Reinforcement Learning for Quality of Service in Mobile Ad Hoc Network (MANET)

Size: px
Start display at page:

Download "Reinforcement Learning for Quality of Service in Mobile Ad Hoc Network (MANET)"

Transcription

1 Renforcement Learnng for Qualty of Servce n Moble Ad Hoc Network (MANET) *T.KUMANAN AND **K.DURAISWAMY *Meenaksh College of Engneerng West K.K Nagar, Cheena-78 **Dean/academc,K.S.R College of Technology,Truchengode ABSTRACT: It s very dffcult to fnd feasble QoS (Qualty of servce) routes n the moble ad hoc networks (MANETs), because of the nature constrans of t, such as dynamc network topology, wreless communcaton lnk and lmted process capablty of nodes. In order to reduce average cost n floodng path dscovery scheme of the tradtonal MANETs routng protocols and ncrease the probablty of success n fndng QoS feasble paths and It proposed a heurstc and dstrbuted route dscovery new method supports QoS requrement for MANETs n ths study. Ths method ntegrates a dstrbuted route dscovery scheme wth a Renforcement Learnng (RL) method that only utlzes the local nformaton for the dynamc network envronment; and the route expand scheme based on Cluster based Routng Algorthms (CRA) method to fnd more new feasble paths and avod the problem of optmze tmng n prevous smart net Qualty of servce n MANET. In ths paper proposed method Compared wth tradtonal method, the experment results shoitd the network performance s mproved optmze tmng, effcent and effectve. Index Terms: Qualty of Servce, Renforcement Learnng, Genetc, Routng Algorthms and Moble Ad hoc Networks. 1. INTRODUCTION Moble Ad hoc network s a computer network n whch the communcaton lnks are wreless and the devces on t communcate drectly wth each other. Ths allows all wreless devces wthn range of each other to dscover and communcate n peer-topeer fashon wthout nvolvng central access ponts. An ad hoc network tends to feature a small group of devces all n very close proxmty to each other. Performance degrades as the number of devces grows, and a large ad hoc network quckly becomes dffcult to manage. Ad hoc network routng protocol s challengng to desgn, and t s even more dffcult for a secure one. There are many research focus on how to provde effcent [1, 2] and secure [3, 4, 8] communcaton n ad hoc networks. It has been proved that f QoS contans at least two addtve metrcs, then the QoS routng s a NP-hardness problem. So t s acceptable and necessary to develop heurstc algorthms to deal wth the problem, whch s to search optmze solutons wth accepted cost [5-6]. Currently, many studes have been done about QoS routng for MANETs by some researchers such as MANET workgroup of IETF [8]. The proposed a QoS route dscovery method n ths paper to solve same problem, whch s based on ant algorthm and smulated annealng algorthm [7]. In ths study, propose a ISSN: ISBN:

2 novel adaptve QoS route dscovery method for MANETs, based on Renforcement learnng (RL) and Clusterng based Routng Algorthm (CRA). Ths method ntegrates a dstrbuted route dscovery scheme wth a Renforcement Learnng (RL) method that only utlzes the local nformaton for the dynamc network envronment; and the route expand scheme based on Cluster based Routng Algorthms (CRA) method to fnd more new feasble paths and avod the problem of optmze tmng n prevous smart net Qualty of servce n MANET. To remedy t, It propose a CRA-based path extend algorthmc based, whch can help remedy the RL based route dscovery process and overcome the problem of local optmzaton soluton to avod stagnaton route. It s also demonstrate random networks and Route dscovery scheme on dynamc network envronment. In ths paper can mprove the effcent of data transfer n feasble path usng clusterng. 2. QoS ROUTING MODEL on SEDA FOR MANETS: Secure Effcent Ad hoc Dstance Vector (SEAD) [11] s a proactve routng protocol, based on the desgn of Destnaton Sequenced Dstance Vector routng protocol (DSDV) [9]. Nodes mantan dstances to destnaton and keep nformaton about the next hop n the optmal path to a destnaton. The routng protocols for MANETs may be broadly classfed as table drven protocols and on demand drven protocols. The protocols need to mantan the global routng nformaton about the network n every moble node for all the possble source-destnaton connecton and acqure to exchange routng nformaton perodcally [9, 10]. Ths knd of protocol has the property of loitr latency and hgher overhead. Ondemand routng protocol creates routes only when the source nodes request. When a node requres a route to a destnaton, t ntates a route dscovery process wthn the network. On-demand routng protocols are characterzed as hgher latency and loitr overhead. A majorty of exstng research about the QoS route n MANETs s based on the two knds of route protocols. HoItver, exstng studes show that table-drven QoS protocols request globe network state nformaton; and on demand QoS protocols need ntates a route dscovery based on floodng, whch are not ft the dynamc and capablty constran n MANETs. QoS route dscovery can be mplemented wth dstrbuted routng or source routng. In dstrbuted routng, all the nodes ncludng the source node n the QoS path wll run the route algorthm to select the next hop node. In source routng, a QoS route s predetermned by the route algorthm only at the source node. The new proposed method knd of heurstc dstrbuted algorthm mxed some features of source routng. Our QoS route dscovery algorthm s mplemented wth route explore and dscovery based on renforcement learnng from source to destnaton and all the nodes at the reverse path as Itll as the QoS measurement data are stored and returned by acknowledgment packets to source nodes and the data packets are source routed. The QoS route dscovery scheme s llustrated n Fg The characterstc of SEAD s usng a one way hash functon. Each node computes a lst of hash values 1 h,, n h where ( )1 = h H h, n < 0, gven an ntal 0 h. If a node knows H and a ISSN: ISBN:

3 value n h, then t can authentcate any other value h, n < 0. Let a node s hash chan be the sequence of values 0 h, 1 h,, n h where ( )1 = h H h and n s dvsble by m, then for a sequence number n some routng update, and let m n k =. An value from the group of hash values km h, 1 + km h,, 1 +m km h s used to authentcate the node. The example n Table 1, m = 5 and n = 20 n whch denotes the sequence number, j denotes metrc, m denotes network dameter, and n denotes length of hash chan. In SEAD n QoS Routng protocol, the receved node can verfy the metrc accordng to the receved hash value [10, 11]. Some malcous node can ncrease the metrc and compute the correspondng hash value. The method used by SEAD for authentcatng an entry n a routng update uses the sequence number n that node to determne a contguous group of m elements from that destnaton node s hash chan, one element of whch has to be used to authentcate that routng update [11]. In Fgure 2.1, the dfference n the table of node C s the column of hash values. The partcular hash value from ths group of hash values that have to be used to authentcate the node s determned by the metrc value beng sent n that node. Fg 2.1. QoS Route Dscovery on SEDA Routng Protocol n MANETs Destnaton Node Short IP Address Hop ways C C,A A D,B,A D D B C,D,E E F,G F G,H G E,F H F Table.2.1. QoS route dscovery n MANETs A MANETs can be modeled as a undrected graph wth Itght, G, G= [V, E] V, s the set of the moble nodes and the E the set of the bdrectonal wreless lnk, for a lnk e E.. have e= (v, v j ) and node v V,v j V, j. v, v j are the neghbor nodes. G and V are both dynamc set. For s V s the source, p {v-{s}}s the destnaton, f e E, defne the metrc functon: Bandwdth functon: B(e) : E R +, Delay functon: D(e) : E R +, The QoS parameters of path l can be represented as: k 1 DI ( ) = D (, = 1 BI ( ) = mn(( B, v v ) + 1 v v + 1 ), B( v, + 1 v + 2 ),...,( B v, k Equ (1) The QoS route can be descrbed as a optmze problem: ( D( I) d) ( B( I) b) Equ (2) vk )) ISSN: ISBN:

4 Where, d and b s the constant parameters. 3. MULTICAST SEDA ROUTING PROTOCOL WITH QoS MANETs The propose a routng protocol that uses forward group to apply multcast routng wth QoS from source(s) to a cluster of destnatons. In the proposed system, wll try to take all lmtatons of MANETs nto account and provdes a general cluster based framework for mplementaton of QoS Sesson Intaton and Destructon A node that has data to send starts sesson by broadcastng a sesson ntaton as a qualty of servce route request (QRReq) wth Tme-To- Lve (TTL) greater than zero. Intermedate nodes rebroadcast QRReq f they have avalable bandwdth untl arrvng at destnatons or TTL equal zero. Destnaton nodes receve QRReq and send route reply (RRep) to the source. Source nodes and destnaton nodes can leave the sesson by not sendng QRReq and RRep respectvely Forward group and member management When an ntermedate node receves QRReq from source node, t stores the source IP and the sequence number n ts message cache to detect any potental duplcates. If the message s not a duplcate, ntermedate node has avalable effcency and the TTL s greater than zero, then the node rebroadcast QRReq; routng table s updated wth node ID that receves from t. The destnaton node wll receve QRReq from several paths; t selects one path wth the best QoS condtons and sends route reply (RRep). When an ntermedate node receves RRep from destnatons, t checks f the node ID n RRep matches ts own ID. If t does, the node realzes that t s on the reverse path to the source and t s a part of the forwardng group, so t sets the forwardng group flag. The next hop node ID feld s flled by extractng nformaton from ts routng table. In ths way, each ntermedate node propagates the RRep untl t reaches the multcast source va the selected path. Ths whole process constructs or updates the routes from sources to recevers. Through ths process, all paths to destnatons wll be defned and source node can start sendng data packet Admsson control Its use dstrbuted admsson control at every ntermedate node, when ntermedate node receve QRReq packet, t must calculate ts avalable bandwdth and rebroadcast QRReq packet f t has avalable bandwdth. QRReq forwarded as long as QoS requrements are met. The packet s dropped f QoS requrements cannot be met any more, avodng floodng the network unnecessarly. Before QRReq packet rebroadcast, each ntermedate node temporarly updates ts QoS nformaton wth the current QoS condtons. Wth ths rule, nodes do not accept more traffc than the bandwdth avalable. Fgure 2.1 shows structure of route request wth QoS requrement phase and the route reply phase and forward group establshment. In our framework, the propose to compute the avalable bandwdth based on the channel status of the rado to determne the busy and dle perods of the share wreless meda. By examnng the channel usage of a node, t able to take nto account the actvtes of both the node tself and ts surroundng neghbors ISSN: ISBN:

5 and therefore obtan a good approxmaton of the bandwdth usage; t wll use the standard IEEE Route recovery and prevent congeston Most multcast applcatons belong to category that number of senders s less than number of recevers. In ths stuaton, sender advertsng s more effcent than recever advertsng [12], so n our proposed routng protocol use sender advertsng. Each source perodcally sends QRReq that make route recovery by updatng forward group. The problem wth the admsson control soluton n most prevous studes s that a one-tme procedure performed before the flows starts. It does not take nto account the change n the wreless network over the duraton of the flow s operaton. Capacty of channel may change dramatcally and avalable bandwdth that estmated by ndvdual nodes wll be change wth dynamc moblty of nodes (move to each others) and due to fadng and out sde nterference [12]. In our approach when source update forward group, paths wll update also and nodes re estmate the avalable bandwdth, so all changes that appear as a result of node movement wll be taken. Any forward node can detect congeston usng perodc traffc measurement. When a node detects such congeston, t starts sendng a prop packet to source or destnaton. If t sends to source to update forward group, overhead wll be hgh because of control packet [12, 13]. If t sends to destnaton node, destnaton nodes need to process and save all alternatve paths when route request are receved. In addton, destnaton nodes measure packet delay, f a packet takes long delay; destnaton node drops t and sends update to source. 4. REINFORCEMENT LEARNING Renforcement Learnng s a general method n machne learnng, whch deals wth the problem of how a system n a dynamc envronment can learn to choose optmal actons to acheve ts goals and through the learnng of tral-and-error nteractons, the system can then attempt to determne the output wth the nput data [15]. The dea s to adjust parameters n the drecton of the emprcally estmated gradent of the ncensement reward. The renforcement learnng procedure ncludes: envronment state set, S; actons set, A; a renforcement functon δ: S S ; the reward functon R: S X A S state transton polcy: T: S X A (S). (S, A) s the expected nstantaneous renforcement from acton a (a A) n state s(s S). (s) s the set of functon over the set S and the learnng results, how to make a transton from state s to state s usng acton a. Fg. 2: Renforcement learnng model Fgure 2 llustrates the form of a standard renforcement model. The acton changes the state of the system and the value of ths state transton s represented by value of renforcement. Renforcement learnng problems are usually modeled as Markov decson processes. The model s Markov f the state transtons are ndependent of the hstory of the system. In MANETs, each ISSN: ISBN:

6 moble node acts as a router and a host at the same tme and routng nformaton s exchanged perodcally or on-demand [14, 15]. Furthermore, the route nformaton depends on the dynamc network state s not very accurate. And t s dffcult to collect the accurate QoS nformaton; each moble node only can obtan the local envronment relatvely that s not complete and accurate for QoS route compute. The route algorthms based on RL have receved some attenton n wre less network. In the RL algorthm s combned the proposed novel algorthm, accordng to the QoS metrc, each moble node acts as an agent, t must make certan decsons, how to fnd a feasble path for some new connecton arrval [15]. The agent outcome (route selecton) of a decson s used to reward or punsh the correspondng decson of the routng algorthm so that good decsons are selected va rewards, whle bad decsons are elmnated va the punshment. Then, the acknowledgement packets that store the reverse route and the QoS measurement data return to the source node. The value of followng a polcy wth parameters s the expected cumulatve dscounted (by a factor of δ [0, 1]) reward value that can be wrtten as: V π = 0? S? = λ t r = 0 t+ --- Equ 3 ξ t G( ξ ) = λ Equ 4 The evaluate functon s: Q ( s, a ) = max ( s, ) t t ξ + λ Q t t+ 1 a --- t Equ 5 and the n-step truncated return s n 1 = = 0 V ( n) + n r ( ) t rt+ r t+ n X t+ n Equ 6 The optmal polcy can only be determned by teratve compute wth the renforcement value. The qualty of the polcy s drectly lmted by the qualty of the model that t s calculated from. It must sample the state transtons suffcently often to establsh a good model. In our approach, route exploraton establshment s done usng lmted floodng. When t need to establsh a route and the destnaton s not n the source s neghborhood lst, the source node wll search for ts route table and network state table frst. If there s enough nformaton to execute RL-based decson algorthmc [13, 14, 15], ntermedate nodes wll forward a route request packet. If no reply arrves at the explored node n tme, the route entry wll be deleted at the node and late comng reply packets wll be gnored. 5. Novel Algorthm Based Routng Protocol Extends The route extends based on Clusterng Routng Algorthm wll only run at each source node, to generate and select paths for data packets based on the QoS requrements. The CRA populaton wll consst of ndvduals, whch represent paths betiten the source node and potental destnaton nodes. It wll use a varable length representaton, whch s expected to allow the CRA more flexblty to evolve n response to changes n the network. The ftness of a path s determned from the QoS measurement data returned by acknowledgement packets, whch s receved n response to sendng a data packet along that path. In ths paper wth help of topologes, routng algorthms and clusterng technque. In ths paper ISSN: ISBN:

7 propose method s Qualty of Servce and Renforcement Learnng based on clusterng technque. In ths proposed method s manly reduce the lowcomplexty and avod the problem of optmze tme n smart net Qualty of Servce n MANET. It s also demonstrate random networks and Route dscovery scheme on dynamc network envronment. In ths paper can mprove the effcent of data transfer n feasble path usng clusterng. 5.1 Structure of framework Fgure shows QoS route request phase from source to destnatons and descrbes how ntermedate node behaves when t receves QoS route request. It shows route reply phase from destnatons to source, descrbes how ntermedate node behaves when t receves route reply and when t sets to be a forward node. The data packet phase from source to destnatons, descrbes how ntermedate node behaves when t receves data packet. It gves an overvew about clustered network (nteracton betiten network, routng and MAC layers) and acton performs at ntermedate node. Descrbes how ntermedate node checks QoS requrements and estmates avalable bandwdth dependng on nformaton that come from IEEE Standard. Fg Route Request on QoS Model Base on Clusterng Algorthm CONCLUSION In ths paper propose method s Qualty of Servce and Renforcement Learnng based on clusterng technque usng the Routng Algorthm. In ths proposed method s manly reduce the low-complexty and avod the problem of optmze tme n smart net Qualty of Servce n MANET. It s also demonstrate random networks and Route dscovery scheme on dynamc network envronment. Therefore varous Renforcement Learnng algorthms, to fnd & mantan routes n MANET s dffcult and mportant task for effcent routng, mnmze exchange of routng nformaton, avod routng loop as It wll as to reduce route dscovery overheads. In ths paper can mprove the effcent of data transfer n feasble path at routng usng clusterng. The future enhancement of the paper should feel that measurements of metrcs lke the channel wse optmze dle tme are mportant to corroborate capacty energy effcent predctons of the capacty model and to make correctons n stuatons where the capacty model s naccurate. ISSN: ISBN:

8 REFERENCE: [1] A. Perrgy, R. Canett, D. Song, and J. D. Tygar, Effcent and Secure Source Authentcaton for Multcast, Proceedngs of Network and Dstrbuted System Securty Symposum, NDSS 2001, February [2]Y. C. Hu, A. Perrg, and D. B. Johnson, Effcent Securty Mechansms for Routng Protocols, Proceedngs of the Tenth Annual Network and Dstrbuted System Securty Symposum, NDSS [3]Y. C. Hu, A. Perrg, and D. B. Johnson, ARIADNE: A Secure On Demand Routng Protocol for Ad Hoc Networks, MobCom 02, Atlanta, Georga, USA, September 23-26, [4]Y. C. Hu, A. Perrg, and D. B. Johnson, Rushng Attacks and Defense n Wreless Ad Hoc Network Routng Protocols, ACM Workshop on Wreless Securty (WSe 2003). [5] Davd, R. and G.N. Ignas, Ad hoc networkng n future wreless communcatons. Computer Communcatons, 6: [6] Anonymous, IETF: Moble ad hoc networks charter, harter.html [7] Chen, K., S.H. Shah and K. Nahrstedt, Crosslayer desgn for data accessblty n moble ad hoc networks. J. Wreless Personal Communcatons, 21: [8] Introducton on Ad-hoc Networks presentaton by WAN Chunfeng. [9] Dynamc Source Routng n Ad Hoc Wreless Networks by Davd B. Johnson Davd A Maltz, June [10] Routng n ad hoc networks of moble hosts Johnson, D.B. Moble Computng Systems and Applcatons, Proceedngs, Workshop on Volume, Issue, 8-9 Dec [11] I-SEAD: A Secure Routng Protocol for Moble Ad Hoc Networks, Chu-Hsng Ln, We-Shen La, Yen-Ln Huang, Me-Chun Chou, 2008 Internatonal Conference on Multmeda and Ubqutous Engneerng. [12] Dstrbuted Channel Access Schedulng for Ad Hoc Networks, Lchun Bao, J.J. Garca-Luna-Aceves. [13] Dstrbuted Opportunstc Schedulng for Ad Hoc Networks Wth Random Access: An Optmal Stoppng Approach, Dong Zheng, Weyan Ge, and Junshan Zhang, IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 55, NO. 1, JANUARY [14] Multcast Routng wth Qualty of Servce n Moble Ad hoc Networks, Mohammed Saghr Tat Chee Wan Rahmat Budarto, Natonal Computer Scence Postgraduate Colloquum 2005 (NaCSPC 05). [15] Desgn and a New Method of Qualty of Servce n Moble Ad Hoc Network (Manet), Jtendranath Mungara, S.P. Sett, G. Vasanth, European Journal of Scentfc Research ISSN X Vol.34 No.1 (2009), pp EuroJournals Publshng, Inc ISSN: ISBN:

The Development of Web Log Mining Based on Improve-K-Means Clustering Analysis

The Development of Web Log Mining Based on Improve-K-Means Clustering Analysis The Development of Web Log Mnng Based on Improve-K-Means Clusterng Analyss TngZhong Wang * College of Informaton Technology, Luoyang Normal Unversty, Luoyang, 471022, Chna wangtngzhong2@sna.cn Abstract.

More information

PAS: A Packet Accounting System to Limit the Effects of DoS & DDoS. Debish Fesehaye & Klara Naherstedt University of Illinois-Urbana Champaign

PAS: A Packet Accounting System to Limit the Effects of DoS & DDoS. Debish Fesehaye & Klara Naherstedt University of Illinois-Urbana Champaign PAS: A Packet Accountng System to Lmt the Effects of DoS & DDoS Debsh Fesehaye & Klara Naherstedt Unversty of Illnos-Urbana Champagn DoS and DDoS DDoS attacks are ncreasng threats to our dgtal world. Exstng

More information

Fault tolerance in cloud technologies presented as a service

Fault tolerance in cloud technologies presented as a service Internatonal Scentfc Conference Computer Scence 2015 Pavel Dzhunev, PhD student Fault tolerance n cloud technologes presented as a servce INTRODUCTION Improvements n technques for vrtualzaton and performance

More information

A Novel Adaptive Load Balancing Routing Algorithm in Ad hoc Networks

A Novel Adaptive Load Balancing Routing Algorithm in Ad hoc Networks Journal of Convergence Informaton Technology A Novel Adaptve Load Balancng Routng Algorthm n Ad hoc Networks Zhu Bn, Zeng Xao-png, Xong Xan-sheng, Chen Qan, Fan Wen-yan, We Geng College of Communcaton

More information

Project Networks With Mixed-Time Constraints

Project Networks With Mixed-Time Constraints Project Networs Wth Mxed-Tme Constrants L Caccetta and B Wattananon Western Australan Centre of Excellence n Industral Optmsaton (WACEIO) Curtn Unversty of Technology GPO Box U1987 Perth Western Australa

More information

M3S MULTIMEDIA MOBILITY MANAGEMENT AND LOAD BALANCING IN WIRELESS BROADCAST NETWORKS

M3S MULTIMEDIA MOBILITY MANAGEMENT AND LOAD BALANCING IN WIRELESS BROADCAST NETWORKS M3S MULTIMEDIA MOBILITY MANAGEMENT AND LOAD BALANCING IN WIRELESS BROADCAST NETWORKS Bogdan Cubotaru, Gabrel-Mro Muntean Performance Engneerng Laboratory, RINCE School of Electronc Engneerng Dubln Cty

More information

APPLICATION OF PROBE DATA COLLECTED VIA INFRARED BEACONS TO TRAFFIC MANEGEMENT

APPLICATION OF PROBE DATA COLLECTED VIA INFRARED BEACONS TO TRAFFIC MANEGEMENT APPLICATION OF PROBE DATA COLLECTED VIA INFRARED BEACONS TO TRAFFIC MANEGEMENT Toshhko Oda (1), Kochro Iwaoka (2) (1), (2) Infrastructure Systems Busness Unt, Panasonc System Networks Co., Ltd. Saedo-cho

More information

A DATA MINING APPLICATION IN A STUDENT DATABASE

A DATA MINING APPLICATION IN A STUDENT DATABASE JOURNAL OF AERONAUTICS AND SPACE TECHNOLOGIES JULY 005 VOLUME NUMBER (53-57) A DATA MINING APPLICATION IN A STUDENT DATABASE Şenol Zafer ERDOĞAN Maltepe Ünversty Faculty of Engneerng Büyükbakkalköy-Istanbul

More information

A GENERIC HANDOVER DECISION MANAGEMENT FRAMEWORK FOR NEXT GENERATION NETWORKS

A GENERIC HANDOVER DECISION MANAGEMENT FRAMEWORK FOR NEXT GENERATION NETWORKS A GENERIC HANDOVER DECISION MANAGEMENT FRAMEWORK FOR NEXT GENERATION NETWORKS Shanthy Menezes 1 and S. Venkatesan 2 1 Department of Computer Scence, Unversty of Texas at Dallas, Rchardson, TX, USA 1 shanthy.menezes@student.utdallas.edu

More information

denote the location of a node, and suppose node X . This transmission causes a successful reception by node X for any other node

denote the location of a node, and suppose node X . This transmission causes a successful reception by node X for any other node Fnal Report of EE359 Class Proect Throughput and Delay n Wreless Ad Hoc Networs Changhua He changhua@stanford.edu Abstract: Networ throughput and pacet delay are the two most mportant parameters to evaluate

More information

Survey on Virtual Machine Placement Techniques in Cloud Computing Environment

Survey on Virtual Machine Placement Techniques in Cloud Computing Environment Survey on Vrtual Machne Placement Technques n Cloud Computng Envronment Rajeev Kumar Gupta and R. K. Paterya Department of Computer Scence & Engneerng, MANIT, Bhopal, Inda ABSTRACT In tradtonal data center

More information

An Ad Hoc Network Load Balancing Energy- Efficient Multipath Routing Protocol

An Ad Hoc Network Load Balancing Energy- Efficient Multipath Routing Protocol 246 JOURNA OF SOFTWAR, VO. 9, NO. 1, JANUARY 2014 An Ad Hoc Network oad alancng nergy- ffcent Multpath Routng Protocol De-jn Kong Shanx Fnance and Taxaton College, Tayuan, Chna mal: dejnkong@163.com Xao-lng

More information

An Adaptive Cross-layer Bandwidth Scheduling Strategy for the Speed-Sensitive Strategy in Hierarchical Cellular Networks

An Adaptive Cross-layer Bandwidth Scheduling Strategy for the Speed-Sensitive Strategy in Hierarchical Cellular Networks An Adaptve Cross-layer Bandwdth Schedulng Strategy for the Speed-Senstve Strategy n erarchcal Cellular Networks Jong-Shn Chen #1, Me-Wen #2 Department of Informaton and Communcaton Engneerng ChaoYang Unversty

More information

Luby s Alg. for Maximal Independent Sets using Pairwise Independence

Luby s Alg. for Maximal Independent Sets using Pairwise Independence Lecture Notes for Randomzed Algorthms Luby s Alg. for Maxmal Independent Sets usng Parwse Independence Last Updated by Erc Vgoda on February, 006 8. Maxmal Independent Sets For a graph G = (V, E), an ndependent

More information

LAMOR: Lifetime-Aware Multipath Optimized Routing Algorithm for Video Transmission over Ad Hoc Networks

LAMOR: Lifetime-Aware Multipath Optimized Routing Algorithm for Video Transmission over Ad Hoc Networks LAMOR: Lfetme-Aware Multpath Optmzed Routng Algorthm for Vdeo ransmsson over Ad Hoc Networks 1 Lansheng an, Lng Xe, Kng-m Ko, Mng Le and Moshe Zukerman Abstract Multpath routng s a key technque to support

More information

AN APPOINTMENT ORDER OUTPATIENT SCHEDULING SYSTEM THAT IMPROVES OUTPATIENT EXPERIENCE

AN APPOINTMENT ORDER OUTPATIENT SCHEDULING SYSTEM THAT IMPROVES OUTPATIENT EXPERIENCE AN APPOINTMENT ORDER OUTPATIENT SCHEDULING SYSTEM THAT IMPROVES OUTPATIENT EXPERIENCE Yu-L Huang Industral Engneerng Department New Mexco State Unversty Las Cruces, New Mexco 88003, U.S.A. Abstract Patent

More information

INVESTIGATION OF VEHICULAR USERS FAIRNESS IN CDMA-HDR NETWORKS

INVESTIGATION OF VEHICULAR USERS FAIRNESS IN CDMA-HDR NETWORKS 21 22 September 2007, BULGARIA 119 Proceedngs of the Internatonal Conference on Informaton Technologes (InfoTech-2007) 21 st 22 nd September 2007, Bulgara vol. 2 INVESTIGATION OF VEHICULAR USERS FAIRNESS

More information

Forecasting the Demand of Emergency Supplies: Based on the CBR Theory and BP Neural Network

Forecasting the Demand of Emergency Supplies: Based on the CBR Theory and BP Neural Network 700 Proceedngs of the 8th Internatonal Conference on Innovaton & Management Forecastng the Demand of Emergency Supples: Based on the CBR Theory and BP Neural Network Fu Deqang, Lu Yun, L Changbng School

More information

Cooperative Load Balancing in IEEE 802.11 Networks with Cell Breathing

Cooperative Load Balancing in IEEE 802.11 Networks with Cell Breathing Cooperatve Load Balancng n IEEE 82.11 Networks wth Cell Breathng Eduard Garca Rafael Vdal Josep Paradells Wreless Networks Group - Techncal Unversty of Catalona (UPC) {eduardg, rvdal, teljpa}@entel.upc.edu;

More information

Efficient Bandwidth Management in Broadband Wireless Access Systems Using CAC-based Dynamic Pricing

Efficient Bandwidth Management in Broadband Wireless Access Systems Using CAC-based Dynamic Pricing Effcent Bandwdth Management n Broadband Wreless Access Systems Usng CAC-based Dynamc Prcng Bader Al-Manthar, Ndal Nasser 2, Najah Abu Al 3, Hossam Hassanen Telecommuncatons Research Laboratory School of

More information

An RFID Distance Bounding Protocol

An RFID Distance Bounding Protocol An RFID Dstance Boundng Protocol Gerhard P. Hancke and Markus G. Kuhn May 22, 2006 An RFID Dstance Boundng Protocol p. 1 Dstance boundng Verfer d Prover Places an upper bound on physcal dstance Does not

More information

An Interest-Oriented Network Evolution Mechanism for Online Communities

An Interest-Oriented Network Evolution Mechanism for Online Communities An Interest-Orented Network Evoluton Mechansm for Onlne Communtes Cahong Sun and Xaopng Yang School of Informaton, Renmn Unversty of Chna, Bejng 100872, P.R. Chna {chsun,yang}@ruc.edu.cn Abstract. Onlne

More information

SPEED: A Stateless Protocol for Real-Time Communication in Sensor Networks

SPEED: A Stateless Protocol for Real-Time Communication in Sensor Networks : A Stateless Protocol for Real-Tme Communcaton n Sensor Networks Tan He a John A Stankovc a Chenyang Lu b Tarek Abdelzaher a a Department of Computer Scence b Department of Computer Scence & Engneerng

More information

A Passive Network Measurement-based Traffic Control Algorithm in Gateway of. P2P Systems

A Passive Network Measurement-based Traffic Control Algorithm in Gateway of. P2P Systems roceedngs of the 7th World Congress The Internatonal Federaton of Automatc Control A assve Network Measurement-based Traffc Control Algorthm n Gateway of 2 Systems Ybo Jang, Weje Chen, Janwe Zheng, Wanlang

More information

A 2 -MAC: An Adaptive, Anycast MAC Protocol for Wireless Sensor Networks

A 2 -MAC: An Adaptive, Anycast MAC Protocol for Wireless Sensor Networks : An Adaptve, Anycast MAC Protocol for Wreless Sensor Networks Hwee-Xan Tan and Mun Choon Chan Department of Computer Scence, School of Computng, Natonal Unversty of Sngapore {hweexan, chanmc}@comp.nus.edu.sg

More information

A Secure Password-Authenticated Key Agreement Using Smart Cards

A Secure Password-Authenticated Key Agreement Using Smart Cards A Secure Password-Authentcated Key Agreement Usng Smart Cards Ka Chan 1, Wen-Chung Kuo 2 and Jn-Chou Cheng 3 1 Department of Computer and Informaton Scence, R.O.C. Mltary Academy, Kaohsung 83059, Tawan,

More information

Research Article QoS and Energy Aware Cooperative Routing Protocol for Wildfire Monitoring Wireless Sensor Networks

Research Article QoS and Energy Aware Cooperative Routing Protocol for Wildfire Monitoring Wireless Sensor Networks The Scentfc World Journal Volume 3, Artcle ID 43796, pages http://dx.do.org/.55/3/43796 Research Artcle QoS and Energy Aware Cooperatve Routng Protocol for Wldfre Montorng Wreless Sensor Networks Mohamed

More information

Ant Colony Optimization for Economic Generator Scheduling and Load Dispatch

Ant Colony Optimization for Economic Generator Scheduling and Load Dispatch Proceedngs of the th WSEAS Int. Conf. on EVOLUTIONARY COMPUTING, Lsbon, Portugal, June 1-18, 5 (pp17-175) Ant Colony Optmzaton for Economc Generator Schedulng and Load Dspatch K. S. Swarup Abstract Feasblty

More information

A heuristic task deployment approach for load balancing

A heuristic task deployment approach for load balancing Xu Gaochao, Dong Yunmeng, Fu Xaodog, Dng Yan, Lu Peng, Zhao Ja Abstract A heurstc task deployment approach for load balancng Gaochao Xu, Yunmeng Dong, Xaodong Fu, Yan Dng, Peng Lu, Ja Zhao * College of

More information

taposh_kuet20@yahoo.comcsedchan@cityu.edu.hk rajib_csedept@yahoo.co.uk, alam_shihabul@yahoo.com

taposh_kuet20@yahoo.comcsedchan@cityu.edu.hk rajib_csedept@yahoo.co.uk, alam_shihabul@yahoo.com G. G. Md. Nawaz Al 1,2, Rajb Chakraborty 2, Md. Shhabul Alam 2 and Edward Chan 1 1 Cty Unversty of Hong Kong, Hong Kong, Chna taposh_kuet20@yahoo.comcsedchan@ctyu.edu.hk 2 Khulna Unversty of Engneerng

More information

Forecasting the Direction and Strength of Stock Market Movement

Forecasting the Direction and Strength of Stock Market Movement Forecastng the Drecton and Strength of Stock Market Movement Jngwe Chen Mng Chen Nan Ye cjngwe@stanford.edu mchen5@stanford.edu nanye@stanford.edu Abstract - Stock market s one of the most complcated systems

More information

Minimal Coding Network With Combinatorial Structure For Instantaneous Recovery From Edge Failures

Minimal Coding Network With Combinatorial Structure For Instantaneous Recovery From Edge Failures Mnmal Codng Network Wth Combnatoral Structure For Instantaneous Recovery From Edge Falures Ashly Joseph 1, Mr.M.Sadsh Sendl 2, Dr.S.Karthk 3 1 Fnal Year ME CSE Student Department of Computer Scence Engneerng

More information

On File Delay Minimization for Content Uploading to Media Cloud via Collaborative Wireless Network

On File Delay Minimization for Content Uploading to Media Cloud via Collaborative Wireless Network On Fle Delay Mnmzaton for Content Uploadng to Meda Cloud va Collaboratve Wreless Network Ge Zhang and Yonggang Wen School of Computer Engneerng Nanyang Technologcal Unversty Sngapore Emal: {zh0001ge, ygwen}@ntu.edu.sg

More information

Data Broadcast on a Multi-System Heterogeneous Overlayed Wireless Network *

Data Broadcast on a Multi-System Heterogeneous Overlayed Wireless Network * JOURNAL OF INFORMATION SCIENCE AND ENGINEERING 24, 819-840 (2008) Data Broadcast on a Mult-System Heterogeneous Overlayed Wreless Network * Department of Computer Scence Natonal Chao Tung Unversty Hsnchu,

More information

RESEARCH ON DUAL-SHAKER SINE VIBRATION CONTROL. Yaoqi FENG 1, Hanping QIU 1. China Academy of Space Technology (CAST) yaoqi.feng@yahoo.

RESEARCH ON DUAL-SHAKER SINE VIBRATION CONTROL. Yaoqi FENG 1, Hanping QIU 1. China Academy of Space Technology (CAST) yaoqi.feng@yahoo. ICSV4 Carns Australa 9- July, 007 RESEARCH ON DUAL-SHAKER SINE VIBRATION CONTROL Yaoq FENG, Hanpng QIU Dynamc Test Laboratory, BISEE Chna Academy of Space Technology (CAST) yaoq.feng@yahoo.com Abstract

More information

A New Task Scheduling Algorithm Based on Improved Genetic Algorithm

A New Task Scheduling Algorithm Based on Improved Genetic Algorithm A New Task Schedulng Algorthm Based on Improved Genetc Algorthm n Cloud Computng Envronment Congcong Xong, Long Feng, Lxan Chen A New Task Schedulng Algorthm Based on Improved Genetc Algorthm n Cloud Computng

More information

Feature selection for intrusion detection. Slobodan Petrović NISlab, Gjøvik University College

Feature selection for intrusion detection. Slobodan Petrović NISlab, Gjøvik University College Feature selecton for ntruson detecton Slobodan Petrovć NISlab, Gjøvk Unversty College Contents The feature selecton problem Intruson detecton Traffc features relevant for IDS The CFS measure The mrmr measure

More information

Conferencing protocols and Petri net analysis

Conferencing protocols and Petri net analysis Conferencng protocols and Petr net analyss E. ANTONIDAKIS Department of Electroncs, Technologcal Educatonal Insttute of Crete, GREECE ena@chana.tecrete.gr Abstract: Durng a computer conference, users desre

More information

A Novel Problem-solving Metric for Future Internet Routing Based on Virtualization and Cloud-computing

A Novel Problem-solving Metric for Future Internet Routing Based on Virtualization and Cloud-computing www.ijcsi.org 159 A Novel Problem-solvng Metrc for Future Internet Routng Based on Vrtualzaton and Cloud-computng Rujuan Zheng, Mngchuan Zhang, Qngtao Wu, Wangyang We and Haxa Zhao Electronc & Informaton

More information

Optimized ready mixed concrete truck scheduling for uncertain factors using bee algorithm

Optimized ready mixed concrete truck scheduling for uncertain factors using bee algorithm Songklanakarn J. Sc. Technol. 37 (2), 221-230, Mar.-Apr. 2015 http://www.sst.psu.ac.th Orgnal Artcle Optmzed ready mxed concrete truck schedulng for uncertan factors usng bee algorthm Nuntana Mayteekreangkra

More information

An Intelligent Policy System for Channel Allocation of Information Appliance

An Intelligent Policy System for Channel Allocation of Information Appliance Tamkang Journal of Scence and Engneerng, Vol. 5, No., pp. 63-68 (2002) 63 An Intellgent Polcy System for Channel Allocaton of Informaton Applance Cheng-Yuan Ku, Chang-Jnn Tsao 2 and Davd Yen 3 Department

More information

A Performance Analysis of View Maintenance Techniques for Data Warehouses

A Performance Analysis of View Maintenance Techniques for Data Warehouses A Performance Analyss of Vew Mantenance Technques for Data Warehouses Xng Wang Dell Computer Corporaton Round Roc, Texas Le Gruenwald The nversty of Olahoma School of Computer Scence orman, OK 739 Guangtao

More information

A hybrid global optimization algorithm based on parallel chaos optimization and outlook algorithm

A hybrid global optimization algorithm based on parallel chaos optimization and outlook algorithm Avalable onlne www.ocpr.com Journal of Chemcal and Pharmaceutcal Research, 2014, 6(7):1884-1889 Research Artcle ISSN : 0975-7384 CODEN(USA) : JCPRC5 A hybrd global optmzaton algorthm based on parallel

More information

LITERATURE REVIEW: VARIOUS PRIORITY BASED TASK SCHEDULING ALGORITHMS IN CLOUD COMPUTING

LITERATURE REVIEW: VARIOUS PRIORITY BASED TASK SCHEDULING ALGORITHMS IN CLOUD COMPUTING LITERATURE REVIEW: VARIOUS PRIORITY BASED TASK SCHEDULING ALGORITHMS IN CLOUD COMPUTING 1 MS. POOJA.P.VASANI, 2 MR. NISHANT.S. SANGHANI 1 M.Tech. [Software Systems] Student, Patel College of Scence and

More information

CALL ADMISSION CONTROL IN WIRELESS MULTIMEDIA NETWORKS

CALL ADMISSION CONTROL IN WIRELESS MULTIMEDIA NETWORKS CALL ADMISSION CONTROL IN WIRELESS MULTIMEDIA NETWORKS Novella Bartoln 1, Imrch Chlamtac 2 1 Dpartmento d Informatca, Unverstà d Roma La Sapenza, Roma, Italy novella@ds.unroma1.t 2 Center for Advanced

More information

Research of Network System Reconfigurable Model Based on the Finite State Automation

Research of Network System Reconfigurable Model Based on the Finite State Automation JOURNAL OF NETWORKS, VOL., NO. 5, MAY 24 237 Research of Network System Reconfgurable Model Based on the Fnte State Automaton Shenghan Zhou and Wenbng Chang School of Relablty and System Engneerng, Behang

More information

Network Security Situation Evaluation Method for Distributed Denial of Service

Network Security Situation Evaluation Method for Distributed Denial of Service Network Securty Stuaton Evaluaton Method for Dstrbuted Denal of Servce Jn Q,2, Cu YMn,2, Huang MnHuan,2, Kuang XaoHu,2, TangHong,2 ) Scence and Technology on Informaton System Securty Laboratory, Bejng,

More information

Performance Analysis of Energy Consumption of Smartphone Running Mobile Hotspot Application

Performance Analysis of Energy Consumption of Smartphone Running Mobile Hotspot Application Internatonal Journal of mart Grd and lean Energy Performance Analyss of Energy onsumpton of martphone Runnng Moble Hotspot Applcaton Yun on hung a chool of Electronc Engneerng, oongsl Unversty, 511 angdo-dong,

More information

Dynamic Fleet Management for Cybercars

Dynamic Fleet Management for Cybercars Proceedngs of the IEEE ITSC 2006 2006 IEEE Intellgent Transportaton Systems Conference Toronto, Canada, September 17-20, 2006 TC7.5 Dynamc Fleet Management for Cybercars Fenghu. Wang, Mng. Yang, Ruqng.

More information

Network Aware Load-Balancing via Parallel VM Migration for Data Centers

Network Aware Load-Balancing via Parallel VM Migration for Data Centers Network Aware Load-Balancng va Parallel VM Mgraton for Data Centers Kun-Tng Chen 2, Chen Chen 12, Po-Hsang Wang 2 1 Informaton Technology Servce Center, 2 Department of Computer Scence Natonal Chao Tung

More information

Frequency Selective IQ Phase and IQ Amplitude Imbalance Adjustments for OFDM Direct Conversion Transmitters

Frequency Selective IQ Phase and IQ Amplitude Imbalance Adjustments for OFDM Direct Conversion Transmitters Frequency Selectve IQ Phase and IQ Ampltude Imbalance Adjustments for OFDM Drect Converson ransmtters Edmund Coersmeer, Ernst Zelnsk Noka, Meesmannstrasse 103, 44807 Bochum, Germany edmund.coersmeer@noka.com,

More information

A role based access in a hierarchical sensor network architecture to provide multilevel security

A role based access in a hierarchical sensor network architecture to provide multilevel security 1 A role based access n a herarchcal sensor network archtecture to provde multlevel securty Bswajt Panja a Sanjay Kumar Madra b and Bharat Bhargava c a Department of Computer Scenc Morehead State Unversty

More information

Enabling P2P One-view Multi-party Video Conferencing

Enabling P2P One-view Multi-party Video Conferencing Enablng P2P One-vew Mult-party Vdeo Conferencng Yongxang Zhao, Yong Lu, Changja Chen, and JanYn Zhang Abstract Mult-Party Vdeo Conferencng (MPVC) facltates realtme group nteracton between users. Whle P2P

More information

Efficient On-Demand Data Service Delivery to High-Speed Trains in Cellular/Infostation Integrated Networks

Efficient On-Demand Data Service Delivery to High-Speed Trains in Cellular/Infostation Integrated Networks IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. XX, NO. XX, MONTH 2XX 1 Effcent On-Demand Data Servce Delvery to Hgh-Speed Trans n Cellular/Infostaton Integrated Networks Hao Lang, Student Member,

More information

benefit is 2, paid if the policyholder dies within the year, and probability of death within the year is ).

benefit is 2, paid if the policyholder dies within the year, and probability of death within the year is ). REVIEW OF RISK MANAGEMENT CONCEPTS LOSS DISTRIBUTIONS AND INSURANCE Loss and nsurance: When someone s subject to the rsk of ncurrng a fnancal loss, the loss s generally modeled usng a random varable or

More information

Adaptive and Dynamic Load Balancing in Grid Using Ant Colony Optimization

Adaptive and Dynamic Load Balancing in Grid Using Ant Colony Optimization Sandp Kumar Goyal et al. / Internatonal Journal of Engneerng and Technology (IJET) Adaptve and Dynamc Load Balancng n Grd Usng Ant Colony Optmzaton Sandp Kumar Goyal 1, Manpreet Sngh 1 Department of Computer

More information

ROSA: Distributed Joint Routing and Dynamic Spectrum Allocation in Cognitive Radio Ad Hoc Networks

ROSA: Distributed Joint Routing and Dynamic Spectrum Allocation in Cognitive Radio Ad Hoc Networks ROSA: Dstrbuted Jont Routng and Dynamc Spectrum Allocaton n Cogntve Rado Ad Hoc Networks Le Dng Tommaso Meloda Stella Batalama Mchael J. Medley Department of Electrcal Engneerng, State Unversty of New

More information

The Greedy Method. Introduction. 0/1 Knapsack Problem

The Greedy Method. Introduction. 0/1 Knapsack Problem The Greedy Method Introducton We have completed data structures. We now are gong to look at algorthm desgn methods. Often we are lookng at optmzaton problems whose performance s exponental. For an optmzaton

More information

VoIP Playout Buffer Adjustment using Adaptive Estimation of Network Delays

VoIP Playout Buffer Adjustment using Adaptive Estimation of Network Delays VoIP Playout Buffer Adjustment usng Adaptve Estmaton of Network Delays Mroslaw Narbutt and Lam Murphy* Department of Computer Scence Unversty College Dubln, Belfeld, Dubln, IRELAND Abstract The poor qualty

More information

Ants Can Schedule Software Projects

Ants Can Schedule Software Projects Ants Can Schedule Software Proects Broderck Crawford 1,2, Rcardo Soto 1,3, Frankln Johnson 4, and Erc Monfroy 5 1 Pontfca Unversdad Católca de Valparaíso, Chle FrstName.Name@ucv.cl 2 Unversdad Fns Terrae,

More information

1. Fundamentals of probability theory 2. Emergence of communication traffic 3. Stochastic & Markovian Processes (SP & MP)

1. Fundamentals of probability theory 2. Emergence of communication traffic 3. Stochastic & Markovian Processes (SP & MP) 6.3 / -- Communcaton Networks II (Görg) SS20 -- www.comnets.un-bremen.de Communcaton Networks II Contents. Fundamentals of probablty theory 2. Emergence of communcaton traffc 3. Stochastc & Markovan Processes

More information

End-to-end measurements of GPRS-EDGE networks have

End-to-end measurements of GPRS-EDGE networks have End-to-end measurements over GPRS-EDGE networks Juan Andrés Negrera Facultad de Ingenería, Unversdad de la Repúblca Montevdeo, Uruguay Javer Perera Facultad de Ingenería, Unversdad de la Repúblca Montevdeo,

More information

QOS DISTRIBUTION MONITORING FOR PERFORMANCE MANAGEMENT IN MULTIMEDIA NETWORKS

QOS DISTRIBUTION MONITORING FOR PERFORMANCE MANAGEMENT IN MULTIMEDIA NETWORKS QOS DISTRIBUTION MONITORING FOR PERFORMANCE MANAGEMENT IN MULTIMEDIA NETWORKS Yumng Jang, Chen-Khong Tham, Ch-Chung Ko Department Electrcal Engneerng Natonal Unversty Sngapore 119260 Sngapore Emal: {engp7450,

More information

Ad-Hoc Games and Packet Forwardng Networks

Ad-Hoc Games and Packet Forwardng Networks On Desgnng Incentve-Compatble Routng and Forwardng Protocols n Wreless Ad-Hoc Networks An Integrated Approach Usng Game Theoretcal and Cryptographc Technques Sheng Zhong L (Erran) L Yanbn Grace Lu Yang

More information

TRM-IoT: A Trust Management Model Based on Fuzzy Reputation for Internet of Things

TRM-IoT: A Trust Management Model Based on Fuzzy Reputation for Internet of Things DOI: 10.2298/CSIS110303056C TRM-IoT: A Trust Management Model Based on Fuzzy Reputaton for Internet of Thngs Dong Chen 1, Guran Chang 2, Dawe Sun 1, Jaa L 1, Je Ja 1, and Xngwe Wang 1 1 College of Informaton

More information

QoS-Aware Active Queue Management for Multimedia Services over the Internet

QoS-Aware Active Queue Management for Multimedia Services over the Internet QoS-Aware Actve Queue Management for Multmeda Servces over the Internet I-Shyan Hwang, *Bor-Junn Hwang, Pen-Mng Chang, Cheng-Yu Wang Abstract Recently, the multmeda servces such as IPTV, vdeo conference

More information

Open Access A Load Balancing Strategy with Bandwidth Constraint in Cloud Computing. Jing Deng 1,*, Ping Guo 2, Qi Li 3, Haizhu Chen 1

Open Access A Load Balancing Strategy with Bandwidth Constraint in Cloud Computing. Jing Deng 1,*, Ping Guo 2, Qi Li 3, Haizhu Chen 1 Send Orders for Reprnts to reprnts@benthamscence.ae The Open Cybernetcs & Systemcs Journal, 2014, 8, 115-121 115 Open Access A Load Balancng Strategy wth Bandwdth Constrant n Cloud Computng Jng Deng 1,*,

More information

Dynamic Pricing for Smart Grid with Reinforcement Learning

Dynamic Pricing for Smart Grid with Reinforcement Learning Dynamc Prcng for Smart Grd wth Renforcement Learnng Byung-Gook Km, Yu Zhang, Mhaela van der Schaar, and Jang-Won Lee Samsung Electroncs, Suwon, Korea Department of Electrcal Engneerng, UCLA, Los Angeles,

More information

Stochastic Protocol Modeling for Anomaly Based Network Intrusion Detection

Stochastic Protocol Modeling for Anomaly Based Network Intrusion Detection Stochastc Protocol Modelng for Anomaly Based Network Intruson Detecton Juan M. Estevez-Tapador, Pedro Garca-Teodoro, and Jesus E. Daz-Verdejo Department of Electroncs and Computer Technology Unversty of

More information

Vision Mouse. Saurabh Sarkar a* University of Cincinnati, Cincinnati, USA ABSTRACT 1. INTRODUCTION

Vision Mouse. Saurabh Sarkar a* University of Cincinnati, Cincinnati, USA ABSTRACT 1. INTRODUCTION Vson Mouse Saurabh Sarkar a* a Unversty of Cncnnat, Cncnnat, USA ABSTRACT The report dscusses a vson based approach towards trackng of eyes and fngers. The report descrbes the process of locatng the possble

More information

Performance Analysis and Comparison of QoS Provisioning Mechanisms for CBR Traffic in Noisy IEEE 802.11e WLANs Environments

Performance Analysis and Comparison of QoS Provisioning Mechanisms for CBR Traffic in Noisy IEEE 802.11e WLANs Environments Tamkang Journal of Scence and Engneerng, Vol. 12, No. 2, pp. 143149 (2008) 143 Performance Analyss and Comparson of QoS Provsonng Mechansms for CBR Traffc n Nosy IEEE 802.11e WLANs Envronments Der-Junn

More information

Joint Dynamic Radio Resource Allocation and Mobility Load Balancing in 3GPP LTE Multi-Cell Network

Joint Dynamic Radio Resource Allocation and Mobility Load Balancing in 3GPP LTE Multi-Cell Network 288 FENG LI, LINA GENG, SHIHUA ZHU, JOINT DYNAMIC RADIO RESOURCE ALLOCATION AND MOBILITY LOAD BALANCING Jont Dynamc Rado Resource Allocaton and Moblty Load Balancng n 3GPP LTE Mult-Cell Networ Feng LI,

More information

Optimization Model of Reliable Data Storage in Cloud Environment Using Genetic Algorithm

Optimization Model of Reliable Data Storage in Cloud Environment Using Genetic Algorithm Internatonal Journal of Grd Dstrbuton Computng, pp.175-190 http://dx.do.org/10.14257/gdc.2014.7.6.14 Optmzaton odel of Relable Data Storage n Cloud Envronment Usng Genetc Algorthm Feng Lu 1,2,3, Hatao

More information

Software project management with GAs

Software project management with GAs Informaton Scences 177 (27) 238 241 www.elsever.com/locate/ns Software project management wth GAs Enrque Alba *, J. Francsco Chcano Unversty of Málaga, Grupo GISUM, Departamento de Lenguajes y Cencas de

More information

A Load-Balancing Algorithm for Cluster-based Multi-core Web Servers

A Load-Balancing Algorithm for Cluster-based Multi-core Web Servers Journal of Computatonal Informaton Systems 7: 13 (2011) 4740-4747 Avalable at http://www.jofcs.com A Load-Balancng Algorthm for Cluster-based Mult-core Web Servers Guohua YOU, Yng ZHAO College of Informaton

More information

Energy Efficient Routing in Ad Hoc Disaster Recovery Networks

Energy Efficient Routing in Ad Hoc Disaster Recovery Networks Energy Effcent Routng n Ad Hoc Dsaster Recovery Networks Gl Zussman and Adran Segall Department of Electrcal Engneerng Technon Israel Insttute of Technology Hafa 32000, Israel {glz@tx, segall@ee}.technon.ac.l

More information

P2P/ Grid-based Overlay Architecture to Support VoIP Services in Large Scale IP Networks

P2P/ Grid-based Overlay Architecture to Support VoIP Services in Large Scale IP Networks PP/ Grd-based Overlay Archtecture to Support VoIP Servces n Large Scale IP Networks We Yu *, Srram Chellappan # and Dong Xuan # * Dept. of Computer Scence, Texas A&M Unversty, U.S.A. {weyu}@cs.tamu.edu

More information

A Design Method of High-availability and Low-optical-loss Optical Aggregation Network Architecture

A Design Method of High-availability and Low-optical-loss Optical Aggregation Network Architecture A Desgn Method of Hgh-avalablty and Low-optcal-loss Optcal Aggregaton Network Archtecture Takehro Sato, Kuntaka Ashzawa, Kazumasa Tokuhash, Dasuke Ish, Satoru Okamoto and Naoak Yamanaka Dept. of Informaton

More information

An MILP model for planning of batch plants operating in a campaign-mode

An MILP model for planning of batch plants operating in a campaign-mode An MILP model for plannng of batch plants operatng n a campagn-mode Yanna Fumero Insttuto de Desarrollo y Dseño CONICET UTN yfumero@santafe-concet.gov.ar Gabrela Corsano Insttuto de Desarrollo y Dseño

More information

IWFMS: An Internal Workflow Management System/Optimizer for Hadoop

IWFMS: An Internal Workflow Management System/Optimizer for Hadoop IWFMS: An Internal Workflow Management System/Optmzer for Hadoop Lan Lu, Yao Shen Department of Computer Scence and Engneerng Shangha JaoTong Unversty Shangha, Chna lustrve@gmal.com, yshen@cs.sjtu.edu.cn

More information

On the Optimal Control of a Cascade of Hydro-Electric Power Stations

On the Optimal Control of a Cascade of Hydro-Electric Power Stations On the Optmal Control of a Cascade of Hydro-Electrc Power Statons M.C.M. Guedes a, A.F. Rbero a, G.V. Smrnov b and S. Vlela c a Department of Mathematcs, School of Scences, Unversty of Porto, Portugal;

More information

ivoip: an Intelligent Bandwidth Management Scheme for VoIP in WLANs

ivoip: an Intelligent Bandwidth Management Scheme for VoIP in WLANs VoIP: an Intellgent Bandwdth Management Scheme for VoIP n WLANs Zhenhu Yuan and Gabrel-Mro Muntean Abstract Voce over Internet Protocol (VoIP) has been wdely used by many moble consumer devces n IEEE 802.11

More information

Optimal Choice of Random Variables in D-ITG Traffic Generating Tool using Evolutionary Algorithms

Optimal Choice of Random Variables in D-ITG Traffic Generating Tool using Evolutionary Algorithms Optmal Choce of Random Varables n D-ITG Traffc Generatng Tool usng Evolutonary Algorthms M. R. Mosav* (C.A.), F. Farab* and S. Karam* Abstract: Impressve development of computer networks has been requred

More information

Sciences Shenyang, Shenyang, China.

Sciences Shenyang, Shenyang, China. Advanced Materals Research Vols. 314-316 (2011) pp 1315-1320 (2011) Trans Tech Publcatons, Swtzerland do:10.4028/www.scentfc.net/amr.314-316.1315 Solvng the Two-Obectve Shop Schedulng Problem n MTO Manufacturng

More information

An agent architecture for network support of distributed simulation systems

An agent architecture for network support of distributed simulation systems An agent archtecture for network support of dstrbuted smulaton systems Robert Smon, Mark Pullen and Woan Sun Chang Department of Computer Scence George Mason Unversty Farfax, VA, 22032 U.S.A. smon, mpullen,

More information

Efficient Project Portfolio as a tool for Enterprise Risk Management

Efficient Project Portfolio as a tool for Enterprise Risk Management Effcent Proect Portfolo as a tool for Enterprse Rsk Management Valentn O. Nkonov Ural State Techncal Unversty Growth Traectory Consultng Company January 5, 27 Effcent Proect Portfolo as a tool for Enterprse

More information

A Replication-Based and Fault Tolerant Allocation Algorithm for Cloud Computing

A Replication-Based and Fault Tolerant Allocation Algorithm for Cloud Computing A Replcaton-Based and Fault Tolerant Allocaton Algorthm for Cloud Computng Tork Altameem Dept of Computer Scence, RCC, Kng Saud Unversty, PO Box: 28095 11437 Ryadh-Saud Araba Abstract The very large nfrastructure

More information

A New Paradigm for Load Balancing in Wireless Mesh Networks

A New Paradigm for Load Balancing in Wireless Mesh Networks A New Paradgm for Load Balancng n Wreless Mesh Networks Abstract: Obtanng maxmum throughput across a network or a mesh through optmal load balancng s known to be an NP-hard problem. Desgnng effcent load

More information

Self-Motivated Relay Selection for a Generalized Power Line Monitoring Network

Self-Motivated Relay Selection for a Generalized Power Line Monitoring Network Self-Motvated Relay Selecton for a Generalzed Power Lne Montorng Network Jose Cordova and Xn Wang 1, Dong-Lang Xe 2, Le Zuo 3 1 Department of Electrcal and Computer Engneerng, State Unversty of New York

More information

A probabilistic approach for predictive congestion control in wireless sensor networks

A probabilistic approach for predictive congestion control in wireless sensor networks Anne Uthra et al. / J Zhejang Unv-Sc C (Comput & Electron) 214 15(3):187-199 187 Journal of Zhejang Unversty-SCIENCE C (Computers & Electroncs) ISSN 1869-1951 (Prnt); ISSN 1869-196X (Onlne) www.zju.edu.cn/jzus;

More information

A Dynamic Load Balancing for Massive Multiplayer Online Game Server

A Dynamic Load Balancing for Massive Multiplayer Online Game Server A Dynamc Load Balancng for Massve Multplayer Onlne Game Server Jungyoul Lm, Jaeyong Chung, Jnryong Km and Kwanghyun Shm Dgtal Content Research Dvson Electroncs and Telecommuncatons Research Insttute Daejeon,

More information

Canon NTSC Help Desk Documentation

Canon NTSC Help Desk Documentation Canon NTSC Help Desk Documentaton READ THIS BEFORE PROCEEDING Before revewng ths documentaton, Canon Busness Solutons, Inc. ( CBS ) hereby refers you, the customer or customer s representatve or agent

More information

How To Classfy Onlne Mesh Network Traffc Classfcaton And Onlna Wreless Mesh Network Traffic Onlnge Network

How To Classfy Onlne Mesh Network Traffc Classfcaton And Onlna Wreless Mesh Network Traffic Onlnge Network Journal of Computatonal Informaton Systems 7:5 (2011) 1524-1532 Avalable at http://www.jofcs.com Onlne Wreless Mesh Network Traffc Classfcaton usng Machne Learnng Chengje GU 1,, Shuny ZHANG 1, Xaozhen

More information

Analysis of Energy-Conserving Access Protocols for Wireless Identification Networks

Analysis of Energy-Conserving Access Protocols for Wireless Identification Networks From the Proceedngs of Internatonal Conference on Telecommuncaton Systems (ITC-97), March 2-23, 1997. 1 Analyss of Energy-Conservng Access Protocols for Wreless Identfcaton etworks Imrch Chlamtac a, Chara

More information

Energy Conserving Routing in Wireless Ad-hoc Networks

Energy Conserving Routing in Wireless Ad-hoc Networks Energy Conservng Routng n Wreless Ad-hoc Networks Jae-Hwan Chang and Leandros Tassulas Department of Electrcal and Computer Engneerng & Insttute for Systems Research Unversty of Maryland at College ark

More information

Optmal Revocatons n Ephemeral Networks

Optmal Revocatons n Ephemeral Networks Optmal Revocatons n Ephemeral Networks: A Game-Theoretc Framework Igor Blogrevc, Mohammad Hossen Manshae, Maxm Raya and Jean-Perre Hubaux Laboratory for computer Communcatons and Applcatons (LCA1), EPFL,

More information

What is Candidate Sampling

What is Candidate Sampling What s Canddate Samplng Say we have a multclass or mult label problem where each tranng example ( x, T ) conssts of a context x a small (mult)set of target classes T out of a large unverse L of possble

More information

Preventive Maintenance and Replacement Scheduling: Models and Algorithms

Preventive Maintenance and Replacement Scheduling: Models and Algorithms Preventve Mantenance and Replacement Schedulng: Models and Algorthms By Kamran S. Moghaddam B.S. Unversty of Tehran 200 M.S. Tehran Polytechnc 2003 A Dssertaton Proposal Submtted to the Faculty of the

More information

Load Balancing By Max-Min Algorithm in Private Cloud Environment

Load Balancing By Max-Min Algorithm in Private Cloud Environment Internatonal Journal of Scence and Research (IJSR ISSN (Onlne: 2319-7064 Index Coperncus Value (2013: 6.14 Impact Factor (2013: 4.438 Load Balancng By Max-Mn Algorthm n Prvate Cloud Envronment S M S Suntharam

More information

Energy Efficient Multi Hop Clustering Protocol for Wireless Networks

Energy Efficient Multi Hop Clustering Protocol for Wireless Networks Internatonal Journal of Scentfc and Research Publcatons, Volume 2, Issue 6, June 2012 1 Energy Effcent Mult Hop Clusterng Protocol for Wreless Networks M.Shankar, G.JegaJoth, S. Karthgaven, M.Ganesan,

More information