use as their primary phone. This
phone was loaded with a custom keyboard that collected metadata
consisting of keypress entry time and accelerometer movement.
Individual character data with the exceptions of the backspace key
and space bar were not collected due to privacy concerns. We pro-
pose an end-to-end deep architecture based on late fusion, named
DeepMood, to model the multi-view metadata for the prediction
of mood scores. Experimental results show that 90.31% prediction
accuracy on the depression score can be achieved based on session-
level mobile phone typing dynamics which is typically less than
one minute. It demonstrates the feasibility of using mobile phone
metadata to infer mood disturbance and severity
Context detection and effects on behaviorTimo Smura
This document summarizes research on detecting contexts from behavioral data collected via smartphones and examining how context affects application usage. It describes collecting data from handsets on application usage along with location via cell IDs. Context detection algorithms infer user contexts like home, work, abroad from this data. Analysis shows how application usage varies by detected context, with usage patterns differing at home versus elsewhere. Ongoing work aims to better understand how context influences behaviors like communication channel selection and mobile social networks.
Iaetsd implementation of chaotic algorithm for secure imageIaetsd Iaetsd
This document proposes a system for secure image transcoding using chaotic algorithm encryption. The system encrypts images using a chaotic key-based algorithm (CKBA) before transcoding. It involves applying the discrete cosine transform, CKBA encryption, quantization, and entropy encoding like Huffman coding. A transcoder block then converts the data to a lower bit rate format while maintaining security. At the receiver, the inverse processes are applied to reconstruct the image. The system aims to provide efficient content delivery with end-to-end security for multimedia applications like mobile web browsing.
Ensuring Privacy in opportunistic NetworkIOSR Journals
This document discusses ensuring privacy in opportunistic networks. It begins by defining opportunistic networks and how they differ from mobile ad hoc networks (MANETs) in their lack of constant connectivity between source and destination. The document then outlines some common attacks on opportunistic networks like viruses and worms. It proposes using public-private cryptography techniques like encryption and decryption to ensure privacy of user data as it is forwarded through intermediate nodes in opportunistic networks. The algorithm is implemented in the NS2 network simulator to test maintaining privacy while still allowing opportunistic forwarding of messages.
Fragmentation of Data in Large-Scale System For Ideal Performance and SecurityEditor IJCATR
Cloud computing is becoming prominent trend which offers the number of significant advantages. One of the ground laying
advantage of the cloud computing is the pay-as-per-use, where according to the use of the services, the customer has to pay. At present,
user’s storage availability improves the data generation. There is requiring farming out such large amount of data. There is indefinite
large number of Cloud Service Providers (CSP). The Cloud Service Providers is increasing trend for many number of organizations and
as well as for the customers that decreases the burden of the maintenance and local data storage. In cloud computing transferring data to
the third party administrator control will give rise to security concerns. Within the cloud, compromisation of data may occur due to
attacks by the unauthorized users and nodes. So, in order to protect the data in cloud the higher security measures are required and also
to provide security for the optimization of the data retrieval time. The proposed system will approach the issues of security and
performance. Initially in the DROPS methodology, the division of the files into fragments is done and replication of those fragmented
data over the cloud node is performed. Single fragment of particular file can be stored on each of the nodes which ensure that no
meaningful information is shown to an attacker on a successful attack. The separation of the nodes is done by T-Coloring in order to
prohibit an attacker to guess the fragment’s location. The complete data security is ensured by DROPS methodology
Comparative Study of Optic Fibre and Wireless Technologies in Internet Connec...Editor IJCATR
Most of the activities going on in the world today demand information and data sharing in one form or the other.
Consequently, the Internet and its connectivity has gradually become a household concern. The connection to the Internet requires
physical transfer of signal (data/information) from one point to another. This can either be through physical medium (wire) or through
the air (wireless). This paper a comparative study of Fiber Optics and Wireless Technologies in Internet connectivity seeks to identify
which of the two technologies is better for signal transmission in terms of bandwidth utilization, performance, reliability, cost
effectiveness, resilience, and security. The study adopted the use of secondary sources for the sourcing of materials. A lot of journal
articles, research publications, testbooks, white papers and many more were critically studies and comparatively analysed. It was clear
that both media have hitches and challenges. The study showed that although initial cost of acquisition is an inhibitive factor for fibre
optic connection, unlimited bandwidth delivery and high Quality of Service (QoS) placed Fiber optics above wireless connectivity in
their overall performance.
11.signaling for multimedia conferencing in stand alone mobile ad hoc networksAlexander Decker
This document summarizes a research paper about signaling for multimedia conferencing in mobile ad hoc networks (MANETs). The key points are:
1. MANETs pose challenges for signaling due to their infrastructureless and dynamic nature. The paper proposes a novel cluster-based signaling architecture to address these challenges.
2. In the proposed architecture, nodes dynamically form application-level clusters for conferencing. Cluster heads are elected based on capabilities, and clusters split based on size. This allows for scalability.
3. The paper implements the architecture using Session Initiation Protocol (SIP) and evaluates performance through simulation using OPNET. Results show the cluster-based approach meets requirements for MANET conferencing signaling.
Signaling for multimedia conferencing in stand alone mobile ad hoc networksAlexander Decker
This document summarizes a research paper on signaling for multimedia conferencing in mobile ad hoc networks (MANETs). The paper proposes a novel cluster-based architecture where nodes that act as cluster heads are elected based on their capabilities. The cluster heads establish and manage multimedia conferences within their clusters. The paper discusses the requirements for multimedia conferencing signaling in MANETs, reviews existing solutions, and presents the cluster-based architecture and its implementation using SIP. It also evaluates the performance of the proposed architecture through simulations.
The increasing use of electronic forms of communication presents
new opportunities in the study of mental health, including the
ability to investigate the manifestations of psychiatric diseases un-
obtrusively and in the setting of patients’ daily lives. A pilot study to
explore the possible connections between bipolar affective disorder
and mobile phone usage was conducted. In this study, participants
were provided a mobile phone to use as their primary phone. This
phone was loaded with a custom keyboard that collected metadata
consisting of keypress entry time and accelerometer movement.
Individual character data with the exceptions of the backspace key
and space bar were not collected due to privacy concerns. We pro-
pose an end-to-end deep architecture based on late fusion, named
DeepMood, to model the multi-view metadata for the prediction
of mood scores. Experimental results show that 90.31% prediction
accuracy on the depression score can be achieved based on session-
level mobile phone typing dynamics which is typically less than
one minute. It demonstrates the feasibility of using mobile phone
metadata to infer mood disturbance and severity
Context detection and effects on behaviorTimo Smura
This document summarizes research on detecting contexts from behavioral data collected via smartphones and examining how context affects application usage. It describes collecting data from handsets on application usage along with location via cell IDs. Context detection algorithms infer user contexts like home, work, abroad from this data. Analysis shows how application usage varies by detected context, with usage patterns differing at home versus elsewhere. Ongoing work aims to better understand how context influences behaviors like communication channel selection and mobile social networks.
Cassandra framework a service oriented distributed multimediaJoão Gabriel Lima
This document describes the CASSANDRA framework, a distributed multimedia content analysis system. It uses a service-oriented architecture that allows individual analysis components to be integrated and upgraded easily. The system is modular, self-organizing, and real-time. It can dynamically distribute workloads across available devices. The framework allows for flexible integration of new analysis algorithms and coordination of existing algorithms from different domains.
T Silva, D D Karunaratna, G N Wikramanayake, K P Hewagamage, G K A Dias (2004) "Speaker Search and Indexing for Multimedia Databases" In:6th International Information Technology Conference, Edited by:V.K. Samaranayake et al. pp. 157-162. Infotel Lanka Society, Colombo, Sri Lanka: IITC Nov 29-Dec 1, ISBN: 955-8974-01-3
This document is a thesis submitted by Johann van der Merwe for the degree of Master of Science in Engineering. The thesis proposes a novel peer-to-peer key management scheme called Self-Organized Peer-to-Peer Key Management (Self-OrgPKM) for fully self-organized mobile ad hoc networks. It first provides background on mobile ad hoc networks and their security issues. It then surveys existing key management protocols for mobile ad hoc networks. The thesis also introduces two new cryptographic building blocks and evaluates the performance and security of Self-OrgPKM through analysis and simulations.
Selfish Node Detection in Replica Allocation over MANETsIOSR Journals
This document discusses detecting selfish nodes in mobile ad hoc networks (MANETs) and proposes techniques for replica allocation that account for selfish behavior. It begins by providing background on MANETs and challenges like selfish nodes. It then presents an algorithm for detecting selfish nodes based on calculating a "degree of selfishness" score for each node. Existing replica allocation techniques are reviewed that do not consider selfish nodes. The document concludes by proposing improvements to replica allocation that use the selfish node detection algorithm and grouping approaches to better handle selfish behavior.
MetaAnalysis of Multimedia Transmission quality improvements in Wireless Netw...Iffat Ahmed
This document analyzes 190 research articles on quality provisioning for multimedia services over next generation networks from 2006-2010. It finds that resource management and packet scheduling received the most attention, while areas like error control and mobility management received less. Simulation was the most common research methodology. About a third of research focused on Internet-like networks, though this share is expected to increase with LTE deployment. The analysis aims to provide an aggregated overview of the field and highlight trends to help guide future research.
The document discusses the relational model of data for large shared data banks. It introduces the concept of n-ary relations and the universal data sublanguage as an alternative to tree-structured files or network models. The relational model provides independence between data representation and programs/queries by removing ordering, indexing, and access path dependencies from the user's data model. This allows changes to the internal data representation without affecting user activities.
InfoSec Technology Management of User Space and Services Through Security Thr...ecarrow
The focus of this paper will demonstrate the need to clearly define
and segregate various user space environments in the enterprise
network infrastructure with controls ranging from administrative
to technical and still provide the various services needed to
facilitate the work space environment and administrative
requirements of an enterprise system. Standards assumed are
industry practices and associated regulatory requirements with
implementations as they apply to the various contextual
applications. This is a high level approach to understanding the
significance and application of an effective secure network
infrastructure. The focus is on end user needs and the associated
services to support those needs. Conceptually user space is a
virtual area allocated to the end user needs identified with specific
services to support those needs by creating a virtual playground.
To manage risk, the concept of creating a "security threat gateway
(STG)" isolates and secures each user space with its associated
services. Emphasis will be placed on the functional managerial
process and application of the STG, safeguarding one user space
from another, to facilitate the use of the needed services to
perform the operational tasks of the organization. When user’s
needs and associated components are clearly identified, then it is
possible for anyone to use this model as a template, to guide them
in creating an effective strategy for their own network security.
This approach is practical in orientation and application, focusing
on a high level perspective and assumes the reader already has a
low level technical background for a tactical implementation in
mitigating risk to the enterprise network infrastructure.
A Protocol/Scheme to mitigate DDos attacks using AODV Protocolijsrd.com
MANET(Mobile Adhoc Network) is an emerging technology and have great strength to be applied in battlefields and commercial applications such as traffic surveillance, MANET is infrastructure less without any centralized controller. Each node contains routing capability. Each device in a MANET is independent and can move in any direction. One of the major challenges wireless mobile ad-hoc networks face today is security, because no central controller exists. MANETs are a kind of wireless ad hoc networks that usually has a routable networking environment on top of a link layer ad hoc network. There are many security attacks in MANET and DDoS (Distributed denial of service) is one of them. Our main objective is seeing the effect of DDoS in routing, Packet Drop Rate, End to End Delay, no. of Collisions due to attack on network. And with these parameters and many more also we build secure IDS to detect this kind of attack and block it. In this thesis main objective is to study and implement the security against the DDOS attack. DDoS (Distributed Denial of Service) attacks in the networks are required to be prevented, as early as possible before reaching the victim node. DDos attack causes depletion of the network resources such as network bandwidth, disk space, CPU time, data structures, and network connections. Dealing with DDoS attacks is difficult due to their properties such as dynamic attack rates, big scale of botnets. DDos attack become more difficult to handle if it occurs in wireless network because of the properties of ad hoc network such as dynamic topologies, low battery life, Unicast routing Multicast routing , Frequency of updates or network overhead , scalability , mobile agent based routing ,power aware routing etc. Thus it is better to prevent the distributed denial of service attack rather than allowing it to occur and then taking the necessary steps to handle it. The following quantitative metrics Packet Delivery Ratio (PDR), Number of Collisions are to be used to evaluate the performance of DDoS attacks and their prevention techniques under different combinations in the fixed mobile ad hoc network. In our simulation, the effect of DDoS attacks under different number of attackers is studied.
IJCNC Top 10 Trending Articles in Academia !!!IJCNCJournal
The International Journal of Computer Networks & Communications (IJCNC) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of Computer Networks & Communications. The journal focuses on all technical and practical aspects of Computer Networks & data Communications. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on advanced networking concepts and establishing new collaborations in these areas.
1. The document introduces a relational model of data as an alternative to tree-structured and network models for large shared databases.
2. Key advantages of the relational model include independence between data representation and user applications, and clearer treatment of issues like redundancy and consistency.
3. Existing systems still impose dependencies between data representation characteristics like ordering, indexing, and access paths, and user applications and queries. The relational model aims to reduce these dependencies.
A Relational Model of Data for Large Shared Data Banksrenguzi
1. The paper introduces a relational model of data as a superior alternative to existing network and tree models for large shared databases. It allows data to be described in its natural form without imposing additional structure.
2. The relational model provides a basis for treating issues like redundancy, derivability, and consistency of data relations. It also allows clearer evaluation of existing data systems and representations.
3. Existing systems still impose dependencies between data representation and user interaction models related to ordering, indexing, and access paths that limit changes without impacting applications. The relational model aims to reduce these dependencies.
Distributed Localization for Wireless Distributed Networks in Indoor Environm...Hermie Mendoza
This document summarizes Hermie Mendoza's Masters thesis defense presentation on distributed localization for wireless distributed networks. The presentation covers preliminaries on position location and wireless distributed computing, fingerprint-based positioning techniques, and a WDC-based fingerprinting system. Mendoza proposes distributed algorithms to solve the localization problem in a parallelized manner using a wireless distributed computing network. The algorithms discussed include distributed Euclidean distance, Bayesian modeling, and neural networks approaches. Experimental results from a prototype system using USRP software-defined radios are also presented.
This document summarizes a research paper that analyzes the performance of two routing protocols for mobile ad hoc networks (MANETs) - AODV and TORA - under distributed denial of service (DDoS) attacks. The paper simulates DDoS attacks on networks using the AODV and TORA protocols and compares their performance based on metrics like throughput, delay, network load, and packet delivery ratio. The simulation results indicate that while both protocols are affected by DDoS attacks, AODV experiences less severe performance degradation and is therefore more resilient to such attacks compared to TORA.
A New Approach for Improving Performance of Intrusion Detection System over M...IOSR Journals
This document discusses improving the performance of intrusion detection systems (IDS) in mobile ad hoc networks (MANETs). It proposes using an inverted table approach to track communication information and identify attacker nodes through data mining. The key approaches are:
1. Maintaining an inverted table to record network communication information for analysis.
2. Using data mining techniques like anomaly detection to identify attacker nodes based on patterns in the table.
3. Discovering preventative paths that avoid identified attacker nodes to improve network throughput and reduce data loss.
The approaches aim to improve IDS performance challenged by attacks that slow detection in MANETs. The work will be implemented in NS2 and evaluate performance based on throughput and
- The document discusses requirements for distributed multimedia systems, including supporting continuous media streams, quality of service management, synchronization, and multiparty communications.
- It introduces two framework models for meeting these requirements: 1) A middleware platform that uses "binding objects" to establish and control quality of service for streaming multimedia between applications. 2) A framework providing different services and satisfying application requirements through service selection and integration in an IPv6 differentiated services environment.
- The key requirements discussed are the need to support continuous media streaming over long periods, sophisticated static and dynamic quality of service management, synchronization of multiple media streams, and programming/system support for multiparty communications.
An overview on application of machine learning techniques in optical networksKhaleda Ali
This document provides an overview of machine learning techniques applied to optical networks. It discusses how optical networks have become more complex with the introduction of technologies like coherent transmission and elastic optical networks. This increased complexity motivates the use of machine learning to analyze network data and make decisions. The document surveys existing work on machine learning applications in optical communications and networking. It aims to introduce researchers to this field and propose new research directions to further the application of machine learning to optical networks.
Top Ten Read Articles - International Journal of Wireless & Mobile Networks (...ijwmn
The International Journal of Wireless & Mobile Networks (IJWMN) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of Wireless & Mobile Networks. The journal focuses on all technical and practical aspects of Wireless & Mobile Networks. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on advanced wireless & mobile networking concepts and establishing new collaborations in these areas.
This document analyzes routing protocols in wireless mesh networks (WMNs) using certain parameters like delay, throughput, and network load. It discusses security challenges in WMNs and proposes a security model. It also describes WMN protocols and simulation parameters. The paper then simulates three routing protocols (AODV, DSR, OLSR) in OPNET Modeler and displays the results in graphs to analyze protocol performance based on the parameters.
A Domain Based Approach to Information Retrieval in Digital LibrariesFulvio Rotella
The current abundance of electronic documents requires automatic techniques that support the users in understanding their content and extracting useful information. To this aim, improving the retrieval performance must necessarily go beyond simple lexical interpretation ofthe user queries, and pass through an understanding of their semantic content and aims. It goes without saying that any digital library wouldtake enormous advantage from the availability of effective Information Retrieval techniques to provide to their users. This paper proposes an approach to Information Retrieval based on a correspondence of the domain of discourse between the query and the documents in the repository. Such an association is based on standard general-purpose linguistic resources (WordNet and WordNet Domains) and on a novel similarity assessmenttechnique. Although the work is at a preliminary stage, interesting initial results suggest to go on extending and improving the approach.
This document provides an overview of energy harvesting technologies for sustainable wireless sensor networks. It discusses how wireless sensor networks (WSNs) are being used in applications like structural health monitoring and battlefield surveillance. WSNs allow for distributed sensing and processing but face challenges around limited energy resources. The document reviews different energy harvesting technologies that could provide sustainable power sources for sensor nodes, like solar, thermal, and kinetic energy harvesting. It examines how these technologies work and their potential to enable long-term operation of energy-constrained wireless sensor networks.
This document discusses using wireless sensor networks for habitat monitoring. It presents requirements for a system to monitor seabird nesting environments and behaviors. The currently deployed network consists of 32 sensor nodes on an island off the coast of Maine that stream live data online. The application-driven design helps identify important areas for further work like data sampling, communications, network tasks, and health monitoring.
Cassandra framework a service oriented distributed multimediaJoão Gabriel Lima
This document describes the CASSANDRA framework, a distributed multimedia content analysis system. It uses a service-oriented architecture that allows individual analysis components to be integrated and upgraded easily. The system is modular, self-organizing, and real-time. It can dynamically distribute workloads across available devices. The framework allows for flexible integration of new analysis algorithms and coordination of existing algorithms from different domains.
T Silva, D D Karunaratna, G N Wikramanayake, K P Hewagamage, G K A Dias (2004) "Speaker Search and Indexing for Multimedia Databases" In:6th International Information Technology Conference, Edited by:V.K. Samaranayake et al. pp. 157-162. Infotel Lanka Society, Colombo, Sri Lanka: IITC Nov 29-Dec 1, ISBN: 955-8974-01-3
This document is a thesis submitted by Johann van der Merwe for the degree of Master of Science in Engineering. The thesis proposes a novel peer-to-peer key management scheme called Self-Organized Peer-to-Peer Key Management (Self-OrgPKM) for fully self-organized mobile ad hoc networks. It first provides background on mobile ad hoc networks and their security issues. It then surveys existing key management protocols for mobile ad hoc networks. The thesis also introduces two new cryptographic building blocks and evaluates the performance and security of Self-OrgPKM through analysis and simulations.
Selfish Node Detection in Replica Allocation over MANETsIOSR Journals
This document discusses detecting selfish nodes in mobile ad hoc networks (MANETs) and proposes techniques for replica allocation that account for selfish behavior. It begins by providing background on MANETs and challenges like selfish nodes. It then presents an algorithm for detecting selfish nodes based on calculating a "degree of selfishness" score for each node. Existing replica allocation techniques are reviewed that do not consider selfish nodes. The document concludes by proposing improvements to replica allocation that use the selfish node detection algorithm and grouping approaches to better handle selfish behavior.
MetaAnalysis of Multimedia Transmission quality improvements in Wireless Netw...Iffat Ahmed
This document analyzes 190 research articles on quality provisioning for multimedia services over next generation networks from 2006-2010. It finds that resource management and packet scheduling received the most attention, while areas like error control and mobility management received less. Simulation was the most common research methodology. About a third of research focused on Internet-like networks, though this share is expected to increase with LTE deployment. The analysis aims to provide an aggregated overview of the field and highlight trends to help guide future research.
The document discusses the relational model of data for large shared data banks. It introduces the concept of n-ary relations and the universal data sublanguage as an alternative to tree-structured files or network models. The relational model provides independence between data representation and programs/queries by removing ordering, indexing, and access path dependencies from the user's data model. This allows changes to the internal data representation without affecting user activities.
InfoSec Technology Management of User Space and Services Through Security Thr...ecarrow
The focus of this paper will demonstrate the need to clearly define
and segregate various user space environments in the enterprise
network infrastructure with controls ranging from administrative
to technical and still provide the various services needed to
facilitate the work space environment and administrative
requirements of an enterprise system. Standards assumed are
industry practices and associated regulatory requirements with
implementations as they apply to the various contextual
applications. This is a high level approach to understanding the
significance and application of an effective secure network
infrastructure. The focus is on end user needs and the associated
services to support those needs. Conceptually user space is a
virtual area allocated to the end user needs identified with specific
services to support those needs by creating a virtual playground.
To manage risk, the concept of creating a "security threat gateway
(STG)" isolates and secures each user space with its associated
services. Emphasis will be placed on the functional managerial
process and application of the STG, safeguarding one user space
from another, to facilitate the use of the needed services to
perform the operational tasks of the organization. When user’s
needs and associated components are clearly identified, then it is
possible for anyone to use this model as a template, to guide them
in creating an effective strategy for their own network security.
This approach is practical in orientation and application, focusing
on a high level perspective and assumes the reader already has a
low level technical background for a tactical implementation in
mitigating risk to the enterprise network infrastructure.
A Protocol/Scheme to mitigate DDos attacks using AODV Protocolijsrd.com
MANET(Mobile Adhoc Network) is an emerging technology and have great strength to be applied in battlefields and commercial applications such as traffic surveillance, MANET is infrastructure less without any centralized controller. Each node contains routing capability. Each device in a MANET is independent and can move in any direction. One of the major challenges wireless mobile ad-hoc networks face today is security, because no central controller exists. MANETs are a kind of wireless ad hoc networks that usually has a routable networking environment on top of a link layer ad hoc network. There are many security attacks in MANET and DDoS (Distributed denial of service) is one of them. Our main objective is seeing the effect of DDoS in routing, Packet Drop Rate, End to End Delay, no. of Collisions due to attack on network. And with these parameters and many more also we build secure IDS to detect this kind of attack and block it. In this thesis main objective is to study and implement the security against the DDOS attack. DDoS (Distributed Denial of Service) attacks in the networks are required to be prevented, as early as possible before reaching the victim node. DDos attack causes depletion of the network resources such as network bandwidth, disk space, CPU time, data structures, and network connections. Dealing with DDoS attacks is difficult due to their properties such as dynamic attack rates, big scale of botnets. DDos attack become more difficult to handle if it occurs in wireless network because of the properties of ad hoc network such as dynamic topologies, low battery life, Unicast routing Multicast routing , Frequency of updates or network overhead , scalability , mobile agent based routing ,power aware routing etc. Thus it is better to prevent the distributed denial of service attack rather than allowing it to occur and then taking the necessary steps to handle it. The following quantitative metrics Packet Delivery Ratio (PDR), Number of Collisions are to be used to evaluate the performance of DDoS attacks and their prevention techniques under different combinations in the fixed mobile ad hoc network. In our simulation, the effect of DDoS attacks under different number of attackers is studied.
IJCNC Top 10 Trending Articles in Academia !!!IJCNCJournal
The International Journal of Computer Networks & Communications (IJCNC) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of Computer Networks & Communications. The journal focuses on all technical and practical aspects of Computer Networks & data Communications. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on advanced networking concepts and establishing new collaborations in these areas.
1. The document introduces a relational model of data as an alternative to tree-structured and network models for large shared databases.
2. Key advantages of the relational model include independence between data representation and user applications, and clearer treatment of issues like redundancy and consistency.
3. Existing systems still impose dependencies between data representation characteristics like ordering, indexing, and access paths, and user applications and queries. The relational model aims to reduce these dependencies.
A Relational Model of Data for Large Shared Data Banksrenguzi
1. The paper introduces a relational model of data as a superior alternative to existing network and tree models for large shared databases. It allows data to be described in its natural form without imposing additional structure.
2. The relational model provides a basis for treating issues like redundancy, derivability, and consistency of data relations. It also allows clearer evaluation of existing data systems and representations.
3. Existing systems still impose dependencies between data representation and user interaction models related to ordering, indexing, and access paths that limit changes without impacting applications. The relational model aims to reduce these dependencies.
Distributed Localization for Wireless Distributed Networks in Indoor Environm...Hermie Mendoza
This document summarizes Hermie Mendoza's Masters thesis defense presentation on distributed localization for wireless distributed networks. The presentation covers preliminaries on position location and wireless distributed computing, fingerprint-based positioning techniques, and a WDC-based fingerprinting system. Mendoza proposes distributed algorithms to solve the localization problem in a parallelized manner using a wireless distributed computing network. The algorithms discussed include distributed Euclidean distance, Bayesian modeling, and neural networks approaches. Experimental results from a prototype system using USRP software-defined radios are also presented.
This document summarizes a research paper that analyzes the performance of two routing protocols for mobile ad hoc networks (MANETs) - AODV and TORA - under distributed denial of service (DDoS) attacks. The paper simulates DDoS attacks on networks using the AODV and TORA protocols and compares their performance based on metrics like throughput, delay, network load, and packet delivery ratio. The simulation results indicate that while both protocols are affected by DDoS attacks, AODV experiences less severe performance degradation and is therefore more resilient to such attacks compared to TORA.
A New Approach for Improving Performance of Intrusion Detection System over M...IOSR Journals
This document discusses improving the performance of intrusion detection systems (IDS) in mobile ad hoc networks (MANETs). It proposes using an inverted table approach to track communication information and identify attacker nodes through data mining. The key approaches are:
1. Maintaining an inverted table to record network communication information for analysis.
2. Using data mining techniques like anomaly detection to identify attacker nodes based on patterns in the table.
3. Discovering preventative paths that avoid identified attacker nodes to improve network throughput and reduce data loss.
The approaches aim to improve IDS performance challenged by attacks that slow detection in MANETs. The work will be implemented in NS2 and evaluate performance based on throughput and
- The document discusses requirements for distributed multimedia systems, including supporting continuous media streams, quality of service management, synchronization, and multiparty communications.
- It introduces two framework models for meeting these requirements: 1) A middleware platform that uses "binding objects" to establish and control quality of service for streaming multimedia between applications. 2) A framework providing different services and satisfying application requirements through service selection and integration in an IPv6 differentiated services environment.
- The key requirements discussed are the need to support continuous media streaming over long periods, sophisticated static and dynamic quality of service management, synchronization of multiple media streams, and programming/system support for multiparty communications.
An overview on application of machine learning techniques in optical networksKhaleda Ali
This document provides an overview of machine learning techniques applied to optical networks. It discusses how optical networks have become more complex with the introduction of technologies like coherent transmission and elastic optical networks. This increased complexity motivates the use of machine learning to analyze network data and make decisions. The document surveys existing work on machine learning applications in optical communications and networking. It aims to introduce researchers to this field and propose new research directions to further the application of machine learning to optical networks.
Top Ten Read Articles - International Journal of Wireless & Mobile Networks (...ijwmn
The International Journal of Wireless & Mobile Networks (IJWMN) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of Wireless & Mobile Networks. The journal focuses on all technical and practical aspects of Wireless & Mobile Networks. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on advanced wireless & mobile networking concepts and establishing new collaborations in these areas.
This document analyzes routing protocols in wireless mesh networks (WMNs) using certain parameters like delay, throughput, and network load. It discusses security challenges in WMNs and proposes a security model. It also describes WMN protocols and simulation parameters. The paper then simulates three routing protocols (AODV, DSR, OLSR) in OPNET Modeler and displays the results in graphs to analyze protocol performance based on the parameters.
A Domain Based Approach to Information Retrieval in Digital LibrariesFulvio Rotella
The current abundance of electronic documents requires automatic techniques that support the users in understanding their content and extracting useful information. To this aim, improving the retrieval performance must necessarily go beyond simple lexical interpretation ofthe user queries, and pass through an understanding of their semantic content and aims. It goes without saying that any digital library wouldtake enormous advantage from the availability of effective Information Retrieval techniques to provide to their users. This paper proposes an approach to Information Retrieval based on a correspondence of the domain of discourse between the query and the documents in the repository. Such an association is based on standard general-purpose linguistic resources (WordNet and WordNet Domains) and on a novel similarity assessmenttechnique. Although the work is at a preliminary stage, interesting initial results suggest to go on extending and improving the approach.
This document provides an overview of energy harvesting technologies for sustainable wireless sensor networks. It discusses how wireless sensor networks (WSNs) are being used in applications like structural health monitoring and battlefield surveillance. WSNs allow for distributed sensing and processing but face challenges around limited energy resources. The document reviews different energy harvesting technologies that could provide sustainable power sources for sensor nodes, like solar, thermal, and kinetic energy harvesting. It examines how these technologies work and their potential to enable long-term operation of energy-constrained wireless sensor networks.
This document discusses using wireless sensor networks for habitat monitoring. It presents requirements for a system to monitor seabird nesting environments and behaviors. The currently deployed network consists of 32 sensor nodes on an island off the coast of Maine that stream live data online. The application-driven design helps identify important areas for further work like data sampling, communications, network tasks, and health monitoring.
This document summarizes research on data collection protocols for wireless sensor networks. It begins by introducing wireless sensor networks and their basic structure and applications. It then discusses the research status of data collection protocols, including routing protocols like flooding protocols. It describes how newer protocols aim to improve energy efficiency by reducing redundant data transmission through techniques like data fusion, compression, and sampling. Finally, it discusses future research opportunities like improving scalability, security, and cross-layer cooperation between network layers.
Wideband Sensing for Cognitive Radio Systems in Heterogeneous Next Generation...CSCJournals
Mobile Next Generation Network (MNGN) is characterized as heterogeneous network where variety of access technologies are meant to coexist. Decisions on choosing an air interface that meets a particular need at a particular time will be shifted from the network’s side to (a more intelligent) user’s side. On top of that network operators and regularities have come to the realization that assigned spectrum bands are not utilized as they should be. Cognitive radio stands out as a candidate technology to address many emerging issues in MNGN such as capacity, quality of service and spectral efficiency. As a transmission strategy, cognitive radio systems depend greatly on sensing the radio environment. In this paper, we present a novel approach for interference characterization in cognitive radio networks based on wideband chirp signal. The results presented show that improved sensing accuracy is maintained at tolerable system complexity.
1) This paper discusses how nanotechnology can impact future wireless devices and communications.
2) Nanotechnology enables new sensing technologies using arrays of tiny sensing elements, as well as new materials for antennas and radios.
3) Nanotechnology may provide solutions to achieve both increased wireless communication speeds and reduced power consumption for mobile devices.
Feasibility of Artificial Neural Network in Civil Engineeringijtsrd
An Artificial neural network ANN is an information processing hypothesis that is stimulated by the way natural nervous system, such as brain, process information. The using of artificial neural network in civil engineering is getting more and more credit all over the world in last decades. This soft computing method has been shown to be very effective in the analysis and solution of civil engineering problems. It is defined as a body which works out the more and more complex problem through sequential algorithms. It is designed on the basis of artificial intelligence which is proficient of storing more and more information's. In this work, we have investigated the various architectures of ANN and their learning process. The artificial neural network based method was widely applied to the civil engineering because of the strong non linear relationship between known and un known of the problems. They come with good modelling in areas where conventional approaches finite elements, finite differences etc. require large computing resources or time to solve problems. These includes to study the behaviour of building materials, structural identification and control problems, in geo technical engineering like earthquake induced liquefaction potential, in heat transfer problems in civil engineering to improve air quality, in transportation engineering like identification of traffic problems to improve its flexibility , in construction technology and management to estimate the cost of buildings and in building services issues like analyzing the water distribution network etc. Researches reveals that the method is realistic and it will be fascinated for more civil engineering applications. Vikash Singh | Samreen Bano | Anand Kumar Yadav | Dr. Sabih Ahmad ""Feasibility of Artificial Neural Network in Civil Engineering"" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-3 | Issue-3 , April 2019, URL: https://www.ijtsrd.com/papers/ijtsrd22985.pdf
Paper URL: https://www.ijtsrd.com/engineering/civil-engineering/22985/feasibility-of-artificial-neural-network-in-civil-engineering/vikash-singh
This document discusses Human Area Networks (HAN), a type of personal area network that uses the human body as a transmission medium to pass data. It proposes using capacitive coupling to generate an alternating current field on the body's surface to propagate signals between two bodies in contact, without radiation into the surroundings. This allows for a highly secure form of data transfer. The document provides background on computer networking and discusses various standard types of networks like WLAN, LAN, WAN, and MAN. It also reviews some common short-range wireless technologies that could enable HAN, such as Bluetooth, ZigBee, and Wi-Fi, and their respective standards.
IOSR Journal of Electronics and Communication Engineering(IOSR-JECE) is an open access international journal that provides rapid publication (within a month) of articles in all areas of electronics and communication engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in electronics and communication engineering. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
This document discusses the vision of a cloud-centric Internet of Things. It describes how ubiquitous sensing through wireless sensor networks can measure environmental indicators across many areas of life. As these sensing devices proliferate in communicating networks, they create the Internet of Things by seamlessly blending sensors and actuators with our environment. This generates enormous amounts of data that must be stored, processed, and presented seamlessly through cloud computing as a unifying framework. The document outlines key enabling technologies like RFID, wireless sensor networks, and addressing schemes. It also discusses applications, challenges, and the future direction of cloud-based IoT.
This document provides an introduction to cognitive radio. It defines cognitive radio as an intelligent wireless communication system that is aware of its surrounding environment and can learn and adapt to statistical variations in input stimuli in real-time. The key goals are highly reliable communication and efficient utilization of the radio spectrum. It discusses three fundamental cognitive tasks: radio-scene analysis to detect spectrum holes, channel identification to estimate channel states, and transmit power control and dynamic spectrum management. These three tasks form a cognitive cycle between the transmitter and receiver to achieve the goals of cognitive radio.
The document provides an introduction to the Global Internet of Things (IoT). It defines IoT as a system of interconnected computing devices, machines, objects, animals or people that can transfer data over a network without requiring human interaction. It discusses how IoT is the next phase of development after the Internet of computers and mobile phones. The document outlines several key technologies that enable IoT, including RFID, wireless networks, sensors, cloud computing and energy harvesting. It also discusses the architecture, applications, market and impact of digital transformation of IoT.
The document provides information about a learning module on computer networks for secondary school students in Malaysia. The module contains 4 activities that aim to teach students about:
1) Definitions of networks and the benefits of computer networks.
2) Different types of computer networks including local area networks (LAN), metropolitan area networks (MAN), and wide area networks (WAN).
3) Network topologies like star networks and ring networks.
4) Current network technologies.
The module is intended to help students understand computer networks, be able to define them, identify the devices used, explain different types of networks and topologies, and discuss modern network technologies.
This document discusses the future of internet networks, media, and services. It outlines three visions for the future internet: as a unifying communication platform connecting billions of people and devices; as an intelligent application platform that will take over functionality currently provided on personal platforms; and as an immersive medium that will support natural interaction between people and their environment. It then discusses example research areas including cognitive radio networks, autonomic systems, immersive and context-aware collaborative environments, and energy efficiency in and by ICT. The document concludes with an example research unit roadmap and organization structure.
This document discusses information technology and its components, including computers, telecommunications, modems, and databases. It then discusses how IT has impacted libraries and information centers. Specifically, it discusses how IT has automated library housekeeping operations like acquisition, classification, and circulation. It also discusses how IT has improved information retrieval through online public access catalogs and digital libraries. Finally, it discusses how IT has led to new areas of computer application in libraries and changed library organization structures to support more efficient operations and services.
A Social Welfare Approach in Increasing the Benefits from the Internet in Dev...IDES Editor
The paper examines the Internet usage and its
market environment in developing countries under the
perceived assumption that the Internet is one of the most
important drivers for development. It gives an insight on
processes’ (both unintended and intended) implications and
their effects on achieving real Internet benefits in the
environments where network infrastructures are limited such
as the ones found in the developing regions. A welfare based
approach is proposed in which the Internet providers and endusers
identify a set of objective that leads them in achieving
increased benefits. Analytical model of the main
characteristics in the approach is presented and eventually
shown how the end user bit rate could be regulated based on
the utility bounds that lead general satisfaction to all users.
User satisfaction signifies delivery of expected QoS and as
well as willing to pay for such services.
An efficient transport protocol for delivery of multimedia content in wireles...Alexander Decker
1. The document proposes an efficient transport protocol called the Multimedia Grid Protocol (MMGP) for delivering multimedia content over wireless grids.
2. MMGP aims to provide faster, reliable access and high quality of service when streaming multimedia over wireless grid networks, which face challenges like intermittent connectivity, device heterogeneity, weak security, and device mobility.
3. The protocol incorporates a new video compression algorithm called dWave to make streaming more efficient over bandwidth-constrained wireless networks.
Cognitive Radio Networks: a comprehensive study on scope and applicationsAM Publications
This document discusses cognitive radio networks and their advantages over traditional and software defined radio networks. A cognitive radio network is able to sense available spectrum, then adapt its transmission or reception parameters to communicate without interfering with licensed users. It can learn from previous experiences to most efficiently utilize unused spectrum. The cognitive radio cycle involves spectrum sensing, allocation, reconfiguration, and transmission. Cognitive radio networks provide highly reliable communications and efficient spectrum utilization.
The document discusses wireless sensor networks and ambient intelligence. It begins by providing context on ambient intelligence, describing it as smart electronic environments that are sensitive and responsive to people. It then discusses key challenges for ambient intelligence, including social and political concerns about privacy and trust. Finally, it outlines several technological areas important for ambient intelligence, such as ubiquitous computing, and emphasizes the importance of putting users at the center of system design.
This document discusses the meaning and scope of networking in science learning. It defines a computer network as any set of computers connected to exchange data. There are three main types of networks: local area networks (LANs), metropolitan area networks (MANs), and wide area networks (WANs). Networking provides benefits for learning science such as allowing collaborative work and information sharing. It also discusses advantages like resource sharing and communication abilities, as well as disadvantages including security issues and performance degradation. The document concludes that networks can play a crucial role in developing and spreading science.
Towards Pervasive Computing Environments With Cloud Servicesijsptm
The document proposes an infrastructure called UbiCloud that incorporates pervasive computing environments with cloud services. UbiCloud has two main components: 1) a cloud computing component that provides scalable services through models like IaaS, PaaS, and SaaS, and 2) a ubiquitous computing component that includes a service directory, user agents, and mobile users. The infrastructure aims to address limitations of pervasive computing like limited resources and availability by utilizing the on-demand resources and services of the cloud. It describes a protocol for interaction between entities, such as cloud services registering with the service directory and user agents requesting services on behalf of mobile users.
Similar to The research of cognitive communication networks (20)
Taking AI to the Next Level in Manufacturing.pdfssuserfac0301
Read Taking AI to the Next Level in Manufacturing to gain insights on AI adoption in the manufacturing industry, such as:
1. How quickly AI is being implemented in manufacturing.
2. Which barriers stand in the way of AI adoption.
3. How data quality and governance form the backbone of AI.
4. Organizational processes and structures that may inhibit effective AI adoption.
6. Ideas and approaches to help build your organization's AI strategy.
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...Alex Pruden
Folding is a recent technique for building efficient recursive SNARKs. Several elegant folding protocols have been proposed, such as Nova, Supernova, Hypernova, Protostar, and others. However, all of them rely on an additively homomorphic commitment scheme based on discrete log, and are therefore not post-quantum secure. In this work we present LatticeFold, the first lattice-based folding protocol based on the Module SIS problem. This folding protocol naturally leads to an efficient recursive lattice-based SNARK and an efficient PCD scheme. LatticeFold supports folding low-degree relations, such as R1CS, as well as high-degree relations, such as CCS. The key challenge is to construct a secure folding protocol that works with the Ajtai commitment scheme. The difficulty, is ensuring that extracted witnesses are low norm through many rounds of folding. We present a novel technique using the sumcheck protocol to ensure that extracted witnesses are always low norm no matter how many rounds of folding are used. Our evaluation of the final proof system suggests that it is as performant as Hypernova, while providing post-quantum security.
Paper Link: https://eprint.iacr.org/2024/257
Generating privacy-protected synthetic data using Secludy and MilvusZilliz
During this demo, the founders of Secludy will demonstrate how their system utilizes Milvus to store and manipulate embeddings for generating privacy-protected synthetic data. Their approach not only maintains the confidentiality of the original data but also enhances the utility and scalability of LLMs under privacy constraints. Attendees, including machine learning engineers, data scientists, and data managers, will witness first-hand how Secludy's integration with Milvus empowers organizations to harness the power of LLMs securely and efficiently.
What is an RPA CoE? Session 1 – CoE VisionDianaGray10
In the first session, we will review the organization's vision and how this has an impact on the COE Structure.
Topics covered:
• The role of a steering committee
• How do the organization’s priorities determine CoE Structure?
Speaker:
Chris Bolin, Senior Intelligent Automation Architect Anika Systems
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-EfficiencyScyllaDB
Freshworks creates AI-boosted business software that helps employees work more efficiently and effectively. Managing data across multiple RDBMS and NoSQL databases was already a challenge at their current scale. To prepare for 10X growth, they knew it was time to rethink their database strategy. Learn how they architected a solution that would simplify scaling while keeping costs under control.
The Microsoft 365 Migration Tutorial For Beginner.pptxoperationspcvita
This presentation will help you understand the power of Microsoft 365. However, we have mentioned every productivity app included in Office 365. Additionally, we have suggested the migration situation related to Office 365 and how we can help you.
You can also read: https://www.systoolsgroup.com/updates/office-365-tenant-to-tenant-migration-step-by-step-complete-guide/
Your One-Stop Shop for Python Success: Top 10 US Python Development Providersakankshawande
Simplify your search for a reliable Python development partner! This list presents the top 10 trusted US providers offering comprehensive Python development services, ensuring your project's success from conception to completion.
How information systems are built or acquired puts information, which is what they should be about, in a secondary place. Our language adapted accordingly, and we no longer talk about information systems but applications. Applications evolved in a way to break data into diverse fragments, tightly coupled with applications and expensive to integrate. The result is technical debt, which is re-paid by taking even bigger "loans", resulting in an ever-increasing technical debt. Software engineering and procurement practices work in sync with market forces to maintain this trend. This talk demonstrates how natural this situation is. The question is: can something be done to reverse the trend?
5th LF Energy Power Grid Model Meet-up SlidesDanBrown980551
5th Power Grid Model Meet-up
It is with great pleasure that we extend to you an invitation to the 5th Power Grid Model Meet-up, scheduled for 6th June 2024. This event will adopt a hybrid format, allowing participants to join us either through an online Mircosoft Teams session or in person at TU/e located at Den Dolech 2, Eindhoven, Netherlands. The meet-up will be hosted by Eindhoven University of Technology (TU/e), a research university specializing in engineering science & technology.
Power Grid Model
The global energy transition is placing new and unprecedented demands on Distribution System Operators (DSOs). Alongside upgrades to grid capacity, processes such as digitization, capacity optimization, and congestion management are becoming vital for delivering reliable services.
Power Grid Model is an open source project from Linux Foundation Energy and provides a calculation engine that is increasingly essential for DSOs. It offers a standards-based foundation enabling real-time power systems analysis, simulations of electrical power grids, and sophisticated what-if analysis. In addition, it enables in-depth studies and analysis of the electrical power grid’s behavior and performance. This comprehensive model incorporates essential factors such as power generation capacity, electrical losses, voltage levels, power flows, and system stability.
Power Grid Model is currently being applied in a wide variety of use cases, including grid planning, expansion, reliability, and congestion studies. It can also help in analyzing the impact of renewable energy integration, assessing the effects of disturbances or faults, and developing strategies for grid control and optimization.
What to expect
For the upcoming meetup we are organizing, we have an exciting lineup of activities planned:
-Insightful presentations covering two practical applications of the Power Grid Model.
-An update on the latest advancements in Power Grid -Model technology during the first and second quarters of 2024.
-An interactive brainstorming session to discuss and propose new feature requests.
-An opportunity to connect with fellow Power Grid Model enthusiasts and users.
Main news related to the CCS TSI 2023 (2023/1695)Jakub Marek
An English 🇬🇧 translation of a presentation to the speech I gave about the main changes brought by CCS TSI 2023 at the biggest Czech conference on Communications and signalling systems on Railways, which was held in Clarion Hotel Olomouc from 7th to 9th November 2023 (konferenceszt.cz). Attended by around 500 participants and 200 on-line followers.
The original Czech 🇨🇿 version of the presentation can be found here: https://www.slideshare.net/slideshow/hlavni-novinky-souvisejici-s-ccs-tsi-2023-2023-1695/269688092 .
The videorecording (in Czech) from the presentation is available here: https://youtu.be/WzjJWm4IyPk?si=SImb06tuXGb30BEH .
Northern Engraving | Nameplate Manufacturing Process - 2024Northern Engraving
Manufacturing custom quality metal nameplates and badges involves several standard operations. Processes include sheet prep, lithography, screening, coating, punch press and inspection. All decoration is completed in the flat sheet with adhesive and tooling operations following. The possibilities for creating unique durable nameplates are endless. How will you create your brand identity? We can help!
HCL Notes and Domino License Cost Reduction in the World of DLAUpanagenda
Webinar Recording: https://www.panagenda.com/webinars/hcl-notes-and-domino-license-cost-reduction-in-the-world-of-dlau/
The introduction of DLAU and the CCB & CCX licensing model caused quite a stir in the HCL community. As a Notes and Domino customer, you may have faced challenges with unexpected user counts and license costs. You probably have questions on how this new licensing approach works and how to benefit from it. Most importantly, you likely have budget constraints and want to save money where possible. Don’t worry, we can help with all of this!
We’ll show you how to fix common misconfigurations that cause higher-than-expected user counts, and how to identify accounts which you can deactivate to save money. There are also frequent patterns that can cause unnecessary cost, like using a person document instead of a mail-in for shared mailboxes. We’ll provide examples and solutions for those as well. And naturally we’ll explain the new licensing model.
Join HCL Ambassador Marc Thomas in this webinar with a special guest appearance from Franz Walder. It will give you the tools and know-how to stay on top of what is going on with Domino licensing. You will be able lower your cost through an optimized configuration and keep it low going forward.
These topics will be covered
- Reducing license cost by finding and fixing misconfigurations and superfluous accounts
- How do CCB and CCX licenses really work?
- Understanding the DLAU tool and how to best utilize it
- Tips for common problem areas, like team mailboxes, functional/test users, etc
- Practical examples and best practices to implement right away
Programming Foundation Models with DSPy - Meetup SlidesZilliz
Prompting language models is hard, while programming language models is easy. In this talk, I will discuss the state-of-the-art framework DSPy for programming foundation models with its powerful optimizers and runtime constraint system.
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUpanagenda
Webinar Recording: https://www.panagenda.com/webinars/hcl-notes-und-domino-lizenzkostenreduzierung-in-der-welt-von-dlau/
DLAU und die Lizenzen nach dem CCB- und CCX-Modell sind für viele in der HCL-Community seit letztem Jahr ein heißes Thema. Als Notes- oder Domino-Kunde haben Sie vielleicht mit unerwartet hohen Benutzerzahlen und Lizenzgebühren zu kämpfen. Sie fragen sich vielleicht, wie diese neue Art der Lizenzierung funktioniert und welchen Nutzen sie Ihnen bringt. Vor allem wollen Sie sicherlich Ihr Budget einhalten und Kosten sparen, wo immer möglich. Das verstehen wir und wir möchten Ihnen dabei helfen!
Wir erklären Ihnen, wie Sie häufige Konfigurationsprobleme lösen können, die dazu führen können, dass mehr Benutzer gezählt werden als nötig, und wie Sie überflüssige oder ungenutzte Konten identifizieren und entfernen können, um Geld zu sparen. Es gibt auch einige Ansätze, die zu unnötigen Ausgaben führen können, z. B. wenn ein Personendokument anstelle eines Mail-Ins für geteilte Mailboxen verwendet wird. Wir zeigen Ihnen solche Fälle und deren Lösungen. Und natürlich erklären wir Ihnen das neue Lizenzmodell.
Nehmen Sie an diesem Webinar teil, bei dem HCL-Ambassador Marc Thomas und Gastredner Franz Walder Ihnen diese neue Welt näherbringen. Es vermittelt Ihnen die Tools und das Know-how, um den Überblick zu bewahren. Sie werden in der Lage sein, Ihre Kosten durch eine optimierte Domino-Konfiguration zu reduzieren und auch in Zukunft gering zu halten.
Diese Themen werden behandelt
- Reduzierung der Lizenzkosten durch Auffinden und Beheben von Fehlkonfigurationen und überflüssigen Konten
- Wie funktionieren CCB- und CCX-Lizenzen wirklich?
- Verstehen des DLAU-Tools und wie man es am besten nutzt
- Tipps für häufige Problembereiche, wie z. B. Team-Postfächer, Funktions-/Testbenutzer usw.
- Praxisbeispiele und Best Practices zum sofortigen Umsetzen
2. The external environment
The user demands
The user demands The internal environment
Figure 1. The environment range that communication network sensed
Stage one: the network senses current network (SLA), making the reasonable and correct response to the
environments, including external and internal environments. new user demands.
Each node in the communication network can only
monitor the local network state information, how to make III. THE RESEARCH STATES OF COGNITIVE
each node know the whole network state information is a COMMUNICATION NETWORK
problem to be solved firstly. Driven by the process of information globalization, a
Stage two: the communication network is clearly aware large lots of research works on the communication network
of the current demands and the occupied network technology were carried out. The U.S. National Science
resources of various users. Foundation provided 3 billion for the supporting of 100 ×
How to dynamically obtain the global information of the 100, FIND and GENI projects. In Europe, the financial
occupied network resources, and make the communication supports more than 9.1 billion Euro was afforded to the
network rapidly estimating the usages of network resources, researches of ICT (information and communication
is another great challenge. technology). In China, the National High-Tech. R&D
Stage three: dynamically allocates the resources and Program and 973 Program afforded to the researches on this
reconfigures the network adapting to the demands of new kind of communication network technology, and takes it
users with the correct and reasonable response.. as an important direction in information areas, considering
the technologies of cognitive communication network and
reconfiguration as the hot spots problems. Overall, the
U ser dem ands present researches on the cognitive communication network
are mostly about the exploratory on cognitive capabilities,
and are still in its infancy. The cognitive communication
environments
environments
network technology is still an open issue, and the main
External
Internal
Learning and
intelligent decision
research projects are as follows:
(1) The Cognitive Networking (CogNet) Project funded
by the U.S. National Science Foundation (NSF)
The Future Internet Design (FIND) is a long-term
M anagem ent and control of research project afforded by U.S. NSF in 2004. The goal of
netw ork resources
FIND is to achieve the next generation Internet, and its core
features include: security, robustness, manageability, the new
Reconfigurable computing model, integration of new network technology,
netw ork elem ents high standards of service architecture and the new network
architecture theories. The Global Environment for Network
Figure 2 the cognitive technology of communication Innovation (GENI) is officially announced in August 2005
network by U.S. NSF as an action plan. The goal of GENI is to build
a test bed to accommodate a variety of new architecture, and
Communication network will be based on the sensed explore the framework more suitable for the future
network environments, user demands, and the occupied computing environment. The researches of GENI include:
network resources, the communication network does some rethinking the functions of network; designing new network
necessary reconfiguration based on the Services Agreement architecture and services; designing the key capacity of
3. network security and new supporting technologies. As part IV. THE ARCHITECTURE AND TECHNOLOGIES FOR
of the FIND and GENI plan, the main goal of cognitive COGNITIVE COMMUNICATION NETWORKS
Networks technology is to design and achieve the cognitive
network architecture and protocols, develop the prototype 4.1 The architecture of cognitive communication
system of cognitive network protocol stack, and its main networks
work include: As shown in Figure-3, the cognitive communication
networks is composed three parts, including the demands
Adaptive physical layer and programmable media
mapping and policies generating unit, the network cognitive
access control (MAC) layer; and reconstruction unit and the programmable
Adaptive frequency readjusting protocol for communication network.
transmission link; The demands mapping and policies generating unit: On
Unified control layer for monitoring, configuring, and the one hand mapping the demands from different users into
adjusting the data layer module; different end-to-end network goals (specific network
behavior), on the other hand merging the local network
Intelligent network layer protocol for the functions of environmental information sensed from the underlying
topology discovery, service discovery, addressing, communication network to form the global network resource
naming and dynamic routing. information, and then generating the necessary network
(2) The software programmable intelligent network reconfiguration policies based on the relevant service level
(SPIN) project in Stanford University agreements (SLA). The number of the policies generating
Stanford University proposed the software programmable unit in the network is in small quantities, and can be
intelligent network (SPIN) concept, based on the 9 kinds of deployed in central or distributed pattern.
basic problems existing in the current IP networks, and The network cognitive and reconstruction unit: On the
extracted the advantages in the architecture of IP networks, one hand completing the sensing of network environment,
PSTN, cellular networks and ad hoc networks to form a including network topology, the transmission link status,
novel network architecture. The SPIN is essentially a network node state information, network security status, and
network operating system, with the similar status as the geographical and meteorological information, which are
operating systems in computer, and possesses a 3-layer translated into the local sensing information by the cognitive
structure including the transport layer, the control and specification language as the input of the demands mapping
management layer and the cognitive layer. and policies generating unit; on the other hand, translating
(3) The MotoMeshTm test-bed network by Motorola the network reconfiguring policies from the demands
Corporation mapping and policies generating unit into the network
The main research area for Motorola Corporation in configuration parameters through the cognitive specification
cognitive networks is the MotoMeshTM test-bed network language, completing the work of network resource
with the ability of end-to-end reconfiguration. The project allocating and connection managing. The number of the
includes 27 top U.S. universities, equipment providers, network cognitive and reconstruction unit in network is large,
network operators, and standards and policy makers. Its goal corresponding to the cognitive and reconfiguring node.
is to design, develop and test a new network architecture, to The programmable communication network is consists of
guide the design of reconfigurable transmission equipment, the programmable configuration elements (links, nodes, etc.)
network equipment and supporting systems. and the network status sensors, and the programmable
(4) The Wireless Network After Next (WNaN) project by configuration elements are the control points of cognitive
DARPA network, as well the network status sensors completing the
2009, the Defense Advanced Research Projects Agency sensing work of the network status.
(DARPA) started the Wireless Network After Next (WNaN) 4.2 The Technologies of cognitive communication
project, based on the XG project and adaptive network networks
technology, aiming to develop the quickly cognitive-based Part of the network nodes and links in cognitive
network construction technology for the battlefield communication network possess the learning and reasoning
environment, lower cost of network equipment and handheld ability, and can dynamically make decision and reconfigure
wireless terminals, covering a wide range of connections for the network elements, by measuring or predicting the
each soldier. June 2009, the BBN Corporation in United network environmental parameters, to meet the targets of
States won the finance of 1100 million for the development self-adapting network environment, optimal use of network
of this network project. resources (Frequency, the link bandwidth, node processing
power, etc.) and optimizing the performance of end-to-end
information transferring. Its technologies include:
4. User demands
End-to end
goals
Demands mapping Service priority policy Delay-control policy
Transmission Bandwidth-control demands mapping and
Global network
protecting policy policy policies generating
information
Network environment Policies
Other policies
generating
Cognitive Specification Language-CPL
Topology info
Network resources configuration
and management
Network Link states info
sensing control network cognitive
and reconstruction
Node configuring Dynamic resource Security Connection
and states info allocation management management
Security states
Geographical and
meteorological info
programmable communication network
Figure-3 the architecture of cognitive network
(1) The rapid sensing technologies of communication mapping technologies
network environment The network resources dynamically allocating
The rapid measuring technologies of network technologies
environment parameters The cognition-based network security technologies
The rapid merging and processing technologies of the (4) The cognition-based link efficiently transferring
global environmental information technologies
The global network environment situation The link transferring technologies with the learning
(including network security situation) generating and reasoning capabilities
technologies The link reconfiguring technologies
(2) The User demands mapping and access control The cognitive radio based cross-layer routing
technologies optimizing technologies
The user demands mapping and forecast analyzing (5) The cognition-based network organizing and
technologies information exchanging technologies
The cognition-based user access controlling The network topology on-demand configuring
technologies technologies
(3) The policy-based network resource managing and The end-to-end connecting and QoS providing
controlling technologies technologies
The service level agreement (SLA) and network policy The network nodes and switching mode reconfiguring
5. technologies VI. CONCLUSION
V. THE IDEAS AND SUGGESTIONS ON THE DEVELOPMENT For the application environment and user demands
dynamically changed multi-domain complex networks, it is
OF COGNITIVE COMMUNICATION NETWORKS
needed to multi-angle sensing the network environment, user
To propose a new communication network architecture demands, network resources usage, service supporting,
and build a cognitive communication network with the security level, etc. Implementing a communication network
ability of cognition and reconfiguration is no easy task, with cognitive ability can improve the learning and self-
requiring long-term researching and investigating. The organizing capacity of the communication network,
current implementations and relevant technology on dynamically configure and restructure the network, and
cognitive network is in its progress, and has not been a broad better adapt to the complex and diverse changes of
consensus. However, the direction and focus of the application environments and user demands.
researches are already clear, and the key technology
researches have begun. These technologies (such as REFERENCE
communication network environment rapid detection, policy- [1] Teamwork and Collaboration in Cognitive Wireless Networks.Nolan,
based communication network resource management and K.E.; Doyle, L.E.;Wireless Communications, IEEE Volume 14, Issue
control, the cognition-based and efficient link transmission, 4, August 2007 Page(s):22–27.
the cognition-based networking and information exchanging [2] Utilization of Location Information in Cognitive Wireless
technology) reflect the important characteristics of cognitive Networks.Celebi, H.; Arslan, H.;Wireless Communications, IEEE
Volume 14, Issue 4, August 2007 Page(s):6–13.
communication networks, and are the important ideas for
[3] Cognitive Wireless Networks.Mahonen, P.; Zorzi, M.;Wireless
improvement and technological changes on the existing Communications, IEEE Volume 14, Issue 4, August 2007 Page(s):4-
communication network architecture. First, break through the 5.
key technologies in cognitive communication networks is [4] Guest Editorial -Adaptive, spectrum agile and cognitive wireless
needed. Second, realize the heterogeneous converged networks.Cordeiro, C.; Daneshrad, B; Evans, J; Mandayam,
networks with the local cognitive capability based on the N.;Marshall, P.;N, S.S.; Cimini, L.;Selected Areas in
existing network conditions. Finally, implement the wide- Communications, IEEE Journal on Volume 25, Issue 3, April 2007
Page(s):513–516.
area cognitive communications network.
[5] Towards Cognitive Telecommunication Networks. Safak, Mehmet;
Signal Processing and Communications Applications, 2007. SIU 2007.
IEEE 15th 11-13 June 2007 Page(s):1-4.