Video streaming is content sent in compressed form over the netwoks and viwed the users progressively. The transmission of video with the end goal that it can be prepared as consistent and nonstop stream. The point is that to give client support to client at anyplace and at whatever time. Mobile Ad hoc Networks (MANETs) are considered an attractive nertwork for information transmission in many applications where the customer programme can begin showing the information before the whole record has been transmitted.
Ad hoc On-demand Distance Vector (AODV) protocol is considered as one of the most important routing protocols in MANET. However, routing protocols assume a crucial part in transmission of information over the network. This paper investigates the performance of AODV Routing Protocol under video traffic over PHY IEEE 802.11g. The protocol model was developed in OPNET. Different outcomes from simulation based models are analyzed and appropriate reasons are also discussed. A different scenarios of video streaming were used. The metric in terms of throughput, end to end delay, packet delivery ratio and routing overhead were measured.
A comparision with GRP and GRP are also reported.
Video transmission over wireless networks is considered the most interesting application in our daily life nowadays. As
mobile data rates continue to increase and more people rely on wireless transmission, the amount of video transmitted over at least one
wireless hop will likely continue to increase. This kind of application needs large bandwidth, efficient routing protocols, and content
delivery methods to provide smooth video playback to the receivers. Current generation wireless networks are likely to operate on
internet technology combined with various access technologies. Achieving effective bandwidth aggregation in wireless environments
raises several challenges related to deployment, link heterogeneity, Network congestion, network fluctuation, and energy consumption.
In this work, an overview of technical challenges of over wireless networks is presented. A survey of wireless networks in recent video
transmission schemes is introduced. Demonstration results of few scenarios are showed.
Optimization of Quality of Service in 4G Wireless NetworksIDES Editor
4G radio access technologies should be able to
provide different types of IP services. These services rang from
narrow-band to broadband, from non-real-time to real-time,
and from unicast to multicast broadcast applications. When
the need arises for different levels of user mobility the access
systems are required with advanced capabilities of radio
resource management and Quality of Service (QoS). We
present, in this paper, the different QoS approaches by the
various wireless and connectivity’s networks as well as the
issues that will face their implementations in 4G.
Performance Evaluation of Interactive Video Streaming over WiMAX Network IJECEIAES
Nowadays, the desire of internet access and the need of digital encodings have influenced quite a large number of users to access high quality video application. Offering multimedia services not only to the wired but to wireless mobile client is becoming more viable. In wireless medium, videostreaming still has high resource requirements, for example, bandwidth, traffic priority, smooth play-backs. Therefore, bandwidth demands of these applications are far exceeding the capacity of 3G and Wireless Local Area Networks (LANs). The current research demonstrates the introductory understanding of the Worldwide Interoperability for Microwave Access (WiMax) network, applications, the mechanisms, its potential features, and techniques used to provide QoS in WiMAX, and lastly the network is simulated to report the diverse requirements of streamed video conferencing traffic and its specifications. For this purpose two input parameters of video traffic are selected, i.e, refresh rate, which is monitored in terms of frames per second and pixel resolutions which basically counts the number of pixels in digital imaging. The network model is developed in OPNET. Different outcomes from simulation based models are analyzed and appropriate reasons are also discussed. Apart from this, the second aim of the current research is to address whether WiMAX access technology for streaming video applications could provide comparable network performance to Asymmetric Digital Subscriber Line (ADSL). For this purpose network metrices such as End to End delay and throughput is taken into consideration for optimization.
Video steaming Throughput Performance Analysis over LTEiosrjce
IOSR Journal of Electronics and Communication Engineering(IOSR-JECE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of electronics and communication engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in electronics and communication engineering. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
Video transmission over wireless networks is considered the most interesting application in our daily life nowadays. As
mobile data rates continue to increase and more people rely on wireless transmission, the amount of video transmitted over at least one
wireless hop will likely continue to increase. This kind of application needs large bandwidth, efficient routing protocols, and content
delivery methods to provide smooth video playback to the receivers. Current generation wireless networks are likely to operate on
internet technology combined with various access technologies. Achieving effective bandwidth aggregation in wireless environments
raises several challenges related to deployment, link heterogeneity, Network congestion, network fluctuation, and energy consumption.
In this work, an overview of technical challenges of over wireless networks is presented. A survey of wireless networks in recent video
transmission schemes is introduced. Demonstration results of few scenarios are showed.
Optimization of Quality of Service in 4G Wireless NetworksIDES Editor
4G radio access technologies should be able to
provide different types of IP services. These services rang from
narrow-band to broadband, from non-real-time to real-time,
and from unicast to multicast broadcast applications. When
the need arises for different levels of user mobility the access
systems are required with advanced capabilities of radio
resource management and Quality of Service (QoS). We
present, in this paper, the different QoS approaches by the
various wireless and connectivity’s networks as well as the
issues that will face their implementations in 4G.
Performance Evaluation of Interactive Video Streaming over WiMAX Network IJECEIAES
Nowadays, the desire of internet access and the need of digital encodings have influenced quite a large number of users to access high quality video application. Offering multimedia services not only to the wired but to wireless mobile client is becoming more viable. In wireless medium, videostreaming still has high resource requirements, for example, bandwidth, traffic priority, smooth play-backs. Therefore, bandwidth demands of these applications are far exceeding the capacity of 3G and Wireless Local Area Networks (LANs). The current research demonstrates the introductory understanding of the Worldwide Interoperability for Microwave Access (WiMax) network, applications, the mechanisms, its potential features, and techniques used to provide QoS in WiMAX, and lastly the network is simulated to report the diverse requirements of streamed video conferencing traffic and its specifications. For this purpose two input parameters of video traffic are selected, i.e, refresh rate, which is monitored in terms of frames per second and pixel resolutions which basically counts the number of pixels in digital imaging. The network model is developed in OPNET. Different outcomes from simulation based models are analyzed and appropriate reasons are also discussed. Apart from this, the second aim of the current research is to address whether WiMAX access technology for streaming video applications could provide comparable network performance to Asymmetric Digital Subscriber Line (ADSL). For this purpose network metrices such as End to End delay and throughput is taken into consideration for optimization.
Video steaming Throughput Performance Analysis over LTEiosrjce
IOSR Journal of Electronics and Communication Engineering(IOSR-JECE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of electronics and communication engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in electronics and communication engineering. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
Quality of service performances of video and voice transmission in universal ...journalBEEI
The universal mobile telecommunications system (UMTS) has distinct benefits in that it supports a wide range of quality of service (QoS) criteria that users require in order to fulfill their requirements. The transmission of video and audio in real-time applications places a high demand on the cellular network, therefore QoS is a major problem in these applications. The ability to provide QoS in the UMTS backbone network necessitates an active QoS mechanism in order to maintain the necessary level of convenience on UMTS networks. For UMTS networks, investigation models for end-to-end QoS, total transmitted and received data, packet loss, and throughput providing techniques are run and assessed and the simulation results are examined. According to the results, appropriate QoS adaption allows for specific voice and video transmission. Finally, by analyzing existing QoS parameters, the QoS performance of 4G/UMTS networks may be improved.
A Secure QOS Distributed Routing Protocol for Hybrid Wireless Networksiosrjce
IOSR Journal of Computer Engineering (IOSR-JCE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of computer engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in computer technology. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
Analysis of Handoff techniques used for hybrid networks: cellular/WLAN IJORCS
Most real life networks are hybrid networks. A hybrid network combines the best features of two or more networks. In networking terminology, a hybrid network according to “Information Technology control and Audit” are reliable and versatile. They provide large numbers of connections and data transmission paths to users. These hybrid networks may be treated as network nodes for analysis purpose. The two radio access technologies (RATs) are considered with cellular/WLAN depending on whether it is voice/ data, video. For observing practical result, some setups are required in laboratory which includes interface from personal computer to mobile terminal and vice-versa. The network simulator (Ns-2) is used for analysis purpose. The results shows the parameters like energy good put, Bandwidth utilization, packet delivery ratio, energy good put and energy consumed are improved after using hybrid networks.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
Unified Billing-Realization of convergent architecture for charging and billi...IDES Editor
4G is expected to get deployed by many telecom
companies in this year. Technologies employed by 4G being
tested and going to hit the commercial market soon. When
fully implemented, 4G is expected to offer high speed
transmission and provide seamless handoffs across multiple
high speed heterogeneous networks. These heterogeneous
networks on converged platform provide access to varied
services over an IPv6 core. Convergence & high speed would
provide opportunity to end user to use compounded services
from varied network providers; this will lead to big challenge
for accounting, Charging and billing. This paper in
continuation of our previous papers [7][21] discusses a
Convergent Framework Architecture (CFA) which provides a
unified bill to the user for all his compounded usage across
varied network operators. The CFA introduces a trusted third
party operator called the Convergent Network Operator
(CNO) to achieve a transparent charging, accounting and
unified billing provisions. The functionality of the CFA is
demonstrated with a prototype. We were able to realize unified
bill to end user for the usage of different type of service from
varied network providers. This concept and business model
will bring better Quality of service (QoS) not only at
competitive price but also provide independence and choice to
users to opt for specific services from Quality network
operators. These instructions give you basic guidelines for
preparing camera-ready papers for ACEEE’s conference
proceedings/Journal Publications.
Candidate solutions to improve Wireless Mesh Networks WMNs performance to mee...ijcseit
96% market share of existing Smart Grid network installations is wireless mesh networks [1]. The paper starts by justifying the selection of WMNs as opposed to any other communication technology based on quantifying the bandwidth/latency/QoS constraints of a number of Smart Grid applications. The main objective of this paper, however, is to discuss some optimization techniques that found in the literature and can be implemented to overcome some of the challenges currently being faced by WMNs deployment in Smart Grid’s NANs. Hybrid WMN (HWMN) is proposed as an optimization on the topology level to leverage WMNs convergence. Distributed Autonomous Data Routing DADR, multigate and diversity routing are optimizations on the protocol level to minimize the down time of WMNs. Cognitive Radio is investigated as an optimization on the physical level. The paper also explores the feasibility of using Wireless Software Defined Networks WSDN to improve the overall visibility and manageability of WMNs
Multi-Criteria Handoff Decision Algorithms In Wireless Networksiosrjce
IOSR Journal of Mobile Computing & Application (IOSR-JMCA) aims to cover innovative topics to research findings to trends analysis on Mobile Computing and Application related theories, technologies, methods, applications, and services from all engineering, business and organizational perspectives
WiMAX BASED APPROACH TO ENHANCE LOCALIZED HUMAN SOCIAL NETWORK.AJAL A J
WiMAX
802.16e is the mobile extension from 802.16
Modification in PHY from OFDM to Scalable OFDMA
Modification in MAC for security, handoff, roaming, & resource management
A novel adaptive schema to facilitates playback switching technique for video...IJECEIAES
The services of the video on demand (VoD) are currently based on the developments of the technology of the digital video and the network’s high speed. The files of the video are retrieved from many viewers according to the permission, which is given by VoD services. The remote VoD servers conduct this access. A server permits the user to choose videos anywhere/ anytime in order to enjoy a unified control of the video playback. In this paper, a novel adaptive method is produced in order to deliver various facilities of the VoD to all devices that are moving within several networks. This process is performed via mobility modules within the produced method since it applies a seamless playback technique for retrieving the facilities of the VoD through environments of heterogeneous networks. The performance of the simulation is tested for checking clients’ movements through different networks with different sizes and speeds, which are buffered in the storage. It is found to be proven from the results that the handoff latency has various types of rapidity. The method applies smooth connections and delivers various facilities of the VoD. Meantime, the mobile device transfers through different networks. This implies that the system transports video segments easily without encountering any notable effects.
Analyzing Video Streaming Quality by Using Various Error Correction Methods o...IJERA Editor
Transmission video over ad hoc networks has become one of the most important and interesting subjects of study for researchers and programmers because of the strong relationship between video applications and frequent users of various mobile devices, such as laptops, PDAs, and mobile phones in all aspects of life. However, many challenges, such as packet loss, congestion (i.e., impairments at the network layer), multipath fading (i.e., impairments at the physical layer) [1], and link failure, exist in transferring video over ad hoc networks; these challenges negatively affect the quality of the perceived video [2].This study has investigated video transfer over ad hoc networks. The main challenges of transferring video over ad hoc networks as well as types of errors that may occur during video transmission, various types of video mechanisms, error correction methods, and different Quality of Service (QoS) parameters that affect the quality of the received video are also investigated.
Multimedia Video transmission is over Wireless Local Area Networks is expected to be an important component of many
emerging multimedia applications. However, Wireless networks will always be bandwidth limited compared to fixed networks due to
background noise, limited frequency spectrum, and varying degrees of network coverage and signal strength One of the critical issues
for multimedia applications is to ensure that the Quality of Service (QoS) requirement to be maintained at an acceptable level. Modern
mobile devices are equipped with multiple network interfaces, including 3G/LTE WiFi. Bandwidth aggregation over LTE and WiFi
links offers an attractive opportunity of supporting bandwidth-intensive services, such as high-quality video streaming, on mobile
devices. Achieving effective bandwidth aggregation in wireless environments raises several challenges related to deployment, link
heterogeneity, Network congestion, network fluctuation, and energy consumption. In this work, an overview of schemes for video
transmission over wireless networks is presented where an acceptable quality of service (QoS) for video applications required realtime
video transmission is achieved
IJERA (International journal of Engineering Research and Applications) is International online, ... peer reviewed journal. For more detail or submit your article, please visit www.ijera.com
Quality of service performances of video and voice transmission in universal ...journalBEEI
The universal mobile telecommunications system (UMTS) has distinct benefits in that it supports a wide range of quality of service (QoS) criteria that users require in order to fulfill their requirements. The transmission of video and audio in real-time applications places a high demand on the cellular network, therefore QoS is a major problem in these applications. The ability to provide QoS in the UMTS backbone network necessitates an active QoS mechanism in order to maintain the necessary level of convenience on UMTS networks. For UMTS networks, investigation models for end-to-end QoS, total transmitted and received data, packet loss, and throughput providing techniques are run and assessed and the simulation results are examined. According to the results, appropriate QoS adaption allows for specific voice and video transmission. Finally, by analyzing existing QoS parameters, the QoS performance of 4G/UMTS networks may be improved.
A Secure QOS Distributed Routing Protocol for Hybrid Wireless Networksiosrjce
IOSR Journal of Computer Engineering (IOSR-JCE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of computer engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in computer technology. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
Analysis of Handoff techniques used for hybrid networks: cellular/WLAN IJORCS
Most real life networks are hybrid networks. A hybrid network combines the best features of two or more networks. In networking terminology, a hybrid network according to “Information Technology control and Audit” are reliable and versatile. They provide large numbers of connections and data transmission paths to users. These hybrid networks may be treated as network nodes for analysis purpose. The two radio access technologies (RATs) are considered with cellular/WLAN depending on whether it is voice/ data, video. For observing practical result, some setups are required in laboratory which includes interface from personal computer to mobile terminal and vice-versa. The network simulator (Ns-2) is used for analysis purpose. The results shows the parameters like energy good put, Bandwidth utilization, packet delivery ratio, energy good put and energy consumed are improved after using hybrid networks.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
Unified Billing-Realization of convergent architecture for charging and billi...IDES Editor
4G is expected to get deployed by many telecom
companies in this year. Technologies employed by 4G being
tested and going to hit the commercial market soon. When
fully implemented, 4G is expected to offer high speed
transmission and provide seamless handoffs across multiple
high speed heterogeneous networks. These heterogeneous
networks on converged platform provide access to varied
services over an IPv6 core. Convergence & high speed would
provide opportunity to end user to use compounded services
from varied network providers; this will lead to big challenge
for accounting, Charging and billing. This paper in
continuation of our previous papers [7][21] discusses a
Convergent Framework Architecture (CFA) which provides a
unified bill to the user for all his compounded usage across
varied network operators. The CFA introduces a trusted third
party operator called the Convergent Network Operator
(CNO) to achieve a transparent charging, accounting and
unified billing provisions. The functionality of the CFA is
demonstrated with a prototype. We were able to realize unified
bill to end user for the usage of different type of service from
varied network providers. This concept and business model
will bring better Quality of service (QoS) not only at
competitive price but also provide independence and choice to
users to opt for specific services from Quality network
operators. These instructions give you basic guidelines for
preparing camera-ready papers for ACEEE’s conference
proceedings/Journal Publications.
Candidate solutions to improve Wireless Mesh Networks WMNs performance to mee...ijcseit
96% market share of existing Smart Grid network installations is wireless mesh networks [1]. The paper starts by justifying the selection of WMNs as opposed to any other communication technology based on quantifying the bandwidth/latency/QoS constraints of a number of Smart Grid applications. The main objective of this paper, however, is to discuss some optimization techniques that found in the literature and can be implemented to overcome some of the challenges currently being faced by WMNs deployment in Smart Grid’s NANs. Hybrid WMN (HWMN) is proposed as an optimization on the topology level to leverage WMNs convergence. Distributed Autonomous Data Routing DADR, multigate and diversity routing are optimizations on the protocol level to minimize the down time of WMNs. Cognitive Radio is investigated as an optimization on the physical level. The paper also explores the feasibility of using Wireless Software Defined Networks WSDN to improve the overall visibility and manageability of WMNs
Multi-Criteria Handoff Decision Algorithms In Wireless Networksiosrjce
IOSR Journal of Mobile Computing & Application (IOSR-JMCA) aims to cover innovative topics to research findings to trends analysis on Mobile Computing and Application related theories, technologies, methods, applications, and services from all engineering, business and organizational perspectives
WiMAX BASED APPROACH TO ENHANCE LOCALIZED HUMAN SOCIAL NETWORK.AJAL A J
WiMAX
802.16e is the mobile extension from 802.16
Modification in PHY from OFDM to Scalable OFDMA
Modification in MAC for security, handoff, roaming, & resource management
A novel adaptive schema to facilitates playback switching technique for video...IJECEIAES
The services of the video on demand (VoD) are currently based on the developments of the technology of the digital video and the network’s high speed. The files of the video are retrieved from many viewers according to the permission, which is given by VoD services. The remote VoD servers conduct this access. A server permits the user to choose videos anywhere/ anytime in order to enjoy a unified control of the video playback. In this paper, a novel adaptive method is produced in order to deliver various facilities of the VoD to all devices that are moving within several networks. This process is performed via mobility modules within the produced method since it applies a seamless playback technique for retrieving the facilities of the VoD through environments of heterogeneous networks. The performance of the simulation is tested for checking clients’ movements through different networks with different sizes and speeds, which are buffered in the storage. It is found to be proven from the results that the handoff latency has various types of rapidity. The method applies smooth connections and delivers various facilities of the VoD. Meantime, the mobile device transfers through different networks. This implies that the system transports video segments easily without encountering any notable effects.
Analyzing Video Streaming Quality by Using Various Error Correction Methods o...IJERA Editor
Transmission video over ad hoc networks has become one of the most important and interesting subjects of study for researchers and programmers because of the strong relationship between video applications and frequent users of various mobile devices, such as laptops, PDAs, and mobile phones in all aspects of life. However, many challenges, such as packet loss, congestion (i.e., impairments at the network layer), multipath fading (i.e., impairments at the physical layer) [1], and link failure, exist in transferring video over ad hoc networks; these challenges negatively affect the quality of the perceived video [2].This study has investigated video transfer over ad hoc networks. The main challenges of transferring video over ad hoc networks as well as types of errors that may occur during video transmission, various types of video mechanisms, error correction methods, and different Quality of Service (QoS) parameters that affect the quality of the received video are also investigated.
Multimedia Video transmission is over Wireless Local Area Networks is expected to be an important component of many
emerging multimedia applications. However, Wireless networks will always be bandwidth limited compared to fixed networks due to
background noise, limited frequency spectrum, and varying degrees of network coverage and signal strength One of the critical issues
for multimedia applications is to ensure that the Quality of Service (QoS) requirement to be maintained at an acceptable level. Modern
mobile devices are equipped with multiple network interfaces, including 3G/LTE WiFi. Bandwidth aggregation over LTE and WiFi
links offers an attractive opportunity of supporting bandwidth-intensive services, such as high-quality video streaming, on mobile
devices. Achieving effective bandwidth aggregation in wireless environments raises several challenges related to deployment, link
heterogeneity, Network congestion, network fluctuation, and energy consumption. In this work, an overview of schemes for video
transmission over wireless networks is presented where an acceptable quality of service (QoS) for video applications required realtime
video transmission is achieved
IJERA (International journal of Engineering Research and Applications) is International online, ... peer reviewed journal. For more detail or submit your article, please visit www.ijera.com
END TO END QUALITY OF SERVICE ASSURANCE FOR MULTI-SERVICE PROVISIONING IN MOB...IJNSA Journal
Multimedia streaming over Mobile Ad Hoc networks has been a very challenging issue due to the dynamic behavior and uncertain nature of the channels. Transmission of real time video has bandwidth, delay and loss requirements. However there are no Quality of Service (QoS) guarantees for video transmission in today’s network. There are many challenging issues that need to be addressed in designing mechanisms for video transmission, which include end-to-end Quality of Service, Bandwidth, Delay, Loss, Congestion, and Heterogeneity. The Challenges of delivering Multi-media signals are even pronounced in Wireless Networks (Mobile Ad Hoc Networks, Wireless Fidelity (Wi-Fi) and Cellular Networks) which are heavily bandwidth constrained and have no fixed infrastructures. In this Research we provide a theoretical model for minimum buffer size as a means of achieving smoother, higher quality streaming video. This Research presents a general optimal video smoothing algorithm based on the concept of dynamically controlled Coefficient of Variance (CV), which is the ratio of standard deviation of the end-to-end delay and the expected value of the delay for each ensemble of packets being transmitted through the network. The results discuss how the size of the “receive buffer” is affected by the allocated bandwidth for each source-pair end users for supporting video streaming applications without any gaps. The simulation performance show that the dynamic client buffer size based on measured bandwidth variation achieves negligible jitter in the video streaming which is subjectively acceptable.
Multimedia streaming over Mobile Ad Hoc networks has been a very challenging issue due to the dynamic
behavior and uncertain nature of the channels. Transmission of real time video has bandwidth, delay and
loss requirements. However there are no Quality of Service (QoS) guarantees for video transmission in
today’s network. There are many challenging issues that need to be addressed in designing mechanisms for
video transmission, which include end-to-end Quality of Service, Bandwidth, Delay, Loss, Congestion, and
Heterogeneity. The Challenges of delivering Multi-media signals are even pronounced in Wireless
Networks (Mobile Ad Hoc Networks, Wireless Fidelity (Wi-Fi) and Cellular Networks) which are heavily
bandwidth constrained and have no fixed infrastructures. In this Research we provide a theoretical model
for minimum buffer size as a means of achieving smoother, higher quality streaming video. This Research
presents a general optimal video smoothing algorithm based on the concept of dynamically controlled
Coefficient of Variance (CV), which is the ratio of standard deviation of the end-to-end delay and the
expected value of the delay for each ensemble of packets being transmitted through the network. The results
discuss how the size of the “receive buffer” is affected by the allocated bandwidth for each source-pair end
users for supporting video streaming applications without any gaps. The simulation performance show that
the dynamic client buffer size based on measured bandwidth variation achieves negligible jitter in the video
streaming which is subjectively acceptable.
RESOURCE ALLOCATION ALGORITHMS FOR QOS OPTIMIZATION IN MOBILE WIMAX NETWORKSijwmn
WiMAX is based on the standard IEEE 802.16e-2009 for wireless access in Metropolitan Area Networks. It
is one of the solutions for 4G IP based wireless technology. WiMAX utilizes Orthogonal Frequency
Division Multiple Access which also supports Multicast and Broadcast Service with appropriate
Modulation and Coding Scheme. Presently, Scheduling and Resource allocation algorithm in Opportunistic
Layered Multicasting provides multicasting of layered video over mobile WiMAX to ensure better QoS.
Initially, the knowledge based allocation of subcarriers is used for scheduling. In addition, to reduce the
burst overhead, delay and jitter, SWIM (Swapping Min-Max) algorithm is utilized. Another promising
technology that can greatly improve the system performance by exploring the broadcasting nature of
wireless channels and the cooperation among multiple users is the Cooperative Multicast Scheduling
(CMS) technique. The simulation results show, Swapping Min-Max performs better with lesser number of
bursts, Zero jitter and with optimal throughput. The results with Cooperative Multicast Scheduling show
the enhanced throughput for each member in the Multicasting Scenario.
Edge device multi-unicasting for video streamingTal Lavian Ph.D.
After a decade of research and development, IP multicast has still not been deployed widely in the global Internet due to many open technical issues: lack of admission control, poorly scaled with large number of groups, and requiring substantial infrastructure modifications. To provide the benefits of IP multicast without requiring direct router support or the presence of a physical broadcast medium, various Application Level Multicast (ALM) models have been attempted. However, there are still several problems with ALM: unnecessary coupling between an application and its multicasting supports, bottleneck problem at network access links and considerable processing power required at the end nodes to support ALM mechanisms. This paper proposes an architecture to address these problems by delegating application-multicasting support mechanisms to smart edge devices associated with the application end nodes. The architecture gives rise to an interesting Edge Device Any-casting technology that lies between the IP-multicasting and the Application Layer Multicasting and enjoys the benefits of both. Furthermore, the architecture may provide sufficient cost-benefit for adoption by service providers. The paper presents initial results obtained from the implementation of a video streaming application over the testbed that implements the proposed architecture.
Differentiated Classes of Service and Flow Management using An Hybrid Broker1IDES Editor
Recently, mobile networks have been overloaded
with a considerable amount of data traffic. The current paper
proposes a management service for mobile environments,
using policies and quality metrics, which ensure a better usage
of network resources with a more fine-grained management
based on flows with different classes of service and
transmission rates. This management of flows is supported
through a closed innovative control loop among a flexible
brokerage service in the network, and agents at the mobile
terminals. It also allows the terminals to make well-informed
decisions about their connections to enhance the number of
connected flows per technology and the individual service level
offered to each flow. Our results indicate that the proposed
solution optimizes the usage of available 4G network resources
among a high number of differentiated flows in several
scenarios where access technologies are extremely overloaded
whilst protecting, through a low complexity scheme, the flows
associated to users that have celebrated more expensive
contracts with their network operators.
SPEECH QUALITY EVALUATION BASED CODEC FOR VOIP OVER 802.11P ijwmn
Voice over Internet Protocol (VoIP) may provide good services through Vehicular ad hoc networks
(VANETs) platform by providing services to many application scenarios range from safety to comfort.
However, VANETs networks introduce many challenges for supporting voice with QoS requirements. In
this paper, our study is based on Inter-Vehicle voice streaming rely on multi-hop fashion. For this task, a
performance evaluation of various audio CODECs will be analyzed by mean of simulations.
Furthermore, we test the impact of network environment on QoS metrics. To achieve good results,
CODECs behaviour is tested by using mobility information obtained from vehicular traffic generator. The
mobility model is based on the real road maps of an urban environment. Focusing on inter-vehicular
voice traffic quality, we provide simulations results in terms of both user level (MOS) metrics and
network level (such as Losses). According to this performance evaluation, we show that G.723.1 CODEC
worked well in the urban VANET environment.
MANET ROUTING PROTOCOLS ON NETWORK LAYER IN REALTIME SCENARIOIJCI JOURNAL
A Mobile Ad hoc Network comprises of a group of mobile nodes that are connected in wireless medium
and they dynamically form a self-organizing mobile network for temporary period of time. Due to ease of
deployment, MANET is very effective in situations where it is difficult to create infrastructure based
network. Nodes in a MANET are self configured and self governed without being controlled by any central
administrator. Mobile Adhoc Network (MANET) has always been a rising technology which supports real
time multimedia transmission service, a common trend in current communication technology that uses
maximum real time applications with dynamic mobility of the mobile devices. Offering Quality of Service is
also an important parameter during communication in real time scenario.Many routing protocols for
Mobile Adhoc Network Supporting Real Time Applications have been developed, basic intention being
maximum utilization of resource in resource constraint environment, minimum power consumption using
limited residual battery power of the highly movable mobile nodes. This paper presents an intensive study
and analysis of MANET based effective routing protocols and secondly, it provides report on comparative
analysis of efficient real time supported protocols based on power consumption, delay analysis and packet
delivery ratio.
Similar to Video streaming over Ad hoc on-demand distance vector routing protocol (20)
Square transposition: an approach to the transposition process in block cipherjournalBEEI
The transposition process is needed in cryptography to create a diffusion effect on data encryption standard (DES) and advanced encryption standard (AES) algorithms as standard information security algorithms by the National Institute of Standards and Technology. The problem with DES and AES algorithms is that their transposition index values form patterns and do not form random values. This condition will certainly make it easier for a cryptanalyst to look for a relationship between ciphertexts because some processes are predictable. This research designs a transposition algorithm called square transposition. Each process uses square 8 × 8 as a place to insert and retrieve 64-bits. The determination of the pairing of the input scheme and the retrieval scheme that have unequal flow is an important factor in producing a good transposition. The square transposition can generate random and non-pattern indices so that transposition can be done better than DES and AES.
Hyper-parameter optimization of convolutional neural network based on particl...journalBEEI
Deep neural networks have accomplished enormous progress in tackling many problems. More specifically, convolutional neural network (CNN) is a category of deep networks that have been a dominant technique in computer vision tasks. Despite that these deep neural networks are highly effective; the ideal structure is still an issue that needs a lot of investigation. Deep Convolutional Neural Network model is usually designed manually by trials and repeated tests which enormously constrain its application. Many hyper-parameters of the CNN can affect the model performance. These parameters are depth of the network, numbers of convolutional layers, and numbers of kernels with their sizes. Therefore, it may be a huge challenge to design an appropriate CNN model that uses optimized hyper-parameters and reduces the reliance on manual involvement and domain expertise. In this paper, a design architecture method for CNNs is proposed by utilization of particle swarm optimization (PSO) algorithm to learn the optimal CNN hyper-parameters values. In the experiment, we used Modified National Institute of Standards and Technology (MNIST) database of handwritten digit recognition. The experiments showed that our proposed approach can find an architecture that is competitive to the state-of-the-art models with a testing error of 0.87%.
Supervised machine learning based liver disease prediction approach with LASS...journalBEEI
In this contemporary era, the uses of machine learning techniques are increasing rapidly in the field of medical science for detecting various diseases such as liver disease (LD). Around the globe, a large number of people die because of this deadly disease. By diagnosing the disease in a primary stage, early treatment can be helpful to cure the patient. In this research paper, a method is proposed to diagnose the LD using supervised machine learning classification algorithms, namely logistic regression, decision tree, random forest, AdaBoost, KNN, linear discriminant analysis, gradient boosting and support vector machine (SVM). We also deployed a least absolute shrinkage and selection operator (LASSO) feature selection technique on our taken dataset to suggest the most highly correlated attributes of LD. The predictions with 10 fold cross-validation (CV) made by the algorithms are tested in terms of accuracy, sensitivity, precision and f1-score values to forecast the disease. It is observed that the decision tree algorithm has the best performance score where accuracy, precision, sensitivity and f1-score values are 94.295%, 92%, 99% and 96% respectively with the inclusion of LASSO. Furthermore, a comparison with recent studies is shown to prove the significance of the proposed system.
A secure and energy saving protocol for wireless sensor networksjournalBEEI
The research domain for wireless sensor networks (WSN) has been extensively conducted due to innovative technologies and research directions that have come up addressing the usability of WSN under various schemes. This domain permits dependable tracking of a diversity of environments for both military and civil applications. The key management mechanism is a primary protocol for keeping the privacy and confidentiality of the data transmitted among different sensor nodes in WSNs. Since node's size is small; they are intrinsically limited by inadequate resources such as battery life-time and memory capacity. The proposed secure and energy saving protocol (SESP) for wireless sensor networks) has a significant impact on the overall network life-time and energy dissipation. To encrypt sent messsages, the SESP uses the public-key cryptography’s concept. It depends on sensor nodes' identities (IDs) to prevent the messages repeated; making security goals- authentication, confidentiality, integrity, availability, and freshness to be achieved. Finally, simulation results show that the proposed approach produced better energy consumption and network life-time compared to LEACH protocol; sensors are dead after 900 rounds in the proposed SESP protocol. While, in the low-energy adaptive clustering hierarchy (LEACH) scheme, the sensors are dead after 750 rounds.
Plant leaf identification system using convolutional neural networkjournalBEEI
This paper proposes a leaf identification system using convolutional neural network (CNN). This proposed system can identify five types of local Malaysia leaf which were acacia, papaya, cherry, mango and rambutan. By using CNN from deep learning, the network is trained from the database that acquired from leaf images captured by mobile phone for image classification. ResNet-50 was the architecture has been used for neural networks image classification and training the network for leaf identification. The recognition of photographs leaves requested several numbers of steps, starting with image pre-processing, feature extraction, plant identification, matching and testing, and finally extracting the results achieved in MATLAB. Testing sets of the system consists of 3 types of images which were white background, and noise added and random background images. Finally, interfaces for the leaf identification system have developed as the end software product using MATLAB app designer. As a result, the accuracy achieved for each training sets on five leaf classes are recorded above 98%, thus recognition process was successfully implemented.
Customized moodle-based learning management system for socially disadvantaged...journalBEEI
This study aims to develop Moodle-based LMS with customized learning content and modified user interface to facilitate pedagogical processes during covid-19 pandemic and investigate how teachers of socially disadvantaged schools perceived usability and technology acceptance. Co-design process was conducted with two activities: 1) need assessment phase using an online survey and interview session with the teachers and 2) the development phase of the LMS. The system was evaluated by 30 teachers from socially disadvantaged schools for relevance to their distance learning activities. We employed computer software usability questionnaire (CSUQ) to measure perceived usability and the technology acceptance model (TAM) with insertion of 3 original variables (i.e., perceived usefulness, perceived ease of use, and intention to use) and 5 external variables (i.e., attitude toward the system, perceived interaction, self-efficacy, user interface design, and course design). The average CSUQ rating exceeded 5.0 of 7 point-scale, indicated that teachers agreed that the information quality, interaction quality, and user interface quality were clear and easy to understand. TAM results concluded that the LMS design was judged to be usable, interactive, and well-developed. Teachers reported an effective user interface that allows effective teaching operations and lead to the system adoption in immediate time.
Understanding the role of individual learner in adaptive and personalized e-l...journalBEEI
Dynamic learning environment has emerged as a powerful platform in a modern e-learning system. The learning situation that constantly changing has forced the learning platform to adapt and personalize its learning resources for students. Evidence suggested that adaptation and personalization of e-learning systems (APLS) can be achieved by utilizing learner modeling, domain modeling, and instructional modeling. In the literature of APLS, questions have been raised about the role of individual characteristics that are relevant for adaptation. With several options, a new problem has been raised where the attributes of students in APLS often overlap and are not related between studies. Therefore, this study proposed a list of learner model attributes in dynamic learning to support adaptation and personalization. The study was conducted by exploring concepts from the literature selected based on the best criteria. Then, we described the results of important concepts in student modeling and provided definitions and examples of data values that researchers have used. Besides, we also discussed the implementation of the selected learner model in providing adaptation in dynamic learning.
Prototype mobile contactless transaction system in traditional markets to sup...journalBEEI
One way to prevent and reduce the spread of the covid-19 pandemic is through physical distancing program. This research aims to develop a prototype contactless transaction system using digital payment mechanisms and QR code technology that will be applied in traditional markets. The method used in the development of electronic market systems is a prototype approach. The application of QR code and digital payments are used as a solution to minimize money exchange contacts that are common in traditional markets. The results showed that the system built was able to accelerate and facilitate the buying and selling transaction process in traditional market environment. Alpha testing shows that all functional systems are running well. Meanwhile, beta testing shows that the user can very well accept the system that was built. The results of the study also show acceptance of the usefulness of the system being built, as well as the optimism of its users to be able to take advantage of this system both technologically and functionally, so its can be a part of the digital transformation of the traditional market to the electronic market and has become one of the solutions in reducing the spread of the current covid-19 pandemic.
Wireless HART stack using multiprocessor technique with laxity algorithmjournalBEEI
The use of a real-time operating system is required for the demarcation of industrial wireless sensor network (IWSN) stacks (RTOS). In the industrial world, a vast number of sensors are utilised to gather various types of data. The data gathered by the sensors cannot be prioritised ahead of time. Because all of the information is equally essential. As a result, a protocol stack is employed to guarantee that data is acquired and processed fairly. In IWSN, the protocol stack is implemented using RTOS. The data collected from IWSN sensor nodes is processed using non-preemptive scheduling and the protocol stack, and then sent in parallel to the IWSN's central controller. The real-time operating system (RTOS) is a process that occurs between hardware and software. Packets must be sent at a certain time. It's possible that some packets may collide during transmission. We're going to undertake this project to get around this collision. As a prototype, this project is divided into two parts. The first uses RTOS and the LPC2148 as a master node, while the second serves as a standard data collection node to which sensors are attached. Any controller may be used in the second part, depending on the situation. Wireless HART allows two nodes to communicate with each other.
Implementation of double-layer loaded on octagon microstrip yagi antennajournalBEEI
A double-layer loaded on the octagon microstrip yagi antenna (OMYA) at 5.8 GHz industrial, scientific and medical (ISM) Band is investigated in this paper. The double-layer consist of two double positive (DPS) substrates. The OMYA is overlaid with a double-layer configuration were simulated, fabricated and measured. A good agreement was observed between the computed and measured results of the gain for this antenna. According to comparison results, it shows that 2.5 dB improvement of the OMYA gain can be obtained by applying the double-layer on the top of the OMYA. Meanwhile, the bandwidth of the measured OMYA with the double-layer is 14.6%. It indicates that the double-layer can be used to increase the OMYA performance in term of gain and bandwidth.
The calculation of the field of an antenna located near the human headjournalBEEI
In this work, a numerical calculation was carried out in one of the universal programs for automatic electro-dynamic design. The calculation is aimed at obtaining numerical values for specific absorbed power (SAR). It is the SAR value that can be used to determine the effect of the antenna of a wireless device on biological objects; the dipole parameters will be selected for GSM1800. Investigation of the influence of distance to a cell phone on radiation shows that absorbed in the head of a person the effect of electromagnetic radiation on the brain decreases by three times this is a very important result the SAR value has decreased by almost three times it is acceptable results.
Exact secure outage probability performance of uplinkdownlink multiple access...journalBEEI
In this paper, we study uplink-downlink non-orthogonal multiple access (NOMA) systems by considering the secure performance at the physical layer. In the considered system model, the base station acts a relay to allow two users at the left side communicate with two users at the right side. By considering imperfect channel state information (CSI), the secure performance need be studied since an eavesdropper wants to overhear signals processed at the downlink. To provide secure performance metric, we derive exact expressions of secrecy outage probability (SOP) and and evaluating the impacts of main parameters on SOP metric. The important finding is that we can achieve the higher secrecy performance at high signal to noise ratio (SNR). Moreover, the numerical results demonstrate that the SOP tends to a constant at high SNR. Finally, our results show that the power allocation factors, target rates are main factors affecting to the secrecy performance of considered uplink-downlink NOMA systems.
Design of a dual-band antenna for energy harvesting applicationjournalBEEI
This report presents an investigation on how to improve the current dual-band antenna to enhance the better result of the antenna parameters for energy harvesting application. Besides that, to develop a new design and validate the antenna frequencies that will operate at 2.4 GHz and 5.4 GHz. At 5.4 GHz, more data can be transmitted compare to 2.4 GHz. However, 2.4 GHz has long distance of radiation, so it can be used when far away from the antenna module compare to 5 GHz that has short distance in radiation. The development of this project includes the scope of designing and testing of antenna using computer simulation technology (CST) 2018 software and vector network analyzer (VNA) equipment. In the process of designing, fundamental parameters of antenna are being measured and validated, in purpose to identify the better antenna performance.
Transforming data-centric eXtensible markup language into relational database...journalBEEI
eXtensible markup language (XML) appeared internationally as the format for data representation over the web. Yet, most organizations are still utilising relational databases as their database solutions. As such, it is crucial to provide seamless integration via effective transformation between these database infrastructures. In this paper, we propose XML-REG to bridge these two technologies based on node-based and path-based approaches. The node-based approach is good to annotate each positional node uniquely, while the path-based approach provides summarised path information to join the nodes. On top of that, a new range labelling is also proposed to annotate nodes uniquely by ensuring the structural relationships are maintained between nodes. If a new node is to be added to the document, re-labelling is not required as the new label will be assigned to the node via the new proposed labelling scheme. Experimental evaluations indicated that the performance of XML-REG exceeded XMap, XRecursive, XAncestor and Mini-XML concerning storing time, query retrieval time and scalability. This research produces a core framework for XML to relational databases (RDB) mapping, which could be adopted in various industries.
Key performance requirement of future next wireless networks (6G)journalBEEI
Given the massive potentials of 5G communication networks and their foreseeable evolution, what should there be in 6G that is not in 5G or its long-term evolution? 6G communication networks are estimated to integrate the terrestrial, aerial, and maritime communications into a forceful network which would be faster, more reliable, and can support a massive number of devices with ultra-low latency requirements. This article presents a complete overview of potential 6G communication networks. The major contribution of this study is to present a broad overview of key performance indicators (KPIs) of 6G networks that cover the latest manufacturing progress in the environment of the principal areas of research application, and challenges.
Noise resistance territorial intensity-based optical flow using inverse confi...journalBEEI
This paper presents the use of the inverse confidential technique on bilateral function with the territorial intensity-based optical flow to prove the effectiveness in noise resistance environment. In general, the image’s motion vector is coded by the technique called optical flow where the sequences of the image are used to determine the motion vector. But, the accuracy rate of the motion vector is reduced when the source of image sequences is interfered by noises. This work proved that the inverse confidential technique on bilateral function can increase the percentage of accuracy in the motion vector determination by the territorial intensity-based optical flow under the noisy environment. We performed the testing with several kinds of non-Gaussian noises at several patterns of standard image sequences by analyzing the result of the motion vector in a form of the error vector magnitude (EVM) and compared it with several noise resistance techniques in territorial intensity-based optical flow method.
Modeling climate phenomenon with software grids analysis and display system i...journalBEEI
This study aims to model climate change based on rainfall, air temperature, pressure, humidity and wind with grADS software and create a global warming module. This research uses 3D model, define, design, and develop. The results of the modeling of the five climate elements consist of the annual average temperature in Indonesia in 2009-2015 which is between 29oC to 30.1oC, the horizontal distribution of the annual average pressure in Indonesia in 2009-2018 is between 800 mBar to 1000 mBar, the horizontal distribution the average annual humidity in Indonesia in 2009 and 2011 ranged between 27-57, in 2012-2015, 2017 and 2018 it ranged between 30-60, during the East Monsoon, the wind circulation moved from northern Indonesia to the southern region Indonesia. During the west monsoon, the wind circulation moves from the southern part of Indonesia to the northern part of Indonesia. The global warming module for SMA/MA produced is feasible to use, this is in accordance with the value given by the validate of 69 which is in the appropriate category and the response of teachers and students through a 91% questionnaire.
An approach of re-organizing input dataset to enhance the quality of emotion ...journalBEEI
The purpose of this paper is to propose an approach of re-organizing input data to recognize emotion based on short signal segments and increase the quality of emotional recognition using physiological signals. MIT's long physiological signal set was divided into two new datasets, with shorter and overlapped segments. Three different classification methods (support vector machine, random forest, and multilayer perceptron) were implemented to identify eight emotional states based on statistical features of each segment in these two datasets. By re-organizing the input dataset, the quality of recognition results was enhanced. The random forest shows the best classification result among three implemented classification methods, with an accuracy of 97.72% for eight emotional states, on the overlapped dataset. This approach shows that, by re-organizing the input dataset, the high accuracy of recognition results can be achieved without the use of EEG and ECG signals.
Parking detection system using background subtraction and HSV color segmentationjournalBEEI
Manual system vehicle parking makes finding vacant parking lots difficult, so it has to check directly to the vacant space. If many people do parking, then the time needed for it is very much or requires many people to handle it. This research develops a real-time parking system to detect parking. The system is designed using the HSV color segmentation method in determining the background image. In addition, the detection process uses the background subtraction method. Applying these two methods requires image preprocessing using several methods such as grayscaling, blurring (low-pass filter). In addition, it is followed by a thresholding and filtering process to get the best image in the detection process. In the process, there is a determination of the ROI to determine the focus area of the object identified as empty parking. The parking detection process produces the best average accuracy of 95.76%. The minimum threshold value of 255 pixels is 0.4. This value is the best value from 33 test data in several criteria, such as the time of capture, composition and color of the vehicle, the shape of the shadow of the object’s environment, and the intensity of light. This parking detection system can be implemented in real-time to determine the position of an empty place.
A multi-task learning based hybrid prediction algorithm for privacy preservin...journalBEEI
There is ever increasing need to use computer vision devices to capture videos as part of many real-world applications. However, invading privacy of people is the cause of concern. There is need for protecting privacy of people while videos are used purposefully based on objective functions. One such use case is human activity recognition without disclosing human identity. In this paper, we proposed a multi-task learning based hybrid prediction algorithm (MTL-HPA) towards realising privacy preserving human activity recognition framework (PPHARF). It serves the purpose by recognizing human activities from videos while preserving identity of humans present in the multimedia object. Face of any person in the video is anonymized to preserve privacy while the actions of the person are exposed to get them extracted. Without losing utility of human activity recognition, anonymization is achieved. Humans and face detection methods file to reveal identity of the persons in video. We experimentally confirm with joint-annotated human motion data base (JHMDB) and daily action localization in YouTube (DALY) datasets that the framework recognises human activities and ensures non-disclosure of privacy information. Our approach is better than many traditional anonymization techniques such as noise adding, blurring, and masking.
Democratizing Fuzzing at Scale by Abhishek Aryaabh.arya
Presented at NUS: Fuzzing and Software Security Summer School 2024
This keynote talks about the democratization of fuzzing at scale, highlighting the collaboration between open source communities, academia, and industry to advance the field of fuzzing. It delves into the history of fuzzing, the development of scalable fuzzing platforms, and the empowerment of community-driven research. The talk will further discuss recent advancements leveraging AI/ML and offer insights into the future evolution of the fuzzing landscape.
TECHNICAL TRAINING MANUAL GENERAL FAMILIARIZATION COURSEDuvanRamosGarzon1
AIRCRAFT GENERAL
The Single Aisle is the most advanced family aircraft in service today, with fly-by-wire flight controls.
The A318, A319, A320 and A321 are twin-engine subsonic medium range aircraft.
The family offers a choice of engines
Courier management system project report.pdfKamal Acharya
It is now-a-days very important for the people to send or receive articles like imported furniture, electronic items, gifts, business goods and the like. People depend vastly on different transport systems which mostly use the manual way of receiving and delivering the articles. There is no way to track the articles till they are received and there is no way to let the customer know what happened in transit, once he booked some articles. In such a situation, we need a system which completely computerizes the cargo activities including time to time tracking of the articles sent. This need is fulfilled by Courier Management System software which is online software for the cargo management people that enables them to receive the goods from a source and send them to a required destination and track their status from time to time.
Water scarcity is the lack of fresh water resources to meet the standard water demand. There are two type of water scarcity. One is physical. The other is economic water scarcity.
Cosmetic shop management system project report.pdfKamal Acharya
Buying new cosmetic products is difficult. It can even be scary for those who have sensitive skin and are prone to skin trouble. The information needed to alleviate this problem is on the back of each product, but it's thought to interpret those ingredient lists unless you have a background in chemistry.
Instead of buying and hoping for the best, we can use data science to help us predict which products may be good fits for us. It includes various function programs to do the above mentioned tasks.
Data file handling has been effectively used in the program.
The automated cosmetic shop management system should deal with the automation of general workflow and administration process of the shop. The main processes of the system focus on customer's request where the system is able to search the most appropriate products and deliver it to the customers. It should help the employees to quickly identify the list of cosmetic product that have reached the minimum quantity and also keep a track of expired date for each cosmetic product. It should help the employees to find the rack number in which the product is placed.It is also Faster and more efficient way.
Saudi Arabia stands as a titan in the global energy landscape, renowned for its abundant oil and gas resources. It's the largest exporter of petroleum and holds some of the world's most significant reserves. Let's delve into the top 10 oil and gas projects shaping Saudi Arabia's energy future in 2024.
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...Dr.Costas Sachpazis
Terzaghi's soil bearing capacity theory, developed by Karl Terzaghi, is a fundamental principle in geotechnical engineering used to determine the bearing capacity of shallow foundations. This theory provides a method to calculate the ultimate bearing capacity of soil, which is the maximum load per unit area that the soil can support without undergoing shear failure. The Calculation HTML Code included.
2. ISSN: 2302-9285
Bulletin of Electr Eng and Inf, Vol. 8, No. 3, September 2019 : 863 – 874
864
proposed many routing protocols algorithms to overcome the challenges of MANETs and to solve the facing
problems such as failure due to node mobility, limited power on mobile nodes, topology changes, limited
bandwidth, link, power consumption, etc. This paper investigates the performance of Ad hoc On-Demand
Distance Vector (AODV) Routing Protocol under Video Streaming [6-8].
2. VIDEO STREAMING
Streaming is a technique for transferring data in such a way that it can be processed at a steady and
continuous stream. Video streaming over computer networks is considered to become the most interesting
application in the near future [9], [10]. There are three types of delivery methods of streaming media;
Streaming Stored Audio and Video, Streaming Live Audio and Video and Real-Time Interactive Audio and
Video. The video and audio streams compressed/stored then encapsulated during network layers and
transmitted by transport protocols via the internet to the client side. While they are handled on the other side
in an opposite way to be viewed by the user. Figure 1 shows the overall architecture for video streaming.
Figure 1. Architecture for video streaming
This kind of application needs large bandwidth, efficient routing protocols, and content delivery
methods to provide smooth video playback to the receivers. Video streaming systems are classified into two
categories including:
a. Live video Streaming
In live video streaming, synchronized streams are played back in all nodes, and all users watch the
same video frames simultaneously.
b. Video on Demand
(VoD) streaming, users watch different video frames of the same video stream at a given instant of
time. In other words, the playbacks of the same video streams on different clients are not synchronized for a
VoD streaming.Real-time multimedia data applications, such as video streaming and video telephony,
are regarded as “killer applications” in the emerging wireless networks. Video applications usually involve a
large volume of data transmitted in a time sensitive fashion [11]. However, the underlying wireless networks
only provide time-varying and limited bandwidth, high data error rate, packet delay and jitter. Extensive
research has been done on either video data coding algorithms or wireless network protocols. But the
traditional layered network model limits the video transmission over wireless networks because it tries to
separate information and functions between different layers [12]. To enable more efficient real-time data
transmission over dynamic wireless environments, the applications and underlying wireless networks should
3. Bulletin of Electr Eng and Inf ISSN: 2302-9285
Video streaming over ad hoc on-demand distance vector routing protocol (Othman O. Khalifa)
865
cooperate in order to share information and optimize the transmission process dynamically. In this parts
reviews the state-of-the-art research efforts on video coding, error control, and rate control algorithms. New
cross-layer algorithms are presented which coordinate the algorithms at different layers in order to get better
performance than using them separately. The cross-layer rate control algorithm matches the application’s
future bandwidth requirement to the available bandwidth in the network so that an optimum data
transmission rate can be selected. In the cross-layer error control algorithm, lower layers are responsible for
error detection and fast retransmission, while application layer conducts an adaptive error correction
algorithm with the help of lower layers [13].
Multimedia services and applications became the driving force in the development and widespread
deployment of wireless broadband access technologies and high speed local area networks. Mobile phone
service providers are now offering a wide range of multimedia applications over high speed wireless data
networks. People can watch live TV, stream on-demand video clips and place video telephony calls using
multimedia capable mobile devices. The variety and quality of these applications are increasing every day.
Mobile devices will soon support capturing and displaying high definition video. Similar evolution is also
occurring in the local area domain. The video receiver or storage devices were conventionally connected to
display devices using cables. By using wireless local area networking (WLAN) technologies, convenient and
cable-free connectivity can be achieved. Media over wireless home networks prevents the cable mess and
provides mobility to portable TVs [14].
However, there still exits challenges for improving the quality-of-service (QoS) of multimedia
applications. Conventional service architectures, network structures and protocols lack to provide a robust
distribution medium since most of them are not designed considering the high data rate and real-time
transmission requirements of digital video [15].
3. VIDEO TRANSMISSION TECHNIQUES OVER MANETs
Due to the demand of users, video streaming must be made possible as the satisfaction of receivers
in real-time in Mobile Ad hoc Networks. Changes in topology, Mobility of nodes, life of battery, security
threats and protocols affect the performance of MANET. To provide efficient QoS in MANET, there is a
solid need to investigate and identify the effect of number of mobile nodes, the network size and mobility
speed on QoS [9]. The Video transmission techniques over MANETs can be classified into three main
techniques; Coding techniques, Layering techniques and Routing techniques as shown in Figure 2. However,
video streaming in real time requires special techniques that can overcome the losses of packets in the
unreliable networks.
Figure 2. Video transmission techniques over MANETs
4. AD HOC ON-DEMAND DISTANCE VECTOR (AODV)
AODV is a reactive routing protocol designed for MANETs networks. It is proposed by Charles
Perkins and Elizabeth Royer in 1999 [9]. AODV is an on-demand routing protocol developed with the
Video Transmission
Techniques over MANET
Coding
Techniques
Layering
Techniques
Routing
Techniques
1-Scalable Video Coding
2-Multiple Description Coding
3-Multi-source Coding
4-Distributed Source Coding
1-Adaptive Video Streaming
2-Cross Layering Design
1-Multipath and Multi-
channel
2- Hierarchical
3-Clustering
4-Buffer Management
and Congestion Control
4. ISSN: 2302-9285
Bulletin of Electr Eng and Inf, Vol. 8, No. 3, September 2019 : 863 – 874
866
combination on the DSDV and DSR algorithm, it establishes routes between nodes only as needed by source
nodes. AODV need not a routing table, it maintains their routes as long as they are needed by the sources.
According to their structure, AODV forms trees edges which support it to connect multicast group of mobile
nodes (MN). These trees are composed of the group of (MN) and the intermediate nodes required to
connecting the (MN) as a group of members. AODV protocol has important advantages, a) uses sequence
numbers to ensure the freshness of links; b) guarantee loop-free, self-starting, and c) supported scalability to
large numbers of mobile nodes. AODV uses flooding in order to find the paths requested by a sender node,
for this purpose AODV uses route request message RREQ flooded through the entire network, where the
RREQ have the current sequence number for the sink node of which the sender node is aware and from then
any received node a RREQ should acknowledge to it using a RREP message only if it has a route to the
required sink node. In summary, AODV defines three types of control messages for route maintenance as
shown in Figure 3.
Figure 3. Possible path for route replies if node A wishes to find a route to F
5. RELATED WORKS
Many works have been done in the area of routing protocols in MANETs. Different protocols had
been evaluated using a different kind of simulators such as NS-2, OPNET, OMnet++ and other simulation
tools. The performance evaluation performed to investigate the feasibility, reliability and the quality of
service (QoS). The following paragraph showed the state of art and most important studies done recently:
Hazzaa et al.(2017) [16] evaluated the performance of AODV for multimedia traffics (FTP, Voice, Video
Conference) in terms of delay , throughput , network load , retransmission attempts as QoS parameters for
MANET network , and they used route discovery time , routing traffic received, routing traffic sent as QoS
parameters for the AODV protocol. Their simulation works implemented in the environment of OPNET
modular and show that there are significant differences between the three types of multimedia traffics .They
conclude that the impact of traffic type on MANET depend on the QoS requirements for each type of traffics.
Kushwaha et al. (2016) [17] compared between three MNETs routing protocols DSDV, DSR and AODV for
CBR traffic using OPNET simulator .They carried out from the simulation that in all three protocols, DSDV
is showing better performance than AODV and DSR, however, in exponential traffic AODV has better
performance than DSDV. In addition, after analyzing all three protocols it can be observed that there are
optimal values of packet size and offered load for which value of throughput and PDR values are optimal,
after that their values are decreased or become constant. Ramakant et al.(2015) in their research paper [18]
performed a simulation of three MANETs routing protocols AODV, DSR and DSDV on the basis of three
performance parameters packet delivery ratio (PDR),end-to-end delay and throughput via using NS-2
simulator. Their observations from the simulation works show that DSR is better for small number of nodes
but for large number of nodes, DSDV is superior. Also their study show that AODV is better throughput
compared to other protocols DSR and DSDV. The main disadvantages of their works they don’t mentioned
the simulation duration time and data rate among coverage WLAN protocol IEEE802.11. However in that
study the authors can use any hybrid routing protocol such as ZRP or DDR to comparing it with reactive and
proactive routing protocols used in that study.
Alqaysi et al. (2015) in their paper [20] analyzed and compared two MAN ETs routing protocols
AODV and OLSR with transmitting video streaming application in terms of end-to-end average delay, load,
retransmission attempts, and throughput using OPNET .They found that the proactive protocol OLSR is
5. Bulletin of Electr Eng and Inf ISSN: 2302-9285
Video streaming over ad hoc on-demand distance vector routing protocol (Othman O. Khalifa)
867
verified to be very efficient and effective routing protocol for MANETs for real-time data transmission such
as video streaming or video conferencing. The main disadvantages of their simulation work are the fixed
number of mobile nodes (60) which can’t represent the real live scenario in this case. In [21] and [22], they
analyzed the performance of multimedia traffic in MANETs with various mobile subscriber speed by using
CBR and VOIP connection using Qualnet 6.1 simulator in terms of throughput, end to end delay, and total
data received. They concluded that the overall performance of routing protocol for CBR and VOIP at 0 to 10
mbps is better than CBR and VOIP at 0 to 20 mbps. The disadvantage of their study is they don’t show at
what data rate in the PHY/IEEE 802.11/n protocol they simulate the multimedia traffics.
6. PERFORMANCE EVALUATION PARAMETERS
a. Average Packet-End-to-end delay(E2E)
End-to-end delay or sometimes called one-way delay (OWD) of a network is defined as how much
time taken by the network to sent information data with a unique ID from source to destination (successful
packet transmission). E2E delay ( E2E
D ) includes all possible delays in the network such as (route discovery
latency, queuing delay at the interface queue, retransmission delay by the MAC, processing delay,
propagation delay, MAC control overhead and intermediate nodes delay) as shown in Eq.(2). To calculate the
average E2E delay ( )
(E2E
AV ) the possible delays were added for each information data packet sent
successfully i and divided the accumulative sum by the number of received information data packets (N) as
in (3). A routing protocol with minimum delay represents the reliability of a network. In fact, E2E is
important criteria for multimedia applications;
)
S
-
(R
]
D
+
D
+
D
+
D
+
D
+
[D
=
D i
i
trans
prop
proc
RTD
queue
RDD
E2E i
i
i
i
i
i
i
(1)
)
S
-
(R
N
1
=
AV
n
1
=
i
i
i
)
(E2E (2)
where : =Route Discovery Delay
=Queuing delay
=Retransmission delays at the MAC layer
=Processing delay
=Propagation delay
=Transmission delay
N=The number of d=succrssfully received packets
=Is time at which a packet with unique id I is received
=Is time at which a packet with unique id is sent
b. Packets Delay Variation (jitter (sec))
Jitter is the variation in time between arrivals of packets. The difference in end-to-end one-way
delay between selected packets in a flow with any lost packets being ignored. However, low jitter is
especially important metric for real-time
c. Packet Delivery Ratio (PDR)
It is an important metric in networks, it is defined as the ratio between all the received information
packets at the sink node and the number of data information packets sent by all the sources nodes. For
multimedia application is desired high.
100
*
node)
source
by
sent
Packets
n
Informatio
Data
(
)
node
sink
at
Received
Packets
n
informatio
Data
(
=
PDR
d. WLAN-E2E-Delay (E2ED)
It is determined the average time that packets require from the source to the application layer at the
destination node. It is expressed in seconds.
e. Throughput (bits/sec)
In MANETs throughput is considered as an important parameter to measure the robustness
of the network.
6. ISSN: 2302-9285
Bulletin of Electr Eng and Inf, Vol. 8, No. 3, September 2019 : 863 – 874
868
kbps
)
1000
*
Time
n
(Simulatio
8)
*
Received
Bytes
of
(No
=
Throughput
f. WLAN Load
It is the total load (in bits/sec) send through wireless LAN layers by all higher layers in all WLAN
nodes of the network.
g. Total packets dropped
This metric is important for video streaming applications because they are sensitive for packets
dropped or loss which can affect quality of video.
7. SIMULATION SETUP
OPNET 17.5 modular is used for to analysis and test the performance of comparative routing
protocol AODV. The parameters considered in this scenario are shown in Table 1.
Table 1. Simulations Parameters
Parameter Value
WLAN Network simulation Parameters
Network Area(Size) (m2
) SZ 500x500
MZ 1000x1000
LZ 1500x1500
Wireless Nodes LD (5 ,10,15,20 ,25,30,35) MD (40,50,60,70)
HD ( 80,90,100)
Node Speed (m/s) [0 , 10] and [10,25]
MAC Layer Protocol PHY IEEE 802.11g
Data Rate ( Mbps) 54
Channel Settings Auto Assigned
Buffer Size (bits) 256000=32 KB
Transmit Power (Watt) 0.005
Packet Reception
Power Threshold(dBm)
-95
Link Delay Threshold (sec) 0.1
MANETs routing Protocols AODV
Simulation Time(sec) 800
Addressing Mode IPv4
Simulator OPNET 14.5
To evaluate the Adhoc networks, mobility and traffic generation are two significant factors affecting
protocol performance. The Mobility Model Parameters is shown in Table 2 where the uniformly and
randomly chosen destinations (random waypoint model) is used. Here, a node chooses a random destination
anywhere in the network field. The node moves towards that destination with a velocity chosen randomly
from [0, Vmax]. After reaching the destination, the node stops for a duration defined by the “pause time”
parameter. This procedure is repeated until the simulation ends. Table 3 shows the MANETs Traffic
Generation Parameters. While Table 4 shows Video Traffic Parameters.
Table 2. Mobility model parameters
Parameter Value
Mobility Model (Random Waypoint Parameters)
x_max (meters) 500
y_max (meters) 500
Speed (meters/seconds) uniform_int (0, 10) for low mobility and, uniform(10,25) for high mobility
Pause Time (seconds) constant (100) for low mobility and constant(0) for high mobility
Start Time (seconds) constant (100)
Stop Time(seconds) End of Simulation
7. Bulletin of Electr Eng and Inf ISSN: 2302-9285
Video streaming over ad hoc on-demand distance vector routing protocol (Othman O. Khalifa)
869
Table 3. MANETs traffic generation parameters
Parameter Value
MANET Traffic Generation Parameters
Time in seconds 100
Inter-arrival Time Packet (sec) Exponential -01
Packet Size in bits Exponential -1024
Destination IP Address Random
Stop Time in seconds End of Simulation
Table 4. Video traffic parameters
Parameter Value
Application Parameters
Application Video conferencing
Frame Size Information (bytes) 128X240 pixels
Type of Service Best effort(0)
Application Segment Size 64.000 or 32.000
Frame Size 256
Maximum available bandwidth (MHz) 10
In this work, Ad hoc On-demand Distance Vector (AODV) routing protocol is considered. Table 5
shows AODV Protocol Parameters. AODV routing reactive an on demand routing protocols in the network.
The AODV protocol wants to determine an only path foundation node to end nodes regarding packet
massages data transfer in the network.
Table 5. AODV protocol parameter
Parameter Value
Active Route Timeout (sec) 3
Hello Interval(sec) uniform (1, 1.1)
Allowed Hello Loss(sec) 2
Net Diameter 35
Node Traversal Time(sec) 0.04
Route Request Retries 5
Route Request Rate Limit (pkts/sec) 10
Route Error Rate Limit (pkts/sec) 10
Timeout Buffer(sec) 2
8. RESULTS AND DISCUSSION
The performance of the routing protocol AODV was evaluated using Video Conferencing with low
mobility and small scale. In this scenario, the routing protocol under IEEE 802.11g for video streaming
traffic using node density 5, 10, 15, 20, 25, 30, 35 with mobility speed in the interval [0,10] m/s and network
size 100x100 m2 with the addition of other parameters described in the previous tables. We evaluated the
performance in terms of the E2E delay in seconds, throughput (bits/sec), Packet Delivery Ratio, Routing
Overhead. Figure 4 shows the calculated average E2E delay of each transmitted data packets during the
simulation time as a function of node density. E2E delay includes all possible delays as we mentioned before
in (1) and (2).
From Figures 4 till 8, observed that, there are sharp variations (increases or decreases) in some
nodes with respect to packet metrics (delay, jitter, delivery ratio) or in node density or throughput or routing
overhead. All these variations according to video content in terms of weight or lightness. The performance
results are tabulated in Table 6. Where AODV protocol very good in Throughput and Acceptable in Packet
E2E, C Packet Delay Variation (Jitter), WLAN-End-to-End Delay, Retransmission Attempts(packets,
Network Load and Network Load. However, AODV protocol not good in Packet Delivery Ratio and Total
Packets Dropped.
8. ISSN: 2302-9285
Bulletin of Electr Eng and Inf, Vol. 8, No. 3, September 2019 : 863 – 874
870
Figure 4. Packets E2E delay (sec) vs node density
Figure 5. Packets delay variation (jitter)
Figure 6. Packet delivery ratio %
0
0,5
1
1,5
2
5 10 15 20 25 30 35
Packets
E2E
delay(sec)
Number of Nodes (Node Density
Video Conferencing -Packets E2E delay(sec) vs Node Density
0
0,05
0,1
0,15
0,2
0,25
5 10 15 20 25 30 35
PDV
(sec)
Number of Nodes (Node Density)
Video Conferencing - Packets Delay Variation(jitter)
0
20
40
60
80
100
5 10 15 20 25 30 35
PDR
%
Node Density
Video Conference - Packet Delivery Ratio %
9. Bulletin of Electr Eng and Inf ISSN: 2302-9285
Video streaming over ad hoc on-demand distance vector routing protocol (Othman O. Khalifa)
871
Figure 7. Throughput (bits/se) vs number of nodes
Figure 8. Routing overhead (bits/sec)
Table 6. A summary of AODV performance
Protocol
Metric
AODV
1-V.C. Packet E2E delay (msec) Low
2-V.C Packet Delay Variation
(Jitter)
Low
3-Packet Delivery Ratio (PDR %) V. Low
4- WLAN-End-to-End Delay (sec) Low
5- Throughput (bits/sec) V. High
6-Retransmission Attempts(packets) Less
7-Network Load (bits/sec) Low
8-Total Packets Dropped (packets) High
9- Network Load (packets/sec) Low
Comparing AODV with GRP and GRP during transmitting real-time video conferencing.
Simulation shows that if the number of nodes starts to increase, jitter in AODV increases (97.42 sec with 60
mobile nodes), which is not acceptable compared with the desired value according to criteria parameters as
shown in Figure 9. Therefore AODV is very poor and worst in terms of jitter because AODV is generally a
demand-based routing protocol. Geographical protocols take advantage of nodes location information to
compute routes and this will improve scalability and reduce the network traffic.GRP outperform AODV and
0,00
2.000.000,00
4.000.000,00
6.000.000,00
8.000.000,00
10.000.000,00
12.000.000,00
14.000.000,00
16.000.000,00
18.000.000,00
5 10 15 20 25 30 35
Throughput
(bits/sec)
Number of Nodes (Node Density)
Throughput (bits/se) vs Number of Nodes
0,00
10.000,00
20.000,00
30.000,00
40.000,00
50.000,00
60.000,00
5 10 15 20 25 30 35
Routing
overhead
(bits/sec)
Number of Nodes (Node Density)
Routing overhead (bits/sec)
10. ISSN: 2302-9285
Bulletin of Electr Eng and Inf, Vol. 8, No. 3, September 2019 : 863 – 874
872
OLSR in terms of jitter due to its accuracy of determining the position and compute the path between the
source and destination and at the same time maintain the link breakage efficiently. The jitter value in case of
GRP is out of range [169 ms at 50nodes~2sec at 80 nodes], but if we reconfigure it with suitable parameters
we will enhance their performance in terms of jitter. AODV is not suitable for dense and highly dynamic
networks.
Figure 9. Jitter (sec) vs node density
In large network sizes, nodes frequently experience route breaking and elapse more time to find an
efficient route. So packet loss and E2ED are increased. Figure 10 shows the data dropped (bits/sec), OLSR is
the lowest data dropped compared with AODV and GRP. AODV is similar to OLER data dropped in the
range [70 to 80] mobile nodes, but if the number of mobile nodes exceeds 80 nodes data dropped start to
increases. GRP is the worst case in terms of data dropped.
Figure 10. Data dropped (bits/sec) vs node density
12. ISSN: 2302-9285
Bulletin of Electr Eng and Inf, Vol. 8, No. 3, September 2019 : 863 – 874
874
BIOGRAPHIES OF AUTHORS
Othman Omran Khalifa received his Bachelor’s degree in Electrical Engineering from the
Garyounis University, Libya in 1986. Prof. Khalifa obtained his MSc and PhD in 1996, 2000
respectively from Newcastle University, UK. He joined International Islamic University
Malaysia in August 2002. Prof. Khalifa served as a head of department of Electrical and
computer Engineering, IIUM from July 2005 until December 2014. Prof. Khalifa is Charter
Engineer and a senior member of IEEE, USA and a member IET, UK, a member of the
International Association of Engineers (IAENG). Prof. khalifa was the chairman of the
International Conference on Computer and Communication Engineering (ICCCE), 2006, 2010,
2012, 2014. Prof. Khalifa has extensively contributed through his writings in international
journals, conferences and books. He published more than 410 publications including 10 books.
He is a member of many international advisory boards for many international conferences.
Diaa Eldein Mustafa Ahmed received his in Engineering and Architecture from Khartoum
university in 1995, he obtained his MSc(s) degree in 1996 in Mathematical Science from AL-
Neailain University, Sudan and another MSc degre in 2002 in Computer Science and
Information from Al-Gazira university, Sudan. He is a head Department of Information
Technology –University of Science and Technology –Sudan –Omdurman. Currently, he is a
Ph.D researcher in wireless networks at Faculty of Computer Science and Information
Technology, University of Science and Technology, Sudan.
Aisha Hassan Abdalla Hashim received her PhD in Computer Engineering (2007), M.Sc. in
Computer Science (1996), and B.Sc. in Electronics Engineering (1990). She joined IIUM in
1997 and currently working as a Professor at the Department of Electrical and Computer
Engineering. Professor Aisha is actively participating in curriculum development and program
accreditation. She has been appointed as external examiner/visiting professor/adjunct professor
at different universities. Professor Aisha is actively involved in research and postgraduate
programs. She has published more than 250 journal/conference papers. She has supervised/co-
supervised more than 60 PhD/Master students. She has acquired several research grants from
IIUM, Ministry of Higher Education (MOHE) and Ministry of Science, Technology and
Innovation (MOSTI). She has actively contributed as a reviewer /technical committee member of
many journals/conferences. She is senior member of IEEE and a member of IEE professional
bodies.
Mudathir Fadoul received his BSc degree from the Omdurman Islamic University Faculty of
Science and Technology in 2002. He finished the M.SC Degree (with Excellent) in Computer
Science in 2010. Currently, he is a Ph.D researcher in wireless networks include Wireless Sensor
Networks, Mobile Ad hoc Networks, Routing Protocols, Internet and Web of Things at Faculty
of Computer Science and Information Technology, University of Science and Technology,
Sudan. Mr Fadoul is a member of IEEE.