Click the Desired Domain to Read the Research Articles      

Internet of Things     UAV/USV/Vehicular Ad Hoc Network      Mobile Ad Hoc Network     Underwater/Wireless Sensor Network

     Cloud Computing     Machine Learning     Web/Social Network      Wireless Communication     Cryptography/Network Security     

Intrusion Detection System      Big Data     Image Processing     Data Mining      Malware/Applications

Wireless Communication      

Optimization of Smart Mobile Device Work Time Using an Optimal Decision Tree Classifier and Data Caching Technique in on Premise Network
Sridhar S K, J. Amutharaj

Abstract - Today, Most smart mobile devices are facilitated with advanced processing hardware and short-range data communication systems by which they are practically capable to provide effective execution services to the neighbor mobile device client request and/or receive services on a need basis within the local area network. Therefore, to relish the powerful capability of these smart mobile devices in the private campus network, we propose an intelligent composite offload decision algorithm (ICODA) framework that attempts to connect several smart mobile devices in wireless local area network and make them apply intelligence before servicing each other request preferably without the internet. The significance of the proposed framework is that it has a mechanism to make a data offloading decision using an optimal decision tree classifier model and also a mechanism to avoid data offloading operation using the data cache neural networks model. The experimental results obtained are obvious to show the minimal client system battery utilization and hence an optimized work time for a smart mobile client device that participates in the ICODA framework.

Published: 2021Read / Download
Wormhole Detection Using Encrypted Node IDs and Hop Counts in the Event Report of Statistical En-Route Filtering
Ga-Hyeon An, Tae-Ho Cho

Abstract - Wireless Sensor Network (WSN), there are low capacity, low cost, tiny sensor nodes, and sinks. Sensor nodes detect an event occurring in its surroundings and send data about the event to the sink. Sensor nodes have a limited transmission range and computational power. Since the wireless sensor network operates with limited resources than the ad hoc network, it is difficult to apply the defense method as it is, so research on a new defense method is needed. In a WSN, sensor nodes manage, monitor, and collect data for a specific environmental and physical application, and the collected data is transmitted to and used by a base station. Base stations are connected via the Internet and share data with users. Since the sensor node is composed of low power and low capacity, it is mainly used in an unattended environment, so it is easily exposed to various attacks and can be damaged. This type of network makes it difficult to detect wormhole attacks when they occur along with other attacks like false report injection attacks and Sybil attacks. Therefore, to prevent this, in this study, the hop count and the encrypted node ID are added in the report generation process of the statistical en-route filtering technique to detect wormhole attacks even when a wormhole attack occurs along with a false report injection attack to improve security.

Published: 2021Read / Download
Throughput Optimization - Based Gateways Placement Methods in Wireless Networks
Suvarna Patil, Prasad Gokhale

Abstract - The Internet of Things (IoT) allows interconnected devices for sharing and controlling data among each other as things are connected through the Internet. Communication among these devices that are part of Wireless Sensor Networks (WSNs) and the Internet is eased with the help of Internet Gateway, which is termed IoT gateway. The performance of IoT networks is affected by various network parameters such as the position in the network gateways, heterogenous coordinating devices, link selection and link assignment, link scheduling, and transmission scheduling. To increase the performance of the network, the placement of the gateways should be optimal, which reduces the deployment cost and increases throughput. Furthermore, more than one gateway is placed to reduce congestion within the IoT network, resulting in noise and increasing the cost. Most researchers focused on the placement of internet gateway or mesh routers in the Wireless Mesh Network (WMN). The gateway placement problem needs to focus on IoT networks where heterogeneous wireless technologies are involved for machine-to-machine communication (M2M). It is challenging to deal with different wireless technologies along with gateway placement for the network throughput maximization. In this article, we propose the "Novel Gateway Select Algorithm," which selects the best candidate gateways to achieve throughput maximization during heavy traffic load on coordinating devices or intermediate gateways. The evaluation of the performance of the Novel Gateway Select algorithm is demonstrated by using simulation. The result proved that the proposed system selects the appropriate candidate gateway with high throughput and minimum average load considering the dynamic variance of heavy traffic at each coordinating device or intermediate gateway in the IoT network.

Published: 2021Read / Download
A Hybrid Distance Vector Link State Algorithm: Distributed Sequence Number
Hussein Khayou, Margarita A. Orlova, Leonid I. Abrosimov

Abstract - Requirements in data centers to meet the increasing demands on traffic have evolved. There is a need for a simple, scalable routing protocol, which has the flexibility and ease of management to support large networks. Distance vector routing protocols are very simple and easy to implement but they suffer from routing loops. Link state protocols, on the other hand, have the advantages of fast convergence, area division of the routing domain, at the expense of the added complexity of implementation, configuration, and troubleshooting. A new loop free protocol is proposed in this paper that combines the simplicity of the distance vector protocols, loop freedom, and the ability to be used in large scale mesh networks as in link state protocols. The protocol uses a hybrid distance vector link state algorithm. It employs techniques from Enhanced Interior Gateway Routing Protocol (EIGRP), Babel, and Open Shortest Path First Protocol (OSPF). Simplicity, ease of implementation, and scalability make the proposed solution appropriate for large scale networks. Additionally, it can be used to perform the underlay routing in SDN (Software Defined Networks) overlay networks in place of IS-IS (Intermediate-System to Intermediate-System) protocol, which is usually used in these solutions. The combination of distance vector and link state helps to reduce the size of information in the database that is needed to be maintained by each node. It also helps to reduce the overhead and computing load after topology changes.

Published: 2021Read / Download
Protected Light-Tree Reconfiguration without Flow Interruption in Elastic Optical Networks
N'takpe N'guessan Christian, Adepo Joel Christian, Babri Michel

Abstract - Reconfiguration is one of the most important capabilities of optical networks. This task is performed by operators to re-optimize network resource utilization. Multicast applications such as videoconference online learning, etc., emerge rapidly and cause an increase in bandwidth demand. A multicast connection in an optical network is provided by a light-tree. Due to physical link failures, light-trees are protected by backup paths. Thus, our study focuses on the reconfiguration of a protected light-tree. The reconfiguration problem studied here is to migrate rapidly an optical flow from an old light-tree to a new light-tree without service disruption. To solve this problem, we propose a mechanism based on dependencies graphs. This method establishes simultaneously groups of the final light-tree branches by using shared backup paths spectrum resources. The numerical results show that our approach avoids flow interruptions and reduce significantly the number of steps required to achieve the reconfiguration process more than existing methods.

Published: 2021Read / Download
A Novel Fragmentation Scheme for Textual Data Using Similarity-Based Threshold Segmentation Method in Distributed Network Environment
Sashi Tarun, Ranbir Singh Batth, Sukhpreet Kaur

Abstract - Data distribution is one of the most essential architectures of any serving network. Data storage and its retrieval depend a lot on how the data is organized in the distributed environment. With the fast development of technology, the requirements of users have also changed. A user who was stationary earlier has become mobile now and requires access to the data from anywhere in the world. An unorganized data structure will result in output delay in the network and may further result in user migration from one service provider to another service provider. Data fragmentation is one of the most essential parts when it comes to data storage. Organized data always gives convenience to others to use it conveniently. Due to the vast collection of data extraction of information in a fast manner is very complicated.........................

Published: 2020Read / Download
Improved Wolf Prey Inspired Protocol for Routing in Cognitive Radio Ad Hoc Networks
J. Ramkumar, R.Vadivel

Abstract - Fifth Generation (5G) technology has started providing the brand new facilities to the mobile communication world. With its enhanced performance and scalability, it has attracted many domains. Routing overhead in 5G networks is increased rapidly because of the complexity present in the route discovery process, where optimization in routing. Poor routing becomes a sophisticated and dynamic challenge in the 5G network. Hence, there exists a need for finding the best route in an optimized manner. This paper proposes an Improved Wolf Prey Inspired Protocol (IWPIP) for finding the ideal route in the dynamic environment like 5G based cognitive radio ad-hoc network. IWPIP focuses on finding the ideal route based on the reliability of route, shorter distance, and shorter hops that minimize the consumption of energy to increase the network lifetime........................

Published: 2020Read / Download
Performance Analysis of Various Mobility Management Protocols for IPv6 based Networks
Kushal Pokhrel, Nitul Dutta, Mrinal K. Ghose, Hiren Kumar Deva Sarma

Abstract - Amount of Internet traffic has increased significantly in recent times. Penetration of mobile and handheld devices in the society is also remarkable. In order to address the user demands and seamless mobility in IP networks like the Internet, there is a need to have efficient mobility management protocols and architectures. This is required to address various issues that arise due to users' mobility. Such protocols and architectures should intend to provide better service quality to the end users. Protocols like Mobile IPv6 (MIPv6), Hierarchical MIPv6 (HMIPv6) and Proxy Mobile IPv6 (PMIPv6) have been established as widely accepted mobility solutions for IP based wireless networks which has also been standardized by the Internet Engineering Task Force (IETF). Three Layer MIPv6 (TLMIPv6) strives to provide......................

Published: 2020Read / Download
ZBLE: Zone Based Leader Election Energy Constrained AOMDV Routing Protocol
Rani Sahu, Sanjay Sharma, M.A. Rizvi

Abstract - In today's life, wireless networks (WNs) are being used very fast in every area. They have been used in various applications, but finding some of the weaknesses, such as mobility, diversity, lack of resources and so on, finding an optimum route is very complex and problematic. By reducing the energy consumption on each node, the quality of the network can be ensured. Need to increase the battery life of the node to increase the network lifecycle. Therefore, reducing energy consumption can extend the battery life of the node. There is a fundamental research issue for finding and maintaining routes between multi-path routing nodes. This paper discusses routing protocols based on Zone Technology, which uses the energy, distance, and power of the node to maintain high circulation and accelerate the path search process and maintain high search. Zone-based Leader Election Routing Protocol (ZBLE).............................

Published: 2019Read / Download
Centroid Based Localization Utilizing Artificial Bee Colony Algorithm
Vikas Gupta, Brahmjit Singh

Abstract - Estimation of position of unknown nodes is of immense importance for proper deployment and tracking of sensors. The centroid based localization algorithm (CLA) is widely used for the localization of the sensors but its original and modified versions suffer from large positioning error. Here the localization algorithm is evaluated in terms of localization error utilizing artificial bee colony based (ABC) algorithm. Comparison of outcome is presented through other widely used techniques including swarm based particle swarm optimization (PSO) and evolutionary algorithms based differential evolution (DE) on basic centroid localization algorithm. The results obtained through simulation demonstrate that localization error is minimal in ABC and DE based CLA as compared to basic and PSO based schemes but the computation time is the largest in DE based localization algorithm...............................

Published: 2019Read / Download
QoS and Fuzzy Logic Based Routing Protocol for CRN
Gagan Deep Dhand, Rohit Kumar, Rishabh, Devashish Ghildiyal, Rachna Jain

Abstract - The tremendous development in wireless technologies and multimedia applications persuaded upsurge in spectrum utilization in the past. One of the adequate clarifications to overwhelm this limitation is by using Cognitive Radios (CR). These networks are likely to boost spectrum consumption professionally by permitting Secondary Users (SUs) to take advantage of the use of the approved spectrum of primary users (PUs). CR is a kind of a sensible radio that can sense the extraneous surroundings, analyze the past and build perspicacious conclusions to switch its transmission factors in step with the current state of the atmosphere. An Ad-hoc Network engaging Cognitive Radios (CR) can often be termed as Cognitive Radio Adhoc Network (CRAHN). Routing in CRAHN is not an easy mission due to spectrum availability, power, link stability, etc. Among all the parameters, the one among the best parameter for route selection is throughput..............................

Published: 2019Read / Download
Adaptive Power Transmission and Efficient Energy Scheme of DSR Protocol (APEE-DSR)
Kadry Sayed Mohamed, Sayed Abd El Hady Nouh, Abdelhady M. Naguib

Abstract - Mobile ad hoc networks (MANETs) consist of a group of two or more nodes, which are connected in dispersed manner for enabling wireless communications. All nodes being moveable and are dynamically connected in a random way. MANETs can be used in many applications such as: military battles, WSN, in areas where it is difficult to build wired network. Due to dynamic topology of MANET, restricted battery power, and limited capacity of wireless channels, it becomes design of routing mechanism is one of the main challenges in MANET. In general, MANETs' routing protocols can be classified into two classes: proactive routing (e.g. DSDV) and reactive routing (e.g. AODV and DSR). Many studies showed that reactive routing protocols are outperform proactive protocols. Therefore, the presented article concerned with performance enhancement of DSR ................................

Published: 2019Read / Download
Rethinking Audience Clustering in Sports Market using Gossip Protocol
Asif Ali Banka, Roohie Naaz

Abstract - Analytics and inferences have found their place in all the business domains varying from large-scale businesses with criticality to small scale business with less criticality. Sports are considered to be big business in its aspects like amount of money spent on it but in its other version like number of people associated with it, it is comparatively a small industry. Sports analytics have changed their dimension both in the manner they are thought about and number of participation from scientific society that grew over the years. Contribution from analytics is being looked from by sports management to enhance various industries associated to it. The authors realize that sports industry is a close, strongly connected group that is very similar in its behavior to a social network. The authors propose a graph theoretic model in context of sports analytics that presents preliminary study of using gossip protocol for sharing information among members of sports oriented social network.

Published: 2018Read / Download
EDA-AODV: Energy and Distance Aware "AODV" Routing Protocol
Mohamed A. Ryan, Sayed Nouh, Tarek M. Salem, Abdelhady M. Naguib

Abstract - "Mobile Ad Hoc Network" (MANET) is composed of a set of wireless mobile nodes, it is a self-organized environment which does not need any infrastructure. The topology of this type of network is formed dynamically and the mobility feature of the nodes causes rapid, unpredictable and frequent network topology changes. All nodes in this network are mobile in nature and driven by batteries, that could cause link breakage if a battery of a node goes empty. Rapid topology change and the limited resources in these networks made designing an efficient routing protocol a challenging problem. In this paper, we propose a new route discovery scheme of AODV that reduces routing overhead, prolong route life time, and relatively minimum hop counts. The suggested scheme is called EDA- AODV, where the route is selected using two main metrics: node energy factor.................................

Published: 2018Read / Download
Secure and Fast Handovers Authentication Methods for Wi-Fi Based Networks: A Review perspective
Mir Shahnawaz Ahmad, Syed Rameem Zahra

Abstract - Regarding this study, an extensive review of secure and fast handovers schemes were studied with the aim of solving security problems and authentication server computational overhead experienced in the existing schemes in wireless fidelity based networks. The complete verification scheme outlined in IEEE 802.11i network is unsuitable to be deployed so as to support the user's seamless mobility. The contribution of this paper suggested a robust delivery of handoff keys for internetworking and intranetworking schemes with a dedicated trust relationship model existing in diverse domains. Inter-access point protocol was used to transfer handover credentials in an intra-domain network. Likewise, an inter-access control-tunnelling protocol with opportunity key caching and pairwise master key caching are suggested for inter-domain security context-transfers. Man-in-the-middle attacks are.................................

Published: 2018Read / Download
Design and Security Simulation of Wi-Fi Networks
Shaldon Leparan Suntu, Obadia Kyetuza Bishoge

Abstract - Wireless networks milieu is sprouting into the market, and it is the principal way of accessing the internet. Design and security of these networks for an organization need to be considered to ensure mobility is accomplished. In this study simulation results of 802.1X with flexible authentication via secure tunnelling was performed. Opportunistic key caching which is preferred by many vendors was used transit the session information from the posterior access point to the prior access point to minimize the hand-off latency to allow continuous connectivity to avoid poor network performance. The simulation process was applied throughout the write up of this article without setting up the pricy real lab-test. After the successful modelling of the network, the outcome will be transferred to the real-life environment. The network simulator software was used to illustrate roaming while Cisco Packet Tracer was engaged in the layout design of the wireless nodes. This research applies to network administrators and engineers worldwide to save time and the cost of the network appliances

Published: 2017.Read / Download
Performance Comparison between LTE and WiMAX Based on Link Level Simulation
Maha Hamdy Noshy , Sayed A. Nouh, Adel Zaghloul Mahmoud

Abstract - This article presents a framework for performance comparison between Long Term Evolution (LTE) and WiMAX technologies, depended on link level simulation, under different conditions (e.g. a mixture of channel models and modulation coding schemes (MCS)). Two performance metrics have been used: throughput against SNR for both downlink (DL) and uplink (UL) and block error rate (BLER) against SNR for both DL and UL. Simulation results, conducted in network simulator OPNET Modeler ver. 17.1, show that the throughput and the BLER increases as the MCS increase (i.e. MCS=5, 15, 24).

Published: 2017Read / Download
Evaluation of TCP Congestion Control Modus Operandi in Mesh Networks
Vincent O. Nyangaresi, Solomon. O. Ogara, Silvance O. Abeka

Abstract - In mesh networks, the sender machine is connected to the receiver machine via multiple paths. Efficient transmissions along these paths require proper link choice so as to quickly deliver the packets the destination. Poor link selection can lead to overutilization of some links while the other redundant links remain underutilized. Over-utilized links experience heavy congestions under peak hours. The transmission control protocol (TCP) employs congestion control algorithms to prevent transmitters from overloading the network with data. These algorithms include slow start, congestion avoidance, fast retransmit and fast recovery. The slow start algorithm is utilized during the initial communication phase while congestion avoidance, fast retransmit and fast recovery are reactionary algorithms one packet loss is detected. This paper aimed to analyze the behavior of TCP under these congestion control algorithms in wired mesh networks..............................

Published: 2017.Read / Download
Clone Attack Detection Using Pair Access Witness Selection Technique
J. Sybi Cynthia, D. Shalini Punithavathani

Abstract - Sensor nodes set out in malicious surroundings and are susceptible to pickup and pact. An intruder may reach confidential hidden particulars from these sensors, clone and cleverly spread out them in the network to put up a variety of insider attacks. This attack mode is mostly defined as a clone attack. We propose a new layout for clone attack detection that comes up with successful and well-organized technique called PAWS (Pair Access Witness Selection) technique to detect such clone attacks. Selecting common nodes in between the pairmate as a witness node is the key idea of PAWS to detect clones in the network. The witness selection plays a vital role to overcome the redundancy and reachability problem. The proposed framework results in detecting clones and detection performance depends on the proper selection of witness nodes. Performance analysis and simulations also reveal that our new scheme is more proficient than extant schemes from communication cost and energy consumption.

Published: 2016Read / Download
Interference Aware Cooperative Routing Algorithm for Wireless Ad Hoc Networks over Nakagami Fading and Lognormal Shadowing
Abdullah Waqas

Abstract - The quick deployment and flexible characteristics of wireless ad hoc networks make them suitable for many commercial and daily life applications. A most challenging task in these distributed networks is ensuring quality of service to end-to-end user in presence of wireless channel, random network topology, unpredictable traffic patterns, and shared resources. The performance of network is limit by the amount of interference in the network in case of simultaneous transmission over same frequency band. In this paper, we address interference issue in presence of nakagami fading and lognormal shadowing channel conditions and proposed an Interference Aware Cooperative Routing (IACR) approach to manage routing operations between nodes. The presented model reflects realistic scenarios for urban areas where fading and shadowing occurs due to tall buildings in the neighborhood of transmitters. The proposed solution establishes routes..................................

Published: 2016Read / Download
Performance Evaluation of IPv4 and IPv6 Routing Protocols on Wired, Wireless and Hybrid Networks
Sonal Telang Chandel, Sanjay Sharma

Abstract - A routing protocol is used to determine the optimal path to forward the packets from source to destination. A separate set of protocols is designed for IPv4 & IPv6 network such as RIP, OSPF-v2, RIPng, OSPF-v3, and AODV. IPv4 is replaced by IPv6 (next generation internet protocol), but both the protocols are not suitable for each other, due to this they need to coexist for a long time. In this paper, the performance is evaluated for different routing protocols for IPv4 and IPv6 over wired, wireless and the hybrid network. Simulations are carried out on EXata/Cyber 2.1 Simulator/Emulator. The performance of routing protocols is measured on the basis of throughput, jitter, end-to-end delay and packet delivery ratio (PDR). By the simulation, on the basis of throughput and PDR performance of AODV (IPv4) is very good as compared with other routing protocols. It has been observed that due to the size of the IPv6 header, which is larger than IPv4 header the performance of routing protocols downgrades.

Published: 2016Read / Download
IP Address Lookup in an IP Router Based On a Reorganized Binary Prefixes Value Tree (RBPVT)
Haouassi Hichem, Maarouk Toufik Mesaaoud, Mahdaoui Rafik

Abstract - IP address lookup to route data packets is an important function in a router and improving this function improves the overall performance of the router. From the data structures used for the prefixes representation, there are the trees that represent prefixes with their binary values. However, this data structure requires an improvement because of the longest prefix function search complexity. Our approach is used to improve the routing information search time in the prefixes values binary tree by periodically reorganizing the tree according to the use of prefixes; the most recently used prefixes are stored in the higher levels of the reorganized binary prefixes value tree (RBPVT) which improves the data packets routing time. The tests and evaluation of the access memory number of the longest prefix match search algorithm shows that the IP address lookup algorithm based on our RBPVT tree improves the performance of the IP routers in terms of average memory access number.

Published: 2016Read / Download
A Delay and Spectrum Aware Fuzzy Logic Based Routing Protocol for CRN
Poonam, Chander Kumar Nagpal, Shailender Gupta

Abstract - Cognitive Radio (CR) is an intelligent technology used to sense the spectrum in order to make efficient use of limited spectrum available. The use of such radios in ad hoc network not only increases the probability of reach ability but also provides a reliable path between a pair of nodes. Networks that employ CR technology are termed as Cognitive Radio Ad Hoc Networks (CRAHN). Quality of route depends upon several parameters but it is highly influenced by end to end delay encountered by a packet to reach from source to destination. More is the end to end delay; lesser will be the efficiency of the network. End to end delay is directly concerned with the reliability of data transfer. Therefore this paper proposes a routing scheme that obtains a most reliable route with minimum end to end delay using fuzzy logic theory. The proposed strategy is implemented in MATLAB-7.0 and the simulation results show that our proposed routing scheme outperforms the traditional Shortest Spectrum Aware routing scheme available in literature.

Published: 2016Read / Download
Design and Implementation of a Smart Home for the Elderly and Disabled
Resul Das , Gurkan Tuna, Ayse Tuna

Abstract - Different from the past, in recent years, an increasing number of technology solutions have been started to be designed for the elderly and disabled due to the aging population and increasing awareness about common problems of the disabled. In smart homes, a group of smart, networked devices and sensors can help make the elderly and disabled more independent by letting family members, relatives and doctors keep tabs from afar. Because there is significant interest from care providers who prefer to keep the elderly and disabled in their houses rather than caring them in assisted-living centers. Accordingly, in this study, a sample application of smart home technology is presented. In the presented application, a group of sensors are used to build an autonomous smart home. Although the presented application is just a simple example of how smart homes can be used, it has the potential of affecting all areas improving day to day life of the elderly and disabled.

Published: 2015Read / Download
Comparative Study of Adaptive Filter Algorithm of a QO-STBC Encoded MIMO CDMA System
Shohidul Islam, Husnul Ajra

Abstract - This paper represents a comparative Study of filter algorithms Least Mean Square (LMS), Normalized Least Mean Square (NLMS) and Recursive Least Square (RLS) by considering a Quasi Orthogonal Space Time Block Code (QO-STBC) encoded Multiple Input Multiple output (MIMO) Code Division Multiple Access (CDMA) system. MIMO-CDMA system has been currently acknowledged as one of the most competitive technology. Here, the adaptive behaviors of the algorithm are studied. Implementation aspects of these algorithms are their computational complexity and Signal to Noise ratio which are also examined. Recently adaptive filtering algorithms have a nice tradeoff between the complexity and the convergence rate. In this system, by comparative study of three adaptive filter algorithms, the RLS algorithm has faster convergence rate than LMS and NLMS algorithms with better robustness to unpredictable situation and better tracking capability.

Published: 2015Read / Download
Design and Implementation for SIP-based Push-to-Talk Services over 802.11 Networks
Wen-Shiung Chen, Lili Hsieh, Ying-Neng Hsieh

Abstract - Push-to-Talk (PTT) is a service that allows users using mobile phones in a way like walkie-talkie. All big telecommunication vendors and operators consider PTT an emerging application. 3GPP and OMA regulate the PTT specifications on the basis of Session Initiation Protocol (SIP) to assure interoperability. However, current PTT services are dedicated to cellular phones. We would like to realize PTT services with popular 802.11 wireless networks and VoIP services. Thus, in this paper, we implement a PTT system that works in 802.11 networks. Moreover, we interconnect it with GPRS network to compare the performance in-between these two heterogeneous networks. Simulation result shows that the latency to hear the talk calling from GPRS network to 802.11g network is only about 1~2 seconds while that of from 802.11g network to GPRS network is 6 seconds.

Published: 2015Read / Download
Application of Modified ACO Meta heuristic in Spray and Wait Routing
Vinuraj.R, Sweta Jain

Abstract - Routing decision plays a vital role in delivering a message to its destination in a network, especially in an opportunistic network where connectivity between nodes is unpredictable i.e. intermittent connectivity; routing decision dominates in measuring the network performance parameters. Delay Tolerant Networking (DTN) was proposed to address the technical communication problems in heterogeneous networking ranging from extreme terrestrial environments to planned networks in space. Designing a routing policy for such a network should ideally feature proper handling of the implementation risk and must increase the delivery ratio maintaining a cost of minimum overhead. This paper elucidates a new routing policy based on Swarm intelligence specifically Ant colony optimization technique. An existing routing algorithm in DTN called Spray and Wait (SnW) Routing has been modified by changing the spray phase where the ant colony algorithm........................

Published: 2015Read / Download
Machine-to-Machine Communications for Smart Homes
Resul Das, Gurkan Tuna

Abstract - Machine to Machine (M2M) can be described as technologies which allow both wired and wireless systems to communicate with other devices of the same ability.M2M brings several benefits to industry and business, since it can be used in a wide range of applications for monitoring and control purposes. It is expected that M2M technologies when combined with smart phones will become integral elements in smart homes. Accordingly, in this study, a sample application of M2M technologies is presented. In the presented application, using temperature data provided by sensors, the smart air conditioner automatically adjusts itself. Although the presented application is just a simple example of how M2M can be used, it has the potential of affecting all areas improving our day to day life.

Published: 2015Read / Download
Dynamic Transition of Bandwidth and Power Saving Mechanism to Support Multimedia Streaming Using H.264/SVC over the Wireless Networks
G.Rohini , A.Srinivasan

Abstract - Nowadays Internet and bandwidth is an extremely valuable and scarce resource in remote networks. Consequently, efficient bandwidth management is necessary to support service stability, good Quality of service and ensure steady quality of experience for users of handheld multimedia streaming services. certainly, the support of uniform streaming rate during the entire course of a streaming videos, where the user is in mobility is one of the demanding issue and may not have high resolution or video quality due to the limited 3G/3.5G/4G bandwidth to the Internet as well as changing of bandwidth . Popular iOS and Android based handheld devices, accessing more Internet video services typically involves about 10%-80% redundant traffic and low battery life. This work proposes the Service transition protocol and Session transition protocol using H.264/SCV over the wireless network.......................

Published: 2015Read / Download
A Study on 5G Evolution and Revolution
Priya Goyal, Avtar Singh Buttar

Abstract - As the cellular technology is growing at a rapid pace, users always seek for a set of appropriate packages all together, including all the current features in use. Hence, the search for a new technology is always the main concern of the foremost cell phone companies to out innovate their competitors. The main purpose of the fifth generation wireless technology (5G) is formulated to design the ultimate wireless world that is free from limitations and impediments of the previous technologies. 5G technology will mend the way most users access their mobile networks. So, this paper presents the evolution of 1G (First Generation) to 4G yielding 5G, introduction to 5G technology- its need, advantages and architecture.

Published: 2015Read / Download
An Empirical Model of Job Shop Scheduling With Related To Tiny Chemical Assembly Instructions Inside of Living Things and Gels Techniques
Ganesh Potta, Santosh Naidu P

Abstract - Usage of (math-based/computer-based) useful things/valuable supplies is always an interesting research issue in the field of Grid figuring out/calculating. Job shop scheduling is a combinatorial optimization problem it finds possible number of solution for best solution. In this paper we are proposing a blended approach of (related to tiny chemical assembly instructions inside of living things) set of computer instructions and GELS set of computer instructions for identifying missed job or best solution from set of samples or (genetic information storage areas) which contains jobs, operation and time span.

Published: 2014Read / Download

Talk to Us

Mobile: +91 9442777224

Email Us

everscience2015@gmail.com
Write to Us

EverScience Publications
Nagercoil,
Kanyakumari District,
Tamil Nadu, India.
    EverScience Publications
    Computer Science Research Articles
    A Single Platform to Read Reserch Articles in the Field of Computer Science