An Architectural Framework for Ubiquitous Computing Applications
|
|
- Holly Lindsey
- 6 years ago
- Views:
Transcription
1 An Architectural Framework for Ubiquitous Computing Applications I. Koutelekos 1 Dpts. of Electronics and Automation MSc in Networking and Data Communications, T.E.I. of Piraeus, Greece, ekoutele@otenet.gr This dissertation demonstrates the term Ubiquitous computing. Although it is a very general subject, it is attempting to inform and explain how can this works and which the parameters, the elements and the ingredients are required. Ubiquitous computing nowadays and in the future will be a common concept that will integrate all forms of technological innovation and technical improvements. There is the description of the environment of a ubiquitous computing, the modelling of the applications and the users. There is also a description on how the communication is achieved among the applications as well as some methods of middleware technology which could help in developing the applications and the ubiquitous computing. Further on, there are descriptions about the CORBA, DCOM and for WEB SERVICES technologies. Lastly, a solution is presented for faster user modelling and dealing the subject of new user requirements in a system. The solution is a theoretical scenario about how to locate information and find a match to a query in order to model a user or a context using information from systems with similar specifications. This presentation requires all the systems and those which probably are going to be created to have been connected with the internet. In this way any system would exchange information helping other systems to implement with ongoing modelling.
2 Content caching contributing to the Future Internet Architecture E.Koutsourakis 1 1 Dpts. of Electronics and Automation MSc in Networking and Data Communications, T.E.I. of Piraeus, Greece, Hellas Tel: , Fax: , dc-284@stef.teipir.gr, evko@mycosmos.gr In nowadays, the wide popularity of the Internet is a fact. This results to increased demands on infrastructure and direct response to end user s high premises. Fast Internet, as a mean to fast response time, no extensive delays by the side of the everyday user and good operative and maintenance conditions from the part of content management, is a dynamic and competitive issue. At this paper there will be an approach to content delivery networks from the beginning. A short look on the main protocols that are used in these networks will be performed; also the techniques that are used for the delivery of the content from source to destination will be approached and studied. There is a practical part that uses mainly the program OPNET IT GURU Academic edition for the evaluation of specific metrics. It is a suitable program for academic research that gives an analysis of a case study not necessarily implemented in real world but popularly used for experimental and testing purposes based on theoretical principles and facts. Keywords: Content, delivery, internet, delays.
3 Incident Identification System Based on Mobile Devices A. Latsas 1 1 Dpts. of Electronics and Automation MSc in Networking and Data Communications, T.E.I. of Piraeus, Greece, dc-285@stef.teipir.gr In this paper an incident identification system is proposed. The system is consisted of a web based platform and mobile clients. Such a system could be used for detection of emergency events such as forest fires. It combines information from different users about a specific event, trying to locate it fast and accurately on the map. The incident location is assumed to be known only by approximation from the user's perspective. The system combines incident reports sent from the mobile clients and then analyzes them using a detection algorithm in order to locate the actual incident location.
4 OBJECTIVE IMAGE QUALITY ASSESSMENT Mazi Spyridoula 1 T.E.I. of Piraeus, Greece, spyllam@gmail.com In multimedia communications the image quality is the most important factor of Quality of Experience (QoE). The quality is being measured using two methods: objective metrics which use algorithms and subjective metrics which use human evaluation. In this project the main types of objective image quality assessment [Peak Signal-to-Noise Ratio (PSNR), Structural Similarity Index Measure (SSIM) and Video Quality Metrics (VQM)] are about to be analysed compared to the main types of subjective metrics. It is also proved that if someone adapts the features of Human Vision System (HVS) in objective metrics then results can predict subjective scores. Finally, a new type of objective metrics is suggested which is called hybrid metrics and is being used especially in real-life applications. Index Terms Quality of Experience (QoE), Peak Signal-to-Noise Ratio (PSNR), Structural Similarity Index Measure (SSIM), Video Quality Metrics (VQM), Subjective Quality Assessment, Human Vision System (HVS), Hybrid Objective Metrics.
5 WEB SERVICES ORCHESTRATION IN SERVICE- ORIENTED ARCHITECTURE (SOA) ENVIRONMENTS T. Nikolakopoulou 1 T.E.I. of Piraeus, Greece, theoninikol2@gmail.com In this paper we present Web Services Orchestration in Service-Oriented Architecture (SOA) Environments. Firstly, presents the SOA [1] concept and the basic details of technology. Additionally, in next section that examines the Web Services[3] technology. Moreover, in next section that presents and analyzes the basic concept of "Orchestration" and it studies the most common language that is being used by Web Services, that is BPEL[13]. Furthermore, in last chapter, that refers to an orchestration methodology where we present and analyze an event-driven implementation of the service orchestration engine which is built upon the event architecture and join patterns. 5
6 Operational Principles and Performance Evaluation of Routing Techniques in Wireless Sensor Networks A. Papageorgiou T.E.I. of Piraeus, Greece, WSNs are the key due to recent technological advances. Many routing protocols have been specifically designed for wireless sensor networks. In this thesis some of the routing techniques outline and present a survey of state-of-the-art in WSNs. Zigbee routing protocol is discussed in detail about its architecture, features and functionalities. The focus however, has been given to zigbee network analysis in a theoretical and not only survey. Furthermore, the above mentioned theoretical study is combined with a lab experiment. Overall, this project highlights the performance issues and conclusions as well possible future research areas. 6
7 DATABASE SECURITY ANALYSIS AND TESTING Piperakis Charalampos T.E.I. of Piraeus, Greece, It is widely known that database security is the number one issue regarding web applications as the protection of data field is critical. Specifically due to the growth of networks organizations share their data through the internet and that appears to have both advantages and disadvantages. The advantages stand for the easiness of communication and exchange of data on the other hand appears to be the most vulnerable environment for databases. In this paper is described as wel as implemented one of the most common attacks in databases which is sql injection. The implementation is done with use of automated tools which are widely known as penetration tools. 7
8 Analysis of a video compression algorithm M. Plakia 1 T.E.I. of Piraeus, Greece, mplakia@gmail.com In this paper we study the effects of MPEG compression on the digital video quality. Initially there is an introduction to the MPEG compression standard, and in particular the MPEG-1, MPEG-2 and MPEG-3 standards are presented. Section 3 describes the method of motion estimation which is used at video digitization and the block matching algorithms which were developed to fulfill the operation of motion estimation. Finally, in section 4 the MATLAB code of the PSNR algorithm, which is used for the objective quality assessment of the compressed digital video is described. Moreover, a MATLAB code is analyzed for the evaluation of MPEG video compression using motion estimation. By this way we tried to conduct some PSNR results, of the Exhaustive Search, the Three Step Search, the Diamond Search and the Adaptive Root Pattern Search algorithm. 8
9 Experimental performance study of the IEEE MAC layer Dimitrios Sakavalas 1 T.E.I. of Piraeus, Greece, sakavalas@gmail.com Zigbee wireless sensors networks WSNs are a new upcoming technology that combines very good performance with low rate, and first are setting up for use on industry. Other sectors in which the WSNs are used, are smart energy, health care, telecom services, smart buildings, internet of things etc. The WSNs make use of the ZigBee protocol (APS, Zigbee NWK, ZDO) that is the higher layer for communication combined with the IEEE protocol (MAC layer, PHY layer). This technology has to overcome some critical obstacles such as power consumption, network robustness and scalability, throughput rate, security, that are some of the critical performance parameters of the network. IEEE MAC layer protocol is the core layer of WSNs and it performance plays a significant role in terms of determining the network performance parameters that mentioned above. In this thesis, the project aims to present the operational principles of MAC layer protocol from the slotted CSMA/CA viewpoint, which is currently adapted in ZigBee Wireless Sensor Networks. 9
10 Modulation formats for optical fiber transmission Aggeliki Thomopoulou In the past years there has been a wide improvement in the field of optical communications motivated by the higher demand of bandwidth due to the increase of data traffic. Thus, alternative modulation formats have been employed in order to enhance the impairments of traditional modulation formats like the on-off keying in either non-return to zero (NRZ) and return to zero (RZ) formats. The growing requirement of achieving higher bit rates and improve the spectral efficiency of optical transmission systems, has opened the door to new advanced modulation formats which carry the information both in their optical amplitude and phase, in order to enhance the robustness to chromatic dispersion, optical filtering and nonlinearities. The purpose of this project is to review wellestablished technologies and current trends in the optical modulation formats. For this reason, the properties of the optical fibers will be studied along with the components that modern optical communication systems consist of. Following, the performance of the traditional amplitude modulation formats will be thoroughly examined and then the alternative modulation formats (for example AMI, CRZ, CSRZ, PSK, DPSK, QPSK) will be introduced; the emphasis on the latter will be placed in their relative performance boost to the former. This study will conclude with a comparison of the presented modulation formats in terms of their complexity and required bandwidth 10
11 Cross layer design for wireless video transmission panorama of approaches C. Dounis 1, A. Papadakis 2 T.E.I. of Piraeus, Greece, dounisharris@yahoo.gr 2 Dpts. of Electronics and Automation MSc in Networking and Data Communications, T.E.I. of Piraeus, Greece, andreas.papadakis@gmail.com CDN architectures perform content replication caching (mainly at the edges of the network). Content Distribution Networks consist of groups of intermediate servers (Proxy-servers) placed in key positions on the Internet. In parallel, the Internet of the Future is tightly coupled with the Cloud. The Cloud comprises of distributed data centers, which offer economies of scale, and cheaper computing resources. In the current paper we present a comparative analysis of business models in the area of content distribution, namely models used by content distributors, who are responsible for the operation of the CDN. The goal is to study how robust and effective is the solution of using the Cloud for content replication and distribution. 11
12 Information Centric Networking: Investigating the future of internet and its applications. Pavlakis Demosthenis 1 T.E.I. of Piraeus, Greece, demosthenes_p@hotmail.com 12
13 Operational Principles and Performance Evaluation of Routing Techniques in Wireless Sensor Networks, A. Papageorgiou, S. Savvaidis 13
6th International Workshop on OMNeT++
6th International Workshop on OMNeT++ An OMNeT++ Framework to Evaluate Video Transmission in Mobile Wireless Multimedia Sensor Networks Denis Rosário, Zhongliang Zhao, Claudio Silva, Eduardo Cerqueira,
More informationPerformance Evaluation of AODV and DSDV Routing Protocol in wireless sensor network Environment
2012 International Conference on Computer Networks and Communication Systems (CNCS 2012) IPCSIT vol.35(2012) (2012) IACSIT Press, Singapore Performance Evaluation of AODV and DSDV Routing Protocol in wireless
More informationHeader Compression Capacity Calculations for Wireless Networks
Header Compression Capacity Calculations for Wireless Networks Abstract Deployment of wireless transport in a data-centric world calls for a fresh network planning approach, requiring a balance between
More informationA Hybrid Communication Architecture for Internet of Things (IOT) Application in Smart Grid
A Hybrid Communication Architecture for Internet of Things (IOT) Application in Smart Grid Yijia Cao Hunan University, China 2014-10 10-21 OUTLINE 1 IOT Application in Smart Grid 2 3 Requirements for Communication
More informationA Secure and Dynamic Multi-keyword Ranked Search Scheme over Encrypted Cloud Data
An Efficient Privacy-Preserving Ranked Keyword Search Method Cloud data owners prefer to outsource documents in an encrypted form for the purpose of privacy preserving. Therefore it is essential to develop
More information2. LITERATURE REVIEW. Performance Evaluation of Ad Hoc Networking Protocol with QoS (Quality of Service)
2. LITERATURE REVIEW I have surveyed many of the papers for the current work carried out by most of the researchers. The abstract, methodology, parameters focused for performance evaluation of Ad-hoc routing
More informationStandardization Activities in ITU-T
Standardization Activities in ITU-T Nozomu NISHINAGA and Suyong Eum Standardization activities for Future Networks in ITU-T have produced 19 Recommendations since it was initiated in 2009. The brief history
More informationChapter 1 Introduction
Chapter 1 Introduction 1.1 Background Today s mobile device supports a variety of multimedia applications such as live video, radio or online gaming. People spend their time on their devices for personal
More informationMobile Cloud Multimedia Services Using Enhance Blind Online Scheduling Algorithm
Mobile Cloud Multimedia Services Using Enhance Blind Online Scheduling Algorithm Saiyad Sharik Kaji Prof.M.B.Chandak WCOEM, Nagpur RBCOE. Nagpur Department of Computer Science, Nagpur University, Nagpur-441111
More informationAnalysis and Comparison of DSDV and NACRP Protocol in Wireless Sensor Network
Analysis and Comparison of and Protocol in Wireless Sensor Network C.K.Brindha PG Scholar, Department of ECE, Rajalakshmi Engineering College, Chennai, Tamilnadu, India, brindhack@gmail.com. ABSTRACT Wireless
More informationChapter 2. Literature Survey. 2.1 Remote access technologies
Chapter 2 Literature Survey This chapter presents a brief report on literature reviewed in context to present work with an aim to identify current state of research in the domain. Literature review is
More informationProactive-Caching based Information Centric Networking Architecture for Reliable Green Communication in ITS
ITU Kaleidoscope 2015 Trust in the Information Society Proactive-Caching based Information Centric Networking Architecture for Reliable Green Communication in ITS Presenter: Prof. PhD. Takuro SATO Waseda
More informationCROSS LAYER PROTOCOL (APTEEN) USING WSN FOR REAL TIME APPLICATION
CROSS LAYER PROTOCOL (APTEEN) USING WSN FOR REAL TIME APPLICATION V. A. Dahifale 1, N. Y. Siddiqui 2 PG Student, College of Engineering Kopargaon, Maharashtra, India 1 Assistant Professor, College of Engineering
More informationA NEW APPROACH FOR BROADBAND BACKUP LINK TO INTERNET IN CAMPUS NETWORK ENVIRONMENT
A NEW APPROACH FOR BROADBAND BACKUP LINK TO INTERNET IN CAMPUS NETWORK ENVIRONMENT Mohd Nazri Ismail Faculty of MIIT, University of Kuala Lumpur (UniKL), MALAYSIA, mnazrii@miit.unikl.edu.my Abstract Most
More informationChapter 7 CONCLUSION
97 Chapter 7 CONCLUSION 7.1. Introduction A Mobile Ad-hoc Network (MANET) could be considered as network of mobile nodes which communicate with each other without any fixed infrastructure. The nodes in
More informationITEE Journal. Information Technology & Electrical Engineering
An Overview of QoE for 5G Networks 1 Hajra Masood, 2 Safdar Rizvi, 3 Bilal Muhammad Iqbal Department of Computer Sciences, Bahria University, Karachi, Pakistan E-mail: 1 Hajra.cs@gmail.com, 2 dr.safdar@bimcs.edu.pk,
More informationAn Industrial Employee Development Application Protocol Using Wireless Sensor Networks
RESEARCH ARTICLE An Industrial Employee Development Application Protocol Using Wireless Sensor Networks 1 N.Roja Ramani, 2 A.Stenila 1,2 Asst.professor, Dept.of.Computer Application, Annai Vailankanni
More informationIntroduction to Mobile Ad hoc Networks (MANETs)
Introduction to Mobile Ad hoc Networks (MANETs) 1 Overview of Ad hoc Network Communication between various devices makes it possible to provide unique and innovative services. Although this inter-device
More informationFORTIKA - Cyber Security Accelerator for trusted SMEs IT Ecosystems THE PROJECT
PROJECT ANNOUNCEMENT FORTIKA - Cyber Security Accelerator for trusted SMEs IT Ecosystems THE PROJECT The FORTIKA project aims to provide SMEs with an embedded, smart and robust hardware security layer
More informationUNIVERSITY OF CAGLIARI
UNIVERSITY OF CAGLIARI DIEE - Department of Electrical and Electronic Engineering Infrastrutture ed Applicazioni Avanzate nell Internet NFV ACK: content taken from Foundations of Modern Networking, SDN,
More informationUdaipur, Rajasthan, India. University, Udaipur, Rajasthan, India
ROLE OF NETWORK VIRTUALIZATION IN CLOUD COMPUTING AND NETWORK CONVERGENCE 1 SHAIKH ABDUL AZEEM, 2 SATYENDRA KUMAR SHARMA 1 Research Scholar, Department of Computer Science, Pacific Academy of Higher Education
More informationQoS Routing By Ad-Hoc on Demand Vector Routing Protocol for MANET
2011 International Conference on Information and Network Technology IPCSIT vol.4 (2011) (2011) IACSIT Press, Singapore QoS Routing By Ad-Hoc on Demand Vector Routing Protocol for MANET Ashwini V. Biradar
More informationPerformance analysis of Internet applications over an adaptive IEEE MAC architecture
Journal of the Franklin Institute 343 (2006) 352 360 www.elsevier.com/locate/jfranklin Performance analysis of Internet applications over an adaptive IEEE 802.11 MAC architecture Uthman Baroudi, Mohammed
More informationIntroduction to Distributed Systems
Introduction to Distributed Systems Other matters: review of the Bakery Algorithm: why can t we simply keep track of the last ticket taken and the next ticvket to be called? Ref: [Coulouris&al Ch 1, 2]
More informationGSM Based Comparative Investigation of Hybrid Routing Protocols in MANETS
IOSR Journal of Electronics and Communication Engineering (IOSR-JECE) e-issn: 2278-2834,p- ISSN: 2278-8735.Volume 9, Issue 3, Ver. II (May - Jun. 214), PP 82-86 GSM Based Comparative Investigation of Hybrid
More informationExperience. A New Modular E-Learning Platform Integrating an Enhanced Multimedia. Doctoral Program in Computer and Control Engineering (XXX Cycle)
Doctoral Program in Computer and Control Engineering (XXX Cycle) A New Modular E-Learning Platform Integrating an Enhanced Multimedia Experience Candidate: Leonardo Favario Supervisor: Prof. Enrico Masala
More informationPrice Performance Analysis of NxtGen Vs. Amazon EC2 and Rackspace Cloud.
Price Performance Analysis of Vs. EC2 and Cloud. Performance Report: ECS Performance Analysis of Virtual Machines on ECS and Competitive IaaS Offerings An Examination of Web Server and Database Workloads
More informationZigbee Routing Opnet Simulation for a Wireless Sensors Network
Zigbee Routing Opnet Simulation for a Wireless Sensors Network Duvvi Divya Department of Computer Science and Engineering Baba Institute of Technology and Sciences, Visakhapatnam, Andhra Pradesh- 530048,
More informationChapter 8 OSI Physical Layer
Chapter 8 OSI Physical Layer Upper OSI layer protocols prepare data from the human network for transmission to its destination. The Physical layer controls how data is placed on the communication media.
More informationFRONT-HAUL COMPRESSION FOR EMERGING C- RAN AND SMALL CELL NETWORKS
FRONT-HAUL COMPRESSION FOR EMERGING C- RAN AND SMALL CELL NETWORKS April 29, 2013 6024 Silver Creek Valley Road, San Jose, California 95138 Telephone: (408) 284-8200 Fax: (408) 284-3572 2013 OVERVIEW This
More informationBuilding a Profitable Data Future. Monetizing Data Traffic
Building a Profitable Data Future Monetizing Data Traffic Market Introduction Driven by an upsurge in smartphone usage, increased mobile-broadband penetration and enormous growth in video consumption,
More informationMotion Estimation. Original. enhancement layers. Motion Compensation. Baselayer. Scan-Specific Entropy Coding. Prediction Error.
ON VIDEO SNR SCALABILITY Lisimachos P. Kondi, Faisal Ishtiaq and Aggelos K. Katsaggelos Northwestern University Dept. of Electrical and Computer Engineering 2145 Sheridan Road Evanston, IL 60208 E-Mail:
More informationCo-creation for Success
SAP SAPPHIRE NOW 2018 Orlando, June 5-7, 2018 Human Centric Innovation Co-creation for Success 0 2018 FUJITSU Fujitsu Hybrid IT Conduit for Digital Transformation Orlando, June 5-7, 2018 Human Centric
More informationPrioritization scheme for QoS in IEEE e WLAN
Prioritization scheme for QoS in IEEE 802.11e WLAN Yakubu Suleiman Baguda a, Norsheila Fisal b a,b Department of Telematics & Communication Engineering, Faculty of Electrical Engineering Universiti Teknologi
More informationTHE STATE OF IT TRANSFORMATION FOR RETAIL
THE STATE OF IT TRANSFORMATION FOR RETAIL An Analysis by Dell EMC and VMware Dell EMC and VMware are helping IT groups at retail organizations transform to business-focused service providers. The State
More informationBSc (Honours) Computer Science Curriculum Outline
BSc (Honours) Computer Science Curriculum Outline 1. Introduction: The economic and strategic importance provided by Computer Science and Information Technology is increasing daily. This importance is
More informationA Comparison of Still-Image Compression Standards Using Different Image Quality Metrics and Proposed Methods for Improving Lossy Image Quality
A Comparison of Still-Image Compression Standards Using Different Image Quality Metrics and Proposed Methods for Improving Lossy Image Quality Multidimensional DSP Literature Survey Eric Heinen 3/21/08
More informationA Firewall Architecture to Enhance Performance of Enterprise Network
A Firewall Architecture to Enhance Performance of Enterprise Network Hailu Tegenaw HiLCoE, Computer Science Programme, Ethiopia Commercial Bank of Ethiopia, Ethiopia hailutegenaw@yahoo.com Mesfin Kifle
More informationInternational Journal of Emerging Technology and Advanced Engineering Website: (ISSN , Volume 2, Issue 4, April 2012)
A Technical Analysis Towards Digital Video Compression Rutika Joshi 1, Rajesh Rai 2, Rajesh Nema 3 1 Student, Electronics and Communication Department, NIIST College, Bhopal, 2,3 Prof., Electronics and
More informationVolume 1, Number 1, 2015 Pages Jordan Journal of Electrical Engineering ISSN (Print): , ISSN (Online):
JJEE Volume 1, Number 1, 2015 Pages 45-54 Jordan Journal of Electrical Engineering ISSN (Print): 2409-9600, ISSN (Online): 2409-9619 Performance Evaluation for Large Scale Star Topology IEEE 802.15.4 Based
More informationOUR VISION To be a global leader of computing research in identified areas that will bring positive impact to the lives of citizens and society.
Join the Innovation Qatar Computing Research Institute (QCRI) is a national research institute established in 2010 by Qatar Foundation for Education, Science and Community Development. As a primary constituent
More informationA Case Study on Cloud Based Hybrid Adaptive Mobile Streaming: Performance Evaluation
A Case Study on Cloud Based Hybrid Adaptive Mobile Streaming: Performance Evaluation T. Mahesh kumar 1, Dr. k. Santhisree 2, M. Bharat 3, V. Pruthvi Chaithanya Varshu 4 Student member of IEEE, M. tech
More informationBroadcast-Quality, High-Density HEVC Encoding with AMD EPYC Processors
Solution Brief December, 2018 2018 Broadcast-Quality, High-Density HEVC Encoding with AMD EPYC Processors HIGHLIGHTS o The AMD EPYC SoC brings a new balance to the datacenter. Utilizing an x86-architecture,
More informationSmart Buildings as Cyber- Physical Systems (CPS) In Smart Cities: Living Building
Smart Buildings as Cyber- Physical Systems (CPS) In Smart Cities: Living Building Dr. Driss Benhaddou Associate Professor and Fulbright Scholar University of Houston, TX dbenhaddou@uh.edu Tuesday, 01/05/2016
More informationA Proposed Framework for Testing Mobile Cloud Based Applications Using Mobile Testing as a Service (MTaaS)
A Proposed Framework for Mobile Cloud Based Applications Using Mobile as a Service (MTaaS) Engr. Ali Ahmed Computer & Software Engineering Department Bahria University, Karachi Campus Karachi, Pakistan
More informationStudy and Analysis of Routing Protocols RIP and DSR Using Qualnet V5
Study and Analysis of Routing Protocols RIP and DSR Using Qualnet V5 Nallamalla Anusha Department of Computer Science and Engineering Baba Institute of Technology and Sciences, Visakhapatnam, Andhra Pradesh-
More informationOptical networking technology
1 Optical networking technology Technological advances in semiconductor products have essentially been the primary driver for the growth of networking that led to improvements and simplification in the
More informationModule 1. Introduction. Version 2, CSE IIT, Kharagpur
Module 1 Introduction Version 2, CSE IIT, Kharagpur Introduction In this module we shall highlight some of the basic aspects of computer networks in two lessons. In lesson 1.1 we shall start with the historical
More informationA Study on Issues Associated with Mobile Network
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 9, September 2014,
More informationPerformance Evaluation of CoAP and UDP using NS-2 for Fire Alarm System
Indian Journal of Science and Technology, Vol 9(20), DOI: 10.17485/ijst/2016/v9i20/92603, May 2016 ISSN (Print) : 0974-6846 ISSN (Online) : 0974-5645 Performance Evaluation of CoAP and UDP using NS-2 for
More information2017 2nd International Conference on Communications, Information Management and Network Security (CIMNS 2017) ISBN:
2017 2nd International Conference on Communications, Information Management and Network Security (CIMNS 2017) ISBN: 978-1-60595-498-1 Vulnerability Scanning System Used in the Internet of Things for Intelligent
More informationIT4405 Computer Networks (Compulsory)
IT4405 Computer Networks (Compulsory) INTRODUCTION This course provides a comprehensive insight into the fundamental concepts in data communications, computer network systems and protocols both fixed and
More informationINTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY
INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY A PATH FOR HORIZING YOUR INNOVATIVE WORK COMPARISON OF MANET REACTIVE ROUTING PROTOCOLS USING OPNET SIMULATOR SANGEETA MONGA
More informationAn Cross Layer Collaborating Cache Scheme to Improve Performance of HTTP Clients in MANETs
An Cross Layer Collaborating Cache Scheme to Improve Performance of HTTP Clients in MANETs Jin Liu 1, Hongmin Ren 1, Jun Wang 2, Jin Wang 2 1 College of Information Engineering, Shanghai Maritime University,
More informationCSMA based Medium Access Control for Wireless Sensor Network
CSMA based Medium Access Control for Wireless Sensor Network H. Hoang, Halmstad University Abstract Wireless sensor networks bring many challenges on implementation of Medium Access Control protocols because
More informationMOBILITY REACTIVE FRAMEWORK AND ADAPTING TRANSMISSION RATE FOR COMMUNICATION IN ZIGBEE WIRELESS NETWORKS
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 3, March 2014,
More informationA Comparative study of On-Demand Data Delivery with Tables Driven and On-Demand Protocols for Mobile Ad-Hoc Network
A Comparative study of On-Demand Data Delivery with Tables Driven and On-Demand Protocols for Mobile Ad-Hoc Network Humayun Bakht Research Fellow, London School of Commerce, United Kingdom humayunbakht@yahoo.co.uk
More informationTrends and Challenges We now live in a data-driven economy A recent Gartner report discussing NetOps 2.0 stated, NetOps teams must embrace practices a
Solution Overview Cisco Tetration Analytics and ExtraHop: Real-Time Analytics for Security Policy Enforcement Take fast action against threats like ransomware and brute-force login attempts by combining
More informationPower Transmission and Distribution Monitoring using Internet of Things (IoT) for Smart Grid
IOP Conference Series: Materials Science and Engineering PAPER OPEN ACCESS Power Transmission and Distribution Monitoring using Internet of Things (IoT) for Smart Grid To cite this article: N A Hidayatullah
More informationFlexible networks for Beyond 4G Lauri Oksanen Head of Research Nokia Siemens Networks
Flexible networks for Beyond 4G Lauri Oksanen Head of Research Nokia Siemens Networks 1 Nokia Siemens Networks 2012 Key requirements towards 2020 Support up to 1000 times more traffic Manage up to 10 times
More informationA Framework for Source Code metrics
A Framework for Source Code metrics Neli Maneva, Nikolay Grozev, Delyan Lilov Abstract: The paper presents our approach to the systematic and tool-supported source code measurement for quality analysis.
More informationNew Technologies and Services: Change and Convergence
ITU-D Regional Development Forums 2010 on NGN and Broadband (ARB, EUR & CIS Regions): NGN and Broadband, Opportunities and Challenges New Technologies and Services: Change and Convergence John Visser,
More informationMulti-path Forward Error Correction Control Scheme with Path Interleaving
Multi-path Forward Error Correction Control Scheme with Path Interleaving Ming-Fong Tsai, Chun-Yi Kuo, Chun-Nan Kuo and Ce-Kuen Shieh Department of Electrical Engineering, National Cheng Kung University,
More informationIntegration of Wireless Sensor Network Services into other Home and Industrial networks
Integration of Wireless Sensor Network Services into other Home and Industrial networks using Device Profile for Web Services (DPWS) Ayman Sleman Automation and Process Control Engineering, University
More informationCommunication Models in Internet of Things: A Survey
IJSTE - International Journal of Science Technology & Engineering Volume 3 Issue 11 May 2017 ISSN (online): 2349-784X Communication Models in Internet of Things: A Survey Santosh Kulkarni Lecturer Department
More informationSUMMERY, CONCLUSIONS AND FUTURE WORK
Chapter - 6 SUMMERY, CONCLUSIONS AND FUTURE WORK The entire Research Work on On-Demand Routing in Multi-Hop Wireless Mobile Ad hoc Networks has been presented in simplified and easy-to-read form in six
More informationDEPLOYMENT OF OPTIMIZED ALGORITHM FOR MPEG-4 DATA OVER WIRELESS MULTIMEDIA SENSOR NETWORK
DEPLOYMENT OF OPTIMIZED ALGORITHM FOR MPEG-4 DATA OVER WIRELESS MULTIMEDIA SENSOR NETWORK Norlezah Hashim 1, Sharifah Hafizah Syed Ariffin 2, Farizah Yunus 2, Fakrulradzi Idris 3 and Norsheila Fisal 2
More informationCHAPTER 5 CONCLUSION AND SCOPE FOR FUTURE EXTENSIONS
130 CHAPTER 5 CONCLUSION AND SCOPE FOR FUTURE EXTENSIONS 5.1 INTRODUCTION The feasibility of direct and wireless multi-hop V2V communication based on WLAN technologies, and the importance of position based
More informationClient-server Basics. 1. Motivation
Page 1 of 8 Client-server Basics Oxford Brookes University 2004 Contents 1. Motivation 2. Basic Model of the Web 3. Extensions - Caching and Proxies 4. High Performance Web Servers 5. Web Services Appendices
More informationFault-Aware Flow Control and Multi-path Routing in Wireless Sensor Networks
Fault-Aware Flow Control and Multi-path Routing in Wireless Sensor Networks X. Zhang, X. Dong Shanghai Jiaotong University J. Wu, X. Li Temple University, University of North Carolina N. Xiong Colorado
More informationPerformance Analysis of MANET Using Efficient Power Aware Routing Protocol (EPAR)
Performance Analysis of MANET Using Efficient Power Aware Routing Protocol (EPAR) Amandeep Kaur 1, Jasmeet Kaur 2, Nishu Kansal 3 1, 2, 3 (ECE, Guru Nanak Dev Engineering College Ludhiana, India) ABSTRACT:
More informationZigbee- Effect of Zigbee End Devices Failure on Hybrid Topology by using Different Trajectories
e t International Journal on Emerging Technologies (Special Issue on RTIESTM-2016) 7(1): 33-40(2016) ISSN No. (Print) : 0975-8364 ISSN No. (Online) : 2249-3255 Zigbee- Effect of Zigbee End Devices Failure
More informationPervasive and Mobile Computing. Dr. Atiq Ahmed. Introduction Network Definitions Network Technologies Network Functions 1/38
Department of Computer Science & Information Technology University of Balochistan Course Objectives To discuss the fundamental problems in the emerging area of mobile and pervasive computing, along with
More informationSimulation Analysis of Tree and Mesh Topologies in Zigbee Network
Vol.8, No.1 (2015), pp.81-92 http://dx.doi.org/10.14257/ijgdc.2015.8.1.08 Simulation Analysis of Tree and Mesh Topologies in Zigbee Network Manpreet, Jyoteesh Malhotra CSE Department Guru Nanak Dev University
More informationIntrusion Detection System For Denial Of Service Flooding Attacks In Sip Communication Networks
Intrusion Detection System For Denial Of Service Flooding Attacks In Sip Communication Networks So we are proposing a network intrusion detection system (IDS) which uses a Keywords: DDoS (Distributed Denial
More informationIntel: Driving the Future of IT Technologies. Kevin C. Kahn Senior Fellow, Intel Labs Intel Corporation
Research @ Intel: Driving the Future of IT Technologies Kevin C. Kahn Senior Fellow, Intel Labs Intel Corporation kp Intel Labs Mission To fuel Intel s growth, we deliver breakthrough technologies that
More informationWSN Routing Protocols
WSN Routing Protocols 1 Routing Challenges and Design Issues in WSNs 2 Overview The design of routing protocols in WSNs is influenced by many challenging factors. These factors must be overcome before
More informationInvestigating the Impact of Topologies on the Performance of ZIGBEE Wireless Sensor Networks
Investigating the Impact of Topologies on the Performance of 802.15.4 ZIGBEE Wireless Sensor Networks D. Deepika 1 and Prof. S. Pallam Setty 2 1 M.tech, Department of Computer Science and Systems Engineering,
More informationTable of Contents Table of Contents...2 Introduction...3 Mission of IT...3 Primary Service Delivery Objectives...3 Availability of Systems...
Table of Contents Table of Contents...2 Introduction...3 Mission of IT...3 Primary Service Delivery Objectives...3 Availability of Systems...3 Improve Processes...4 Innovation...4 IT Planning & Alignment
More informationOn User-centric QoE Prediction for VoIP & Video Streaming based on Machine-Learning
UNIVERSITY OF CRETE On User-centric QoE Prediction for VoIP & Video Streaming based on Machine-Learning Michalis Katsarakis, Maria Plakia, Paul Charonyktakis & Maria Papadopouli University of Crete Foundation
More informationYOUR APPLICATION S JOURNEY TO THE CLOUD. What s the best way to get cloud native capabilities for your existing applications?
YOUR APPLICATION S JOURNEY TO THE CLOUD What s the best way to get cloud native capabilities for your existing applications? Introduction Moving applications to cloud is a priority for many IT organizations.
More informationNodes Energy Conserving Algorithms to prevent Partitioning in Wireless Sensor Networks
IJCSNS International Journal of Computer Science and Network Security, VOL.17 No.9, September 2017 139 Nodes Energy Conserving Algorithms to prevent Partitioning in Wireless Sensor Networks MINA MAHDAVI
More informationDelay Performance of Multi-hop Wireless Sensor Networks With Mobile Sinks
Delay Performance of Multi-hop Wireless Sensor Networks With Mobile Sinks Aswathy M.V & Sreekantha Kumar V.P CSE Dept, Anna University, KCG College of Technology, Karappakkam,Chennai E-mail : aswathy.mv1@gmail.com,
More informationNo-reference perceptual quality metric for H.264/AVC encoded video. Maria Paula Queluz
No-reference perceptual quality metric for H.264/AVC encoded video Tomás Brandão Maria Paula Queluz IT ISCTE IT IST VPQM 2010, Scottsdale, USA, January 2010 Outline 1. Motivation and proposed work 2. Technical
More informationClosing the Hybrid Cloud Security Gap with Cavirin
Enterprise Strategy Group Getting to the bigger truth. Solution Showcase Closing the Hybrid Cloud Security Gap with Cavirin Date: June 2018 Author: Doug Cahill, Senior Analyst Abstract: Most organizations
More informationVersion 11
The Big Challenges Networked and Electronic Media European Technology Platform The birth of a new sector www.nem-initiative.org Version 11 1. NEM IN THE WORLD The main objective of the Networked and Electronic
More informationPerformance Analysis of Virtual Machines on NxtGen ECS and Competitive IaaS Offerings An Examination of Web Server and Database Workloads
Performance Report: ECS Performance Analysis of Virtual Machines on ECS and Competitive IaaS Offerings An Examination of Web Server and Database Workloads April 215 EXECUTIVE SUMMARY commissioned this
More informationStructural Similarity Based Image Quality Assessment Using Full Reference Method
From the SelectedWorks of Innovative Research Publications IRP India Spring April 1, 2015 Structural Similarity Based Image Quality Assessment Using Full Reference Method Innovative Research Publications,
More informationFLEXING NEXT GENERATION OPTICAL MUSCLES
FLEXING NEXT GENERATION OPTICAL MUSCLES A Perspective on Flexi-rate Innovation and True 400G From high-capacity data center connectivity to LTE-enabled mobility, the foundation of our modern communications
More informationAlma Mater Studiorum University of Bologna CdS Laurea Magistrale (MSc) in Computer Science Engineering
Mobile Systems M Alma Mater Studiorum University of Bologna CdS Laurea Magistrale (MSc) in Computer Science Engineering Mobile Systems M course (8 ECTS) II Term Academic Year 2016/2017 08 Application Domains
More informationComparison of TDMA based Routing Protocols for Wireless Sensor Networks-A Survey
Comparison of TDMA based Routing Protocols for Wireless Sensor Networks-A Survey S. Rajesh, Dr. A.N. Jayanthi, J.Mala, K.Senthamarai Sri Ramakrishna Institute of Technology, Coimbatore ABSTRACT One of
More informationA Survey on an Energy-Efficient and Energy-Balanced Routing Protocol for Wireless Sensor Networks
sensors Article A Survey on an Energy-Efficient and Energy-Balanced Routing Protocol for Wireless Sensor Networks Olayinka O. Ogundile 1, * and Attahiru S. Alfa 1,2 1 Department of Electrical, Electronic
More informationContinuous auditing certification
State of the Art in cloud service certification Cloud computing has emerged as the de-facto-standard when it comes to IT delivery. It comes with many benefits, such as flexibility, cost-efficiency and
More informationData centers control: challenges and opportunities
1 Data centers control: challenges and opportunities Damiano Varagnolo Luleå University of Technology Aug. 24th, 2015 First part: what is a datacenter and what is its importance in our society Data centers
More information2018 Trends in Hosting & Cloud Managed Services
PREVIEW 2018 Trends in Hosting & Cloud Managed Services DEC 2017 Rory Duncan, Research Director, Managed Services & Hosting Penny Jones, Principal Analyst - MTDC & Managed Services Aaron Sherrill, Senior
More informationADAPTIVE VIDEO STREAMING FOR BANDWIDTH VARIATION WITH OPTIMUM QUALITY
ADAPTIVE VIDEO STREAMING FOR BANDWIDTH VARIATION WITH OPTIMUM QUALITY Joseph Michael Wijayantha Medagama (08/8015) Thesis Submitted in Partial Fulfillment of the Requirements for the Degree Master of Science
More informationZhiyuan Tan, F. Richard Yu, Xi Li, Hong Ji, and Victor C.M. Leung. INFOCOM Workshops 2017 May 1, Atlanta, GA, USA
Zhiyuan Tan, F. Richard Yu, Xi Li, Hong Ji, and Victor C.M. Leung INFOCOM Workshops 2017 May 1, Atlanta, GA, USA 1 Background and Motivation System Model Problem Formulation Problem Reformulation and Solution
More informationBSIT 1 Technology Skills: Apply current technical tools and methodologies to solve problems.
Bachelor of Science in Information Technology At Purdue Global, we employ a method called Course-Level Assessment, or CLA, to determine student mastery of Course Outcomes. Through CLA, we measure how well
More informationPessimistic Backoff for Mobile Ad hoc Networks
Pessimistic Backoff for Mobile Ad hoc Networks Saher S. Manaseer Department of computing science Glasgow University saher@dcs.gla.ac.uk Muneer Masadeh Department of Computer Science Jordan University of
More informationAnalyzing Cacheable Traffic in ISP Access Networks for Micro CDN applications via Content-Centric Networking
Analyzing Cacheable Traffic in ISP Access Networks for Micro CDN applications via Content-Centric Networking Claudio Imbrenda Luca Muscariello Orange Labs Dario Rossi Telecom ParisTech Outline Motivation
More information