CINXE.COM
Search results for: network simulation
<!DOCTYPE html> <html lang="en" dir="ltr"> <head> <!-- Google tag (gtag.js) --> <script async src="https://www.googletagmanager.com/gtag/js?id=G-P63WKM1TM1"></script> <script> window.dataLayer = window.dataLayer || []; function gtag(){dataLayer.push(arguments);} gtag('js', new Date()); gtag('config', 'G-P63WKM1TM1'); </script> <!-- Yandex.Metrika counter --> <script type="text/javascript" > (function(m,e,t,r,i,k,a){m[i]=m[i]||function(){(m[i].a=m[i].a||[]).push(arguments)}; m[i].l=1*new Date(); for (var j = 0; j < document.scripts.length; j++) {if (document.scripts[j].src === r) { return; }} k=e.createElement(t),a=e.getElementsByTagName(t)[0],k.async=1,k.src=r,a.parentNode.insertBefore(k,a)}) (window, document, "script", "https://mc.yandex.ru/metrika/tag.js", "ym"); ym(55165297, "init", { clickmap:false, trackLinks:true, accurateTrackBounce:true, webvisor:false }); </script> <noscript><div><img src="https://mc.yandex.ru/watch/55165297" style="position:absolute; left:-9999px;" alt="" /></div></noscript> <!-- /Yandex.Metrika counter --> <!-- Matomo --> <script> var _paq = window._paq = window._paq || []; /* tracker methods like "setCustomDimension" should be called before "trackPageView" */ _paq.push(['trackPageView']); _paq.push(['enableLinkTracking']); (function() { var u="//matomo.waset.org/"; _paq.push(['setTrackerUrl', u+'matomo.php']); _paq.push(['setSiteId', '2']); var d=document, g=d.createElement('script'), s=d.getElementsByTagName('script')[0]; g.async=true; g.src=u+'matomo.js'; s.parentNode.insertBefore(g,s); })(); </script> <!-- End Matomo Code --> <title>Search results for: network simulation</title> <meta name="description" content="Search results for: network simulation"> <meta name="keywords" content="network simulation"> <meta name="viewport" content="width=device-width, initial-scale=1, minimum-scale=1, maximum-scale=1, user-scalable=no"> <meta charset="utf-8"> <link href="https://cdn.waset.org/favicon.ico" type="image/x-icon" rel="shortcut icon"> <link href="https://cdn.waset.org/static/plugins/bootstrap-4.2.1/css/bootstrap.min.css" rel="stylesheet"> <link href="https://cdn.waset.org/static/plugins/fontawesome/css/all.min.css" rel="stylesheet"> <link href="https://cdn.waset.org/static/css/site.css?v=150220211555" rel="stylesheet"> </head> <body> <header> <div class="container"> <nav class="navbar navbar-expand-lg navbar-light"> <a class="navbar-brand" href="https://waset.org"> <img src="https://cdn.waset.org/static/images/wasetc.png" alt="Open Science Research Excellence" title="Open Science Research Excellence" /> </a> <button class="d-block d-lg-none navbar-toggler ml-auto" type="button" data-toggle="collapse" data-target="#navbarMenu" aria-controls="navbarMenu" aria-expanded="false" aria-label="Toggle navigation"> <span class="navbar-toggler-icon"></span> </button> <div class="w-100"> <div class="d-none d-lg-flex flex-row-reverse"> <form method="get" action="https://waset.org/search" class="form-inline my-2 my-lg-0"> <input class="form-control mr-sm-2" type="search" placeholder="Search Conferences" value="network simulation" name="q" aria-label="Search"> <button class="btn btn-light my-2 my-sm-0" type="submit"><i class="fas fa-search"></i></button> </form> </div> <div class="collapse navbar-collapse mt-1" id="navbarMenu"> <ul class="navbar-nav ml-auto align-items-center" id="mainNavMenu"> <li class="nav-item"> <a class="nav-link" href="https://waset.org/conferences" title="Conferences in 2025/2026/2027">Conferences</a> </li> <li class="nav-item"> <a class="nav-link" href="https://waset.org/disciplines" title="Disciplines">Disciplines</a> </li> <li class="nav-item"> <a class="nav-link" href="https://waset.org/committees" rel="nofollow">Committees</a> </li> <li class="nav-item dropdown"> <a class="nav-link dropdown-toggle" href="#" id="navbarDropdownPublications" role="button" data-toggle="dropdown" aria-haspopup="true" aria-expanded="false"> Publications </a> <div class="dropdown-menu" aria-labelledby="navbarDropdownPublications"> <a class="dropdown-item" href="https://publications.waset.org/abstracts">Abstracts</a> <a class="dropdown-item" href="https://publications.waset.org">Periodicals</a> <a class="dropdown-item" href="https://publications.waset.org/archive">Archive</a> </div> </li> <li class="nav-item"> <a class="nav-link" href="https://waset.org/page/support" title="Support">Support</a> </li> </ul> </div> </div> </nav> </div> </header> <main> <div class="container mt-4"> <div class="row"> <div class="col-md-9 mx-auto"> <form method="get" action="https://publications.waset.org/abstracts/search"> <div id="custom-search-input"> <div class="input-group"> <i class="fas fa-search"></i> <input type="text" class="search-query" name="q" placeholder="Author, Title, Abstract, Keywords" value="network simulation"> <input type="submit" class="btn_search" value="Search"> </div> </div> </form> </div> </div> <div class="row mt-3"> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Commenced</strong> in January 2007</div> </div> </div> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Frequency:</strong> Monthly</div> </div> </div> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Edition:</strong> International</div> </div> </div> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Paper Count:</strong> 9334</div> </div> </div> </div> <h1 class="mt-3 mb-3 text-center" style="font-size:1.6rem;">Search results for: network simulation</h1> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">9304</span> Nonlinear Adaptive PID Control for a Semi-Batch Reactor Based on an RBF Network</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Magdi.%20M.%20Nabi">Magdi. M. Nabi</a>, <a href="https://publications.waset.org/abstracts/search?q=Ding-Li%20Yu"> Ding-Li Yu</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Control of a semi-batch polymerization reactor using an adaptive radial basis function (RBF) neural network method is investigated in this paper. A neural network inverse model is used to estimate the valve position of the reactor; this method can identify the controlled system with the RBF neural network identifier. The weights of the adaptive PID controller are timely adjusted based on the identification of the plant and self-learning capability of RBFNN. A PID controller is used in the feedback control to regulate the actual temperature by compensating the neural network inverse model output. Simulation results show that the proposed control has strong adaptability, robustness and satisfactory control performance and the nonlinear system is achieved. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=Chylla-Haase%20polymerization%20reactor" title="Chylla-Haase polymerization reactor">Chylla-Haase polymerization reactor</a>, <a href="https://publications.waset.org/abstracts/search?q=RBF%20neural%20networks" title=" RBF neural networks"> RBF neural networks</a>, <a href="https://publications.waset.org/abstracts/search?q=feed-forward" title=" feed-forward"> feed-forward</a>, <a href="https://publications.waset.org/abstracts/search?q=feedback%20control" title=" feedback control"> feedback control</a> </p> <a href="https://publications.waset.org/abstracts/11204/nonlinear-adaptive-pid-control-for-a-semi-batch-reactor-based-on-an-rbf-network" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/11204.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">712</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">9303</span> Generalized Rough Sets Applied to Graphs Related to Urban Problems</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Mihai%20Rebenciuc">Mihai Rebenciuc</a>, <a href="https://publications.waset.org/abstracts/search?q=Simona%20Mihaela%20Bibic"> Simona Mihaela Bibic</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Branch of modern mathematics, graphs represent instruments for optimization and solving practical applications in various fields such as economic networks, engineering, network optimization, the geometry of social action, generally, complex systems including contemporary urban problems (path or transport efficiencies, biourbanism, & c.). In this paper is studied the interconnection of some urban network, which can lead to a simulation problem of a digraph through another digraph. The simulation is made univoc or more general multivoc. The concepts of fragment and atom are very useful in the study of connectivity in the digraph that is simulation - including an alternative evaluation of k- connectivity. Rough set approach in (bi)digraph which is proposed in premier in this paper contribute to improved significantly the evaluation of k-connectivity. This rough set approach is based on generalized rough sets - basic facts are presented in this paper. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=%28bi%29digraphs" title="(bi)digraphs">(bi)digraphs</a>, <a href="https://publications.waset.org/abstracts/search?q=rough%20set%20theory" title=" rough set theory"> rough set theory</a>, <a href="https://publications.waset.org/abstracts/search?q=systems%20of%20interacting%20agents" title=" systems of interacting agents"> systems of interacting agents</a>, <a href="https://publications.waset.org/abstracts/search?q=complex%20systems" title=" complex systems"> complex systems</a> </p> <a href="https://publications.waset.org/abstracts/77919/generalized-rough-sets-applied-to-graphs-related-to-urban-problems" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/77919.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">251</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">9302</span> 'The Network' - Cradle to Cradle Engagement Framework for Women in STEM</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Jessica%20Liqin%20Kong">Jessica Liqin Kong</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Female engineers and scientists face unique challenges in their careers that make the development of professional networks crucial, but also more difficult. Working to overcome these challenges, ‘The Network’ was established in 2013 at the Queensland University of Technology (QUT) in Australia as an alumni chapter with the purpose of evoking continuous positive change for female participation and retention in science, technology, engineering and mathematics (STEM). ‘The Network’ adopts an innovative model for a Women in STEM alumni chapter which was inspired by the cradle to cradle approach to engagement, and the concept of growing and harvesting individual and collective social capital through a variety of initiatives. ‘The Network’ fosters an environment where the values exchanged in social and professional relationships can be capitalized for both current and future women in STEM. The model of ‘The Network’ acts as a simulation and opportunity for participants to further develop their leadership and other soft skills through learning, building and experimenting with ‘The Network’. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=women%20in%20STEM" title="women in STEM">women in STEM</a>, <a href="https://publications.waset.org/abstracts/search?q=engagement" title=" engagement"> engagement</a>, <a href="https://publications.waset.org/abstracts/search?q=Cradle-to-Cradle" title=" Cradle-to-Cradle"> Cradle-to-Cradle</a>, <a href="https://publications.waset.org/abstracts/search?q=social%20capital" title=" social capital"> social capital</a> </p> <a href="https://publications.waset.org/abstracts/19675/the-network-cradle-to-cradle-engagement-framework-for-women-in-stem" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/19675.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">290</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">9301</span> Improved Performance Using Adaptive Pre-Coding in the Cellular Network</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Yong-Jun%20Kim">Yong-Jun Kim</a>, <a href="https://publications.waset.org/abstracts/search?q=Jae-Hyun%20Ro"> Jae-Hyun Ro</a>, <a href="https://publications.waset.org/abstracts/search?q=Chang-Bin%20Ha"> Chang-Bin Ha</a>, <a href="https://publications.waset.org/abstracts/search?q=Hyoung-Kyu%20Song"> Hyoung-Kyu Song</a> </p> <p class="card-text"><strong>Abstract:</strong></p> This paper proposes the cooperative transmission scheme with pre-coding because the cellular communication requires high reliability. The cooperative transmission scheme uses pre-coding method with limited feedback information among small cells. Particularly, the proposed scheme has adaptive mode according to the position of mobile station. Thus, demand of recent wireless communication is resolved by this scheme. From the simulation results, the proposed scheme has better performance compared to the conventional scheme in the cellular network. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=CDD" title="CDD">CDD</a>, <a href="https://publications.waset.org/abstracts/search?q=cellular%20network" title=" cellular network"> cellular network</a>, <a href="https://publications.waset.org/abstracts/search?q=pre-coding" title=" pre-coding"> pre-coding</a>, <a href="https://publications.waset.org/abstracts/search?q=SPC" title=" SPC"> SPC</a> </p> <a href="https://publications.waset.org/abstracts/42216/improved-performance-using-adaptive-pre-coding-in-the-cellular-network" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/42216.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">576</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">9300</span> Sampling Effects on Secondary Voltage Control of Microgrids Based on Network of Multiagent</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=M.%20J.%20Park">M. J. Park</a>, <a href="https://publications.waset.org/abstracts/search?q=S.%20H.%20Lee"> S. H. Lee</a>, <a href="https://publications.waset.org/abstracts/search?q=C.%20H.%20Lee"> C. H. Lee</a>, <a href="https://publications.waset.org/abstracts/search?q=O.%20M.%20Kwon"> O. M. Kwon</a> </p> <p class="card-text"><strong>Abstract:</strong></p> This paper studies a secondary voltage control framework of the microgrids based on the consensus for a communication network of multiagent. The proposed control is designed by the communication network with one-way links. The communication network is modeled by a directed graph. At this time, the concept of sampling is considered as the communication constraint among each distributed generator in the microgrids. To analyze the sampling effects on the secondary voltage control of the microgrids, by using Lyapunov theory and some mathematical techniques, the sufficient condition for such problem will be established regarding linear matrix inequality (LMI). Finally, some simulation results are given to illustrate the necessity of the consideration of the sampling effects on the secondary voltage control of the microgrids. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=microgrids" title="microgrids">microgrids</a>, <a href="https://publications.waset.org/abstracts/search?q=secondary%20control" title=" secondary control"> secondary control</a>, <a href="https://publications.waset.org/abstracts/search?q=multiagent" title=" multiagent"> multiagent</a>, <a href="https://publications.waset.org/abstracts/search?q=sampling" title=" sampling"> sampling</a>, <a href="https://publications.waset.org/abstracts/search?q=LMI" title=" LMI"> LMI</a> </p> <a href="https://publications.waset.org/abstracts/51477/sampling-effects-on-secondary-voltage-control-of-microgrids-based-on-network-of-multiagent" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/51477.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">336</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">9299</span> Advanced Simulation and Enhancement for Distributed and Energy Efficient Scheduling for IEEE802.11s Wireless Enhanced Distributed Channel Access Networks</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Fisayo%20G.%20Ojo">Fisayo G. Ojo</a>, <a href="https://publications.waset.org/abstracts/search?q=Shamala%20K.%20Subramaniam"> Shamala K. Subramaniam</a>, <a href="https://publications.waset.org/abstracts/search?q=Zuriati%20Ahmad%20Zukarnain"> Zuriati Ahmad Zukarnain</a> </p> <p class="card-text"><strong>Abstract:</strong></p> As technology is advancing and wireless applications are becoming dependable sources, while the physical layer of the applications are been embedded into tiny layer, so the more the problem on energy efficiency and consumption. This paper reviews works done in recent years in wireless applications and distributed computing, we discovered that applications are becoming dependable, and resource allocation sharing with other applications in distributed computing. Applications embedded in distributed system are suffering from power stability and efficiency. In the reviews, we also prove that discrete event simulation has been left behind untouched and not been adapted into distributed system as a simulation technique in scheduling of each event that took place in the development of distributed computing applications. We shed more lights on some researcher proposed techniques and results in our reviews to prove the unsatisfactory results, and to show that more work still have to be done on issues of energy efficiency in wireless applications, and congestion in distributed computing. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=discrete%20event%20simulation%20%28DES%29" title="discrete event simulation (DES)">discrete event simulation (DES)</a>, <a href="https://publications.waset.org/abstracts/search?q=distributed%20computing" title=" distributed computing"> distributed computing</a>, <a href="https://publications.waset.org/abstracts/search?q=energy%20efficiency%20%28EE%29" title=" energy efficiency (EE)"> energy efficiency (EE)</a>, <a href="https://publications.waset.org/abstracts/search?q=internet%20of%20things%20%28IOT%29" title=" internet of things (IOT)"> internet of things (IOT)</a>, <a href="https://publications.waset.org/abstracts/search?q=quality%20of%20service%20%28QOS%29" title=" quality of service (QOS)"> quality of service (QOS)</a>, <a href="https://publications.waset.org/abstracts/search?q=user%20equipment%20%28UE%29" title=" user equipment (UE)"> user equipment (UE)</a>, <a href="https://publications.waset.org/abstracts/search?q=wireless%20mesh%20network%20%28WMN%29" title=" wireless mesh network (WMN)"> wireless mesh network (WMN)</a>, <a href="https://publications.waset.org/abstracts/search?q=wireless%20sensor%20network%20%28wsn%29" title=" wireless sensor network (wsn)"> wireless sensor network (wsn)</a>, <a href="https://publications.waset.org/abstracts/search?q=worldwide%20interoperability%20for%20microwave%20access%20x%20%28WiMAX%29" title=" worldwide interoperability for microwave access x (WiMAX)"> worldwide interoperability for microwave access x (WiMAX)</a> </p> <a href="https://publications.waset.org/abstracts/98991/advanced-simulation-and-enhancement-for-distributed-and-energy-efficient-scheduling-for-ieee80211s-wireless-enhanced-distributed-channel-access-networks" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/98991.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">197</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">9298</span> 156vdc to 110vac Sinusoidal Inverter Simulation and Implementation</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Phinyo%20Mueangmeesap">Phinyo Mueangmeesap</a> </p> <p class="card-text"><strong>Abstract:</strong></p> This paper describes about pure sinusoidal inverter simulation and implementation from high voltage DC (156 Vdc). This simulation is to study and improve the efficiency of the inverter. By reducing the loss of power from boost converter in current inverter. The simulation is done by using the H-bridge circuit with pulse width modulate (PWM) signal and low-pass filter circuit. To convert the DC into AC. This paper used the PSCad for simulation. The result of simulation can be used to create prototype inverter by converting 156 Vdc to 110Vac. The inverter gives the output signal similar to the output from a simulation. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=inverter%20simulation" title="inverter simulation">inverter simulation</a>, <a href="https://publications.waset.org/abstracts/search?q=PWM%20signal" title=" PWM signal"> PWM signal</a>, <a href="https://publications.waset.org/abstracts/search?q=single-phase%20inverter" title=" single-phase inverter"> single-phase inverter</a>, <a href="https://publications.waset.org/abstracts/search?q=sinusoidal%20inverter" title=" sinusoidal inverter"> sinusoidal inverter</a> </p> <a href="https://publications.waset.org/abstracts/58872/156vdc-to-110vac-sinusoidal-inverter-simulation-and-implementation" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/58872.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">420</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">9297</span> Network Security Attacks and Defences</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Ranbir%20Singh">Ranbir Singh</a>, <a href="https://publications.waset.org/abstracts/search?q=Deepinder%20Kaur"> Deepinder Kaur</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Network security is an important aspect in every field like government offices, Educational Institute and any business organization. Network security consists of the policies adopted to prevent and monitor forbidden access, misuse, modification, or denial of a computer network. Network security is very complicated subject and deal by only well trained and experienced people. However, as more and more people become wired, an increasing number of people need to understand the basics of security in a networked world. The history of the network security included an introduction to the TCP/IP and interworking. Network security starts with authenticating, commonly with a username and a password. In this paper, we study about various types of attacks on network security and how to handle or prevent this attack. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=network%20security" title="network security">network security</a>, <a href="https://publications.waset.org/abstracts/search?q=attacks" title=" attacks"> attacks</a>, <a href="https://publications.waset.org/abstracts/search?q=denial" title=" denial"> denial</a>, <a href="https://publications.waset.org/abstracts/search?q=authenticating" title=" authenticating"> authenticating</a> </p> <a href="https://publications.waset.org/abstracts/53007/network-security-attacks-and-defences" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/53007.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">411</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">9296</span> Prediction of the Transmittance of Various Bended Angles Lightpipe by Using Neural Network under Different Sky Clearness Condition</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Li%20Zhang">Li Zhang</a>, <a href="https://publications.waset.org/abstracts/search?q=Yuehong%20Su"> Yuehong Su</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Lightpipe as a mature solar light tube technique has been employed worldwide. Accurately assessing the performance of lightpipe and evaluate daylighting available has been a challenging topic. Previous research had used regression model and computational simulation methods to estimate the performance of lightpipe. However, due to the nonlinear nature of solar light transferring in lightpipe, the methods mentioned above express inaccurate and time-costing issues. In the present study, a neural network model as an alternative method is investigated to predict the transmittance of lightpipe. Four types of commercial lightpipe with bended angle 0°, 30°, 45° and 60° are discussed under clear, intermediate and overcast sky conditions respectively. The neural network is generated in MATLAB by using the outcomes of an optical software Photopia simulations as targets for networks training and testing. The coefficient of determination (R²) for each model is higher than 0.98, and the mean square error (MSE) is less than 0.0019, which indicate the neural network strong predictive ability and the use of the neural network method could be an efficient technique for determining the performance of lightpipe. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=neural%20network" title="neural network">neural network</a>, <a href="https://publications.waset.org/abstracts/search?q=bended%20lightpipe" title=" bended lightpipe"> bended lightpipe</a>, <a href="https://publications.waset.org/abstracts/search?q=transmittance" title=" transmittance"> transmittance</a>, <a href="https://publications.waset.org/abstracts/search?q=Photopia" title=" Photopia"> Photopia</a> </p> <a href="https://publications.waset.org/abstracts/99530/prediction-of-the-transmittance-of-various-bended-angles-lightpipe-by-using-neural-network-under-different-sky-clearness-condition" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/99530.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">158</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">9295</span> Improved Network Construction Methods Based on Virtual Rails for Mobile Sensor Network</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Noritaka%20Shigei">Noritaka Shigei</a>, <a href="https://publications.waset.org/abstracts/search?q=Kazuto%20Matsumoto"> Kazuto Matsumoto</a>, <a href="https://publications.waset.org/abstracts/search?q=Yoshiki%20Nakashima"> Yoshiki Nakashima</a>, <a href="https://publications.waset.org/abstracts/search?q=Hiromi%20Miyajima"> Hiromi Miyajima</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Although Mobile Wireless Sensor Networks (MWSNs), which consist of mobile sensor nodes (MSNs), can cover a wide range of observation region by using a small number of sensor nodes, they need to construct a network to collect the sensing data on the base station by moving the MSNs. As an effective method, the network construction method based on Virtual Rails (VRs), which is referred to as VR method, has been proposed. In this paper, we propose two types of effective techniques for the VR method. They can prolong the operation time of the network, which is limited by the battery capabilities of MSNs and the energy consumption of MSNs. The first technique, an effective arrangement of VRs, almost equalizes the number of MSNs belonging to each VR. The second technique, an adaptive movement method of MSNs, takes into account the residual energy of battery. In the simulation, we demonstrate that each technique can improve the network lifetime and the combination of both techniques is the most effective. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=mobile%20sensor%20node" title="mobile sensor node">mobile sensor node</a>, <a href="https://publications.waset.org/abstracts/search?q=relay%20of%20sensing%20data" title=" relay of sensing data"> relay of sensing data</a>, <a href="https://publications.waset.org/abstracts/search?q=residual%20energy" title=" residual energy"> residual energy</a>, <a href="https://publications.waset.org/abstracts/search?q=virtual%20rail" title=" virtual rail"> virtual rail</a>, <a href="https://publications.waset.org/abstracts/search?q=wireless%20sensor%20network" title=" wireless sensor network"> wireless sensor network</a> </p> <a href="https://publications.waset.org/abstracts/42575/improved-network-construction-methods-based-on-virtual-rails-for-mobile-sensor-network" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/42575.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">335</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">9294</span> Diesel Fault Prediction Based on Optimized Gray Neural Network</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Han%20Bing">Han Bing</a>, <a href="https://publications.waset.org/abstracts/search?q=Yin%20Zhenjie"> Yin Zhenjie</a> </p> <p class="card-text"><strong>Abstract:</strong></p> In order to analyze the status of a diesel engine, as well as conduct fault prediction, a new prediction model based on a gray system is proposed in this paper, which takes advantage of the neural network and the genetic algorithm. The proposed GBPGA prediction model builds on the GM (1.5) model and uses a neural network, which is optimized by a genetic algorithm to construct the error compensator. We verify our proposed model on the diesel faulty simulation data and the experimental results show that GBPGA has the potential to employ fault prediction on diesel. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=fault%20prediction" title="fault prediction">fault prediction</a>, <a href="https://publications.waset.org/abstracts/search?q=neural%20network" title=" neural network"> neural network</a>, <a href="https://publications.waset.org/abstracts/search?q=GM%281" title=" GM(1"> GM(1</a>, <a href="https://publications.waset.org/abstracts/search?q=5%29%20genetic%20algorithm" title="5) genetic algorithm">5) genetic algorithm</a>, <a href="https://publications.waset.org/abstracts/search?q=GBPGA" title=" GBPGA"> GBPGA</a> </p> <a href="https://publications.waset.org/abstracts/48844/diesel-fault-prediction-based-on-optimized-gray-neural-network" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/48844.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">313</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">9293</span> Comparison between Continuous Genetic Algorithms and Particle Swarm Optimization for Distribution Network Reconfiguration</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Linh%20Nguyen%20Tung">Linh Nguyen Tung</a>, <a href="https://publications.waset.org/abstracts/search?q=Anh%20Truong%20Viet"> Anh Truong Viet</a>, <a href="https://publications.waset.org/abstracts/search?q=Nghien%20Nguyen%20Ba"> Nghien Nguyen Ba</a>, <a href="https://publications.waset.org/abstracts/search?q=Chuong%20Trinh%20Trong"> Chuong Trinh Trong</a> </p> <p class="card-text"><strong>Abstract:</strong></p> This paper proposes a reconfiguration methodology based on a continuous genetic algorithm (CGA) and particle swarm optimization (PSO) for minimizing active power loss and minimizing voltage deviation. Both algorithms are adapted using graph theory to generate feasible individuals, and the modified crossover is used for continuous variable of CGA. To demonstrate the performance and effectiveness of the proposed methods, a comparative analysis of CGA with PSO for network reconfiguration, on 33-node and 119-bus radial distribution system is presented. The simulation results have shown that both CGA and PSO can be used in the distribution network reconfiguration and CGA outperformed PSO with significant success rate in finding optimal distribution network configuration. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=distribution%20network%20reconfiguration" title="distribution network reconfiguration">distribution network reconfiguration</a>, <a href="https://publications.waset.org/abstracts/search?q=particle%20swarm%20optimization" title=" particle swarm optimization"> particle swarm optimization</a>, <a href="https://publications.waset.org/abstracts/search?q=continuous%20genetic%20algorithm" title=" continuous genetic algorithm"> continuous genetic algorithm</a>, <a href="https://publications.waset.org/abstracts/search?q=power%20loss%20reduction" title=" power loss reduction"> power loss reduction</a>, <a href="https://publications.waset.org/abstracts/search?q=voltage%20deviation" title=" voltage deviation"> voltage deviation</a> </p> <a href="https://publications.waset.org/abstracts/101407/comparison-between-continuous-genetic-algorithms-and-particle-swarm-optimization-for-distribution-network-reconfiguration" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/101407.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">195</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">9292</span> Artificial Intelligence in Penetration Testing of a Connected and Autonomous Vehicle Network</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Phillip%20Garrad">Phillip Garrad</a>, <a href="https://publications.waset.org/abstracts/search?q=Saritha%20Unnikrishnan"> Saritha Unnikrishnan</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The recent popularity of connected and autonomous vehicles (CAV) corresponds with an increase in the risk of cyber-attacks. These cyber-attacks have been instigated by both researchers or white-coat hackers and cyber-criminals. As Connected Vehicles move towards full autonomy, the impact of these cyber-attacks also grows. The current research details challenges faced in cybersecurity testing of CAV, including access and cost of the representative test setup. Other challenges faced are lack of experts in the field. Possible solutions to how these challenges can be overcome are reviewed and discussed. From these findings, a software simulated CAV network is established as a cost-effective representative testbed. Penetration tests are then performed on this simulation, demonstrating a cyber-attack in CAV. Studies have shown Artificial Intelligence (AI) to improve runtime, increase efficiency and comprehensively cover all the typical test aspects in penetration testing in other industries. There is an attempt to introduce similar AI models to the software simulation. The expectation from this implementation is to see similar improvements in runtime and efficiency for the CAV model. If proven to be an effective means of penetration test for CAV, this methodology may be used on a full CAV test network. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=cybersecurity" title="cybersecurity">cybersecurity</a>, <a href="https://publications.waset.org/abstracts/search?q=connected%20vehicles" title=" connected vehicles"> connected vehicles</a>, <a href="https://publications.waset.org/abstracts/search?q=software%20simulation" title=" software simulation"> software simulation</a>, <a href="https://publications.waset.org/abstracts/search?q=artificial%20intelligence" title=" artificial intelligence"> artificial intelligence</a>, <a href="https://publications.waset.org/abstracts/search?q=penetration%20testing" title=" penetration testing"> penetration testing</a> </p> <a href="https://publications.waset.org/abstracts/144766/artificial-intelligence-in-penetration-testing-of-a-connected-and-autonomous-vehicle-network" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/144766.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">114</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">9291</span> A Genetic-Neural-Network Modeling Approach for Self-Heating in GaN High Electron Mobility Transistors</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Anwar%20Jarndal">Anwar Jarndal</a> </p> <p class="card-text"><strong>Abstract:</strong></p> In this paper, a genetic-neural-network (GNN) based large-signal model for GaN HEMTs is presented along with its parameters extraction procedure. The model is easy to construct and implement in CAD software and requires only DC and S-parameter measurements. An improved decomposition technique is used to model self-heating effect. Two GNN models are constructed to simulate isothermal drain current and power dissipation, respectively. The two model are then composed to simulate the drain current. The modeling procedure was applied to a packaged GaN-on-Si HEMT and the developed model is validated by comparing its large-signal simulation with measured data. A very good agreement between the simulation and measurement is obtained. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=GaN%20HEMT" title="GaN HEMT">GaN HEMT</a>, <a href="https://publications.waset.org/abstracts/search?q=computer-aided%20design%20and%20modeling" title=" computer-aided design and modeling"> computer-aided design and modeling</a>, <a href="https://publications.waset.org/abstracts/search?q=neural%20networks" title=" neural networks"> neural networks</a>, <a href="https://publications.waset.org/abstracts/search?q=genetic%20optimization" title=" genetic optimization"> genetic optimization</a> </p> <a href="https://publications.waset.org/abstracts/39157/a-genetic-neural-network-modeling-approach-for-self-heating-in-gan-high-electron-mobility-transistors" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/39157.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">390</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">9290</span> Transmit Power Optimization for Cooperative Beamforming in Reverse-Link MIMO Ad-Hoc Networks</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Younghyun%20Jeon">Younghyun Jeon</a>, <a href="https://publications.waset.org/abstracts/search?q=Seungjoo%20Maeng"> Seungjoo Maeng</a> </p> <p class="card-text"><strong>Abstract:</strong></p> In the Ad-hoc network, the great interests regarding MIMO scheme leads to their combination, which is also utilized into its applicable network. We manage the field of the problem into Reverse-link MIMO Ad-hoc Network (RMAN) and propose the methodology to maximize the data rate with its power consumption using Node-Cooperative beamforming technique. Based on the result of mathematical optimization formulation, we design the algorithm to construct optimal orthogonal weight vector according to channel feedback and control its transmission power according to QoS-pricing value level. In simulation results, we show the validity of the proposed mathematical optimization result and algorithm which mean that the sum-rate of each link is converged into some point. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=ad-hoc%20network" title="ad-hoc network">ad-hoc network</a>, <a href="https://publications.waset.org/abstracts/search?q=MIMO" title=" MIMO"> MIMO</a>, <a href="https://publications.waset.org/abstracts/search?q=cooperative%20beamforming" title=" cooperative beamforming"> cooperative beamforming</a>, <a href="https://publications.waset.org/abstracts/search?q=transmit%20power" title=" transmit power "> transmit power </a> </p> <a href="https://publications.waset.org/abstracts/57761/transmit-power-optimization-for-cooperative-beamforming-in-reverse-link-mimo-ad-hoc-networks" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/57761.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">402</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">9289</span> Hyperspectral Data Classification Algorithm Based on the Deep Belief and Self-Organizing Neural Network</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Li%20Qingjian">Li Qingjian</a>, <a href="https://publications.waset.org/abstracts/search?q=Li%20Ke"> Li Ke</a>, <a href="https://publications.waset.org/abstracts/search?q=He%20Chun"> He Chun</a>, <a href="https://publications.waset.org/abstracts/search?q=Huang%20Yong"> Huang Yong</a> </p> <p class="card-text"><strong>Abstract:</strong></p> In this paper, the method of combining the Pohl Seidman's deep belief network with the self-organizing neural network is proposed to classify the target. This method is mainly aimed at the high nonlinearity of the hyperspectral image, the high sample dimension and the difficulty in designing the classifier. The main feature of original data is extracted by deep belief network. In the process of extracting features, adding known labels samples to fine tune the network, enriching the main characteristics. Then, the extracted feature vectors are classified into the self-organizing neural network. This method can effectively reduce the dimensions of data in the spectrum dimension in the preservation of large amounts of raw data information, to solve the traditional clustering and the long training time when labeled samples less deep learning algorithm for training problems, improve the classification accuracy and robustness. Through the data simulation, the results show that the proposed network structure can get a higher classification precision in the case of a small number of known label samples. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=DBN" title="DBN">DBN</a>, <a href="https://publications.waset.org/abstracts/search?q=SOM" title=" SOM"> SOM</a>, <a href="https://publications.waset.org/abstracts/search?q=pattern%20classification" title=" pattern classification"> pattern classification</a>, <a href="https://publications.waset.org/abstracts/search?q=hyperspectral" title=" hyperspectral"> hyperspectral</a>, <a href="https://publications.waset.org/abstracts/search?q=data%20compression" title=" data compression"> data compression</a> </p> <a href="https://publications.waset.org/abstracts/89759/hyperspectral-data-classification-algorithm-based-on-the-deep-belief-and-self-organizing-neural-network" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/89759.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">347</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">9288</span> A Lifetime-Enhancing Monitoring Node Distribution Using Minimum Spanning Tree in Mobile Ad Hoc Networks</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Sungchul%20Ha">Sungchul Ha</a>, <a href="https://publications.waset.org/abstracts/search?q=Hyunwoo%20Kim"> Hyunwoo Kim</a> </p> <p class="card-text"><strong>Abstract:</strong></p> In mobile ad hoc networks, all nodes in a network only have limited resources and calculation ability. Therefore communication topology which have long lifetime is good for all nodes in mobile ad hoc networks. There are a variety of researches on security problems in wireless ad hoc networks. The existing many researches try to make efficient security schemes to reduce network power consumption and enhance network lifetime. Because a new node can join the network at any time, the wireless ad hoc networks are exposed to various threats and can be destroyed by attacks. Resource consumption is absolutely necessary to secure networks, but more resource consumption can be a critical problem to network lifetime. This paper focuses on efficient monitoring node distribution to enhance network lifetime in wireless ad hoc networks. Since the wireless ad hoc networks cannot use centralized infrastructure and security systems of wired networks, a new special IDS scheme is necessary. The scheme should not only cover all nodes in a network but also enhance the network lifetime. In this paper, we propose an efficient IDS node distribution scheme using minimum spanning tree (MST) method. The simulation results show that the proposed algorithm has superior performance in comparison with existing algorithms. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=MANETs" title="MANETs">MANETs</a>, <a href="https://publications.waset.org/abstracts/search?q=IDS" title=" IDS"> IDS</a>, <a href="https://publications.waset.org/abstracts/search?q=power%20control" title=" power control"> power control</a>, <a href="https://publications.waset.org/abstracts/search?q=minimum%20spanning%20tree" title=" minimum spanning tree "> minimum spanning tree </a> </p> <a href="https://publications.waset.org/abstracts/3530/a-lifetime-enhancing-monitoring-node-distribution-using-minimum-spanning-tree-in-mobile-ad-hoc-networks" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/3530.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">378</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">9287</span> Prediction of Unsteady Heat Transfer over Square Cylinder in the Presence of Nanofluid by Using ANN</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Ajoy%20Kumar%20Das">Ajoy Kumar Das</a>, <a href="https://publications.waset.org/abstracts/search?q=Prasenjit%20Dey"> Prasenjit Dey</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Heat transfer due to forced convection of copper water based nanofluid has been predicted by Artificial Neural network (ANN). The present nanofluid is formed by mixing copper nano particles in water and the volume fractions are considered here are 0% to 15% and the Reynolds number are kept constant at 100. The back propagation algorithm is used to train the network. The present ANN is trained by the input and output data which has been obtained from the numerical simulation, performed in finite volume based Computational Fluid Dynamics (CFD) commercial software Ansys Fluent. The numerical simulation based results are compared with the back propagation based ANN results. It is found that the forced convection heat transfer of water based nanofluid can be predicted correctly by ANN. It is also observed that the back propagation ANN can predict the heat transfer characteristics of nanofluid very quickly compared to standard CFD method. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=forced%20convection" title="forced convection">forced convection</a>, <a href="https://publications.waset.org/abstracts/search?q=square%20cylinder" title=" square cylinder"> square cylinder</a>, <a href="https://publications.waset.org/abstracts/search?q=nanofluid" title=" nanofluid"> nanofluid</a>, <a href="https://publications.waset.org/abstracts/search?q=neural%20network" title=" neural network "> neural network </a> </p> <a href="https://publications.waset.org/abstracts/26172/prediction-of-unsteady-heat-transfer-over-square-cylinder-in-the-presence-of-nanofluid-by-using-ann" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/26172.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">328</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">9286</span> Simulation-Based Optimization of a Non-Uniform Piezoelectric Energy Harvester with Stack Boundary</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Alireza%20Keshmiri">Alireza Keshmiri</a>, <a href="https://publications.waset.org/abstracts/search?q=Shahriar%20Bagheri"> Shahriar Bagheri</a>, <a href="https://publications.waset.org/abstracts/search?q=Nan%20Wu"> Nan Wu</a> </p> <p class="card-text"><strong>Abstract:</strong></p> This research presents an analytical model for the development of an energy harvester with piezoelectric rings stacked at the boundary of the structure based on the Adomian decomposition method. The model is applied to geometrically non-uniform beams to derive the steady-state dynamic response of the structure subjected to base motion excitation and efficiently harvest the subsequent vibrational energy. The in-plane polarization of the piezoelectric rings is employed to enhance the electrical power output. A parametric study for the proposed energy harvester with various design parameters is done to prepare the dataset required for optimization. Finally, simulation-based optimization technique helps to find the optimum structural design with maximum efficiency. To solve the optimization problem, an artificial neural network is first trained to replace the simulation model, and then, a genetic algorithm is employed to find the optimized design variables. Higher geometrical non-uniformity and length of the beam lowers the structure natural frequency and generates a larger power output. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=piezoelectricity" title="piezoelectricity">piezoelectricity</a>, <a href="https://publications.waset.org/abstracts/search?q=energy%20harvesting" title=" energy harvesting"> energy harvesting</a>, <a href="https://publications.waset.org/abstracts/search?q=simulation-based%20optimization" title=" simulation-based optimization"> simulation-based optimization</a>, <a href="https://publications.waset.org/abstracts/search?q=artificial%20neural%20network" title=" artificial neural network"> artificial neural network</a>, <a href="https://publications.waset.org/abstracts/search?q=genetic%20algorithm" title=" genetic algorithm"> genetic algorithm</a> </p> <a href="https://publications.waset.org/abstracts/108266/simulation-based-optimization-of-a-non-uniform-piezoelectric-energy-harvester-with-stack-boundary" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/108266.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">131</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">9285</span> Performance Analysis of Routing Protocols for WLAN Based Wireless Sensor Networks (WSNs)</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Noman%20Shabbir">Noman Shabbir</a>, <a href="https://publications.waset.org/abstracts/search?q=Roheel%20Nawaz"> Roheel Nawaz</a>, <a href="https://publications.waset.org/abstracts/search?q=Muhammad%20N.%20Iqbal"> Muhammad N. Iqbal</a>, <a href="https://publications.waset.org/abstracts/search?q=Junaid%20Zafar"> Junaid Zafar</a> </p> <p class="card-text"><strong>Abstract:</strong></p> This paper focuses on the performance evaluation of routing protocols in WLAN based Wireless Sensor Networks (WSNs). A comparative analysis of routing protocols such as Ad-hoc On-demand Distance Vector Routing System (AODV), Dynamic Source Routing (DSR) and Optimized Link State Routing (OLSR) is been made against different network parameters like network load, end to end delay and throughput in small, medium and large-scale sensor network scenarios to identify the best performing protocol. Simulation results indicate that OLSR gives minimum network load in all three scenarios while AODV gives the best throughput in small scale network but in medium and large scale networks, DSR is better. In terms of delay, OLSR is more efficient in small and medium scale network while AODV is slightly better in large networks. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=WLAN" title="WLAN">WLAN</a>, <a href="https://publications.waset.org/abstracts/search?q=WSN" title=" WSN"> WSN</a>, <a href="https://publications.waset.org/abstracts/search?q=AODV" title=" AODV"> AODV</a>, <a href="https://publications.waset.org/abstracts/search?q=DSR" title=" DSR"> DSR</a>, <a href="https://publications.waset.org/abstracts/search?q=OLSR" title=" OLSR"> OLSR</a> </p> <a href="https://publications.waset.org/abstracts/48412/performance-analysis-of-routing-protocols-for-wlan-based-wireless-sensor-networks-wsns" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/48412.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">459</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">9284</span> Detecting and Secluding Route Modifiers by Neural Network Approach in Wireless Sensor Networks</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=C.%20N.%20Vanitha">C. N. Vanitha</a>, <a href="https://publications.waset.org/abstracts/search?q=M.%20Usha"> M. Usha</a> </p> <p class="card-text"><strong>Abstract:</strong></p> In a real world scenario, the viability of the sensor networks has been proved by standardizing the technologies. Wireless sensor networks are vulnerable to both electronic and physical security breaches because of their deployment in remote, distributed, and inaccessible locations. The compromised sensor nodes send malicious data to the base station, and thus, the total network effectiveness will possibly be compromised. To detect and seclude the Route modifiers, a neural network based Pattern Learning predictor (PLP) is presented. This algorithm senses data at any node on present and previous patterns obtained from the en-route nodes. The eminence of any node is upgraded by their predicted and reported patterns. This paper propounds a solution not only to detect the route modifiers, but also to seclude the malevolent nodes from the network. The simulation result proves the effective performance of the network by the presented methodology in terms of energy level, routing and various network conditions. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=neural%20networks" title="neural networks">neural networks</a>, <a href="https://publications.waset.org/abstracts/search?q=pattern%20learning" title=" pattern learning"> pattern learning</a>, <a href="https://publications.waset.org/abstracts/search?q=security" title=" security"> security</a>, <a href="https://publications.waset.org/abstracts/search?q=wireless%20sensor%20networks" title=" wireless sensor networks"> wireless sensor networks</a> </p> <a href="https://publications.waset.org/abstracts/58559/detecting-and-secluding-route-modifiers-by-neural-network-approach-in-wireless-sensor-networks" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/58559.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">410</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">9283</span> Building Capacity and Personnel Flow Modeling for Operating amid COVID-19</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Samuel%20Fernandes">Samuel Fernandes</a>, <a href="https://publications.waset.org/abstracts/search?q=Dylan%20Kato"> Dylan Kato</a>, <a href="https://publications.waset.org/abstracts/search?q=Emin%20Burak%20Onat"> Emin Burak Onat</a>, <a href="https://publications.waset.org/abstracts/search?q=Patrick%20Keyantuo"> Patrick Keyantuo</a>, <a href="https://publications.waset.org/abstracts/search?q=Raja%20%20Sengupta"> Raja Sengupta</a>, <a href="https://publications.waset.org/abstracts/search?q=Amine%20Bouzaghrane"> Amine Bouzaghrane</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The COVID-19 pandemic has spread across the United States, forcing cities to impose stay-at-home and shelter-in-place orders. Building operations had to adjust as non-essential personnel worked from home. But as buildings prepare for personnel to return, they need to plan for safe operations amid new COVID-19 guidelines. In this paper we propose a methodology for capacity and flow modeling of personnel within buildings to safely operate under COVID-19 guidelines. We model personnel flow within buildings by network flows with queuing constraints. We study maximum flow, minimum cost, and minimax objectives. We compare our network flow approach with a simulation model through a case study and present the results. Our results showcase various scenarios of how buildings could be operated under new COVID-19 guidelines and provide a framework for building operators to plan and operate buildings in this new paradigm. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=network%20analysis" title="network analysis">network analysis</a>, <a href="https://publications.waset.org/abstracts/search?q=building%20simulation" title=" building simulation"> building simulation</a>, <a href="https://publications.waset.org/abstracts/search?q=COVID-19" title=" COVID-19 "> COVID-19 </a> </p> <a href="https://publications.waset.org/abstracts/128718/building-capacity-and-personnel-flow-modeling-for-operating-amid-covid-19" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/128718.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">168</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">9282</span> Ensuring Uniform Energy Consumption in Non-Deterministic Wireless Sensor Network to Protract Networks Lifetime</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Vrince%20Vimal">Vrince Vimal</a>, <a href="https://publications.waset.org/abstracts/search?q=Madhav%20J.%20Nigam"> Madhav J. Nigam</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Wireless sensor networks have enticed much of the spotlight from researchers all around the world, owing to its extensive applicability in agricultural, industrial and military fields. Energy conservation node deployment stratagems play a notable role for active implementation of Wireless Sensor Networks. Clustering is the approach in wireless sensor networks which improves energy efficiency in the network. The clustering algorithm needs to have an optimum size and number of clusters, as clustering, if not implemented properly, cannot effectively increase the life of the network. In this paper, an algorithm has been proposed to address connectivity issues with the aim of ensuring the uniform energy consumption of nodes in every part of the network. The results obtained after simulation showed that the proposed algorithm has an edge over existing algorithms in terms of throughput and networks lifetime. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=Wireless%20Sensor%20network%20%28WSN%29" title="Wireless Sensor network (WSN)">Wireless Sensor network (WSN)</a>, <a href="https://publications.waset.org/abstracts/search?q=Random%20Deployment" title=" Random Deployment"> Random Deployment</a>, <a href="https://publications.waset.org/abstracts/search?q=Clustering" title=" Clustering"> Clustering</a>, <a href="https://publications.waset.org/abstracts/search?q=Isolated%20Nodes" title=" Isolated Nodes"> Isolated Nodes</a>, <a href="https://publications.waset.org/abstracts/search?q=Networks%20Lifetime" title=" Networks Lifetime"> Networks Lifetime</a> </p> <a href="https://publications.waset.org/abstracts/71975/ensuring-uniform-energy-consumption-in-non-deterministic-wireless-sensor-network-to-protract-networks-lifetime" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/71975.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">343</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">9281</span> Modelling a Distribution Network with a Hybrid Solar-Hydro Power Plant in Rural Cameroon</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Contimi%20Kenfack%20Mouafo">Contimi Kenfack Mouafo</a>, <a href="https://publications.waset.org/abstracts/search?q=Sebastian%20Klick"> Sebastian Klick</a> </p> <p class="card-text"><strong>Abstract:</strong></p> In the rural and remote areas of Cameroon, access to electricity is very limited since most of the population is not connected to the main utility grid. Throughout the country, efforts are underway to not only expand the utility grid to these regions but also to provide reliable off-grid access to electricity. The Cameroonian company Solahydrowatt is currently working on the design and planning of one of the first hybrid solar-hydropower plants of Cameroon in Fotetsa, in the western region of the country, to provide the population with reliable access to electricity. This paper models and proposes a design for the low-voltage network with a hybrid solar-hydropower plant in Fotetsa. The modelling takes into consideration the voltage compliance of the distribution network, the maximum load of operating equipment, and most importantly, the ability for the network to operate as an off-grid system. The resulting modelled distribution network does not only comply with the Cameroonian voltage deviation standard, but it is also capable of being operated as a stand-alone network independent of the main utility grid. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=Cameroon" title="Cameroon">Cameroon</a>, <a href="https://publications.waset.org/abstracts/search?q=rural%20electrification" title=" rural electrification"> rural electrification</a>, <a href="https://publications.waset.org/abstracts/search?q=hybrid%20solar-hydro" title=" hybrid solar-hydro"> hybrid solar-hydro</a>, <a href="https://publications.waset.org/abstracts/search?q=off-grid%20electricity%20supply" title=" off-grid electricity supply"> off-grid electricity supply</a>, <a href="https://publications.waset.org/abstracts/search?q=network%20simulation" title=" network simulation"> network simulation</a> </p> <a href="https://publications.waset.org/abstracts/147877/modelling-a-distribution-network-with-a-hybrid-solar-hydro-power-plant-in-rural-cameroon" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/147877.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">135</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">9280</span> Designing and Implementation of MPLS Based VPN</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Muhammad%20Kamran%20Asif">Muhammad Kamran Asif</a> </p> <p class="card-text"><strong>Abstract:</strong></p> MPLS stands for Multi-Protocol Label Switching. It is the technology which replaces ATM (Asynchronous Transfer Mode) and frame relay. In this paper, we have designed a full fledge small scale MPLS based service provider network core network model, which provides communication services (e.g. voice, video and data) to the customer more efficiently using label switching technique. Using MPLS VPN provides security to the customers which are either on LAN or WAN. It protects its single customer sites from being attacked by any intruder from outside world along with the provision of concept of extension of a private network over an internet. In this paper, we tried to implement a service provider network using minimum available resources i.e. five 3800 series CISCO routers comprises of service provider core, provider edge routers and customer edge routers. The customers on the one end of the network (customer side) is capable of sending any kind of data to the customers at the other end using service provider cloud which is MPLS VPN enabled. We have also done simulation and emulation for the model using GNS3 (Graphical Network Simulator-3) and achieved the real time scenarios. We have also deployed a NMS system which monitors our service provider cloud and generates alarm in case of any intrusion or malfunctioning in the network. Moreover, we have also provided a video help desk facility between customers and service provider cloud to resolve the network issues more effectively. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=MPLS" title="MPLS">MPLS</a>, <a href="https://publications.waset.org/abstracts/search?q=VPN" title=" VPN"> VPN</a>, <a href="https://publications.waset.org/abstracts/search?q=NMS" title=" NMS"> NMS</a>, <a href="https://publications.waset.org/abstracts/search?q=ATM" title=" ATM"> ATM</a>, <a href="https://publications.waset.org/abstracts/search?q=asynchronous%20transfer%0D%0Amode" title=" asynchronous transfer mode"> asynchronous transfer mode</a> </p> <a href="https://publications.waset.org/abstracts/5426/designing-and-implementation-of-mpls-based-vpn" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/5426.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">334</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">9279</span> Development of a Congestion Controller of Computer Network Using Artificial Intelligence Algorithm</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Mary%20Anne%20Roa">Mary Anne Roa</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Congestion in network occurs due to exceed in aggregate demand as compared to the accessible capacity of the resources. Network congestion will increase as network speed increases and new effective congestion control methods are needed, especially for today’s very high speed networks. To address this undeniably global issue, the study focuses on the development of a fuzzy-based congestion control model concerned with allocating the resources of a computer network such that the system can operate at an adequate performance level when the demand exceeds or is near the capacity of the resources. Fuzzy logic based models have proven capable of accurately representing a wide variety of processes. The model built is based on bandwidth, the aggregate incoming traffic and the waiting time. The theoretical analysis and simulation results show that the proposed algorithm provides not only good utilization but also low packet loss. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=congestion%20control" title="congestion control">congestion control</a>, <a href="https://publications.waset.org/abstracts/search?q=queue%20management" title=" queue management"> queue management</a>, <a href="https://publications.waset.org/abstracts/search?q=computer%20networks" title=" computer networks"> computer networks</a>, <a href="https://publications.waset.org/abstracts/search?q=fuzzy%20logic" title=" fuzzy logic"> fuzzy logic</a> </p> <a href="https://publications.waset.org/abstracts/49453/development-of-a-congestion-controller-of-computer-network-using-artificial-intelligence-algorithm" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/49453.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">405</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">9278</span> Multi-Level Clustering Based Congestion Control Protocol for Cyber Physical Systems</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Manpreet%20Kaur">Manpreet Kaur</a>, <a href="https://publications.waset.org/abstracts/search?q=Amita%20Rani"> Amita Rani</a>, <a href="https://publications.waset.org/abstracts/search?q=Sanjay%20Kumar"> Sanjay Kumar</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The Internet of Things (IoT), a cyber-physical paradigm, allows a large number of devices to connect and send the sensory data in the network simultaneously. This tremendous amount of data generated leads to very high network load consequently resulting in network congestion. It further amounts to frequent loss of useful information and depletion of significant amount of nodes’ energy. Therefore, there is a need to control congestion in IoT so as to prolong network lifetime and improve the quality of service (QoS). Hence, we propose a two-level clustering based routing algorithm considering congestion score and packet priority metrics that focus on minimizing the network congestion. In the proposed Priority based Congestion Control (PBCC) protocol the sensor nodes in IoT network form clusters that reduces the amount of traffic and the nodes are prioritized to emphasize important data. Simultaneously, a congestion score determines the occurrence of congestion at a particular node. The proposed protocol outperforms the existing Packet Discard Network Clustering (PDNC) protocol in terms of buffer size, packet transmission range, network region and number of nodes, under various simulation scenarios. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=internet%20of%20things" title="internet of things">internet of things</a>, <a href="https://publications.waset.org/abstracts/search?q=cyber-physical%20systems" title=" cyber-physical systems"> cyber-physical systems</a>, <a href="https://publications.waset.org/abstracts/search?q=congestion%20control" title=" congestion control"> congestion control</a>, <a href="https://publications.waset.org/abstracts/search?q=priority" title=" priority"> priority</a>, <a href="https://publications.waset.org/abstracts/search?q=transmission%20rate" title=" transmission rate"> transmission rate</a> </p> <a href="https://publications.waset.org/abstracts/108306/multi-level-clustering-based-congestion-control-protocol-for-cyber-physical-systems" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/108306.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">312</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">9277</span> Enhancing the Network Security with Gray Code</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Thomas%20Adi%20Purnomo%20Sidhi">Thomas Adi Purnomo Sidhi</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Nowadays, network is an essential need in almost every part of human daily activities. People now can seamlessly connect to others through the Internet. With advanced technology, our personal data now can be more easily accessed. One of many components we are concerned for delivering the best network is a security issue. This paper is proposing a method that provides more options for security. This research aims to improve network security by focusing on the physical layer which is the first layer of the OSI model. The layer consists of the basic networking hardware transmission technologies of a network. With the use of observation method, the research produces a schematic design for enhancing the network security through the gray code converter. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=network" title="network">network</a>, <a href="https://publications.waset.org/abstracts/search?q=network%20security" title=" network security"> network security</a>, <a href="https://publications.waset.org/abstracts/search?q=grey%20code" title=" grey code"> grey code</a>, <a href="https://publications.waset.org/abstracts/search?q=physical%20layer" title=" physical layer"> physical layer</a> </p> <a href="https://publications.waset.org/abstracts/41361/enhancing-the-network-security-with-gray-code" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/41361.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">511</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">9276</span> Optimization of Traffic Agent Allocation for Minimizing Bus Rapid Transit Cost on Simplified Jakarta Network</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Gloria%20Patricia%20Manurung">Gloria Patricia Manurung</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Jakarta Bus Rapid Transit (BRT) system which was established in 2009 to reduce private vehicle usage and ease the rush hour gridlock throughout the Jakarta Greater area, has failed to achieve its purpose. With gradually increasing the number of private vehicles ownership and reduced road space by the BRT lane construction, private vehicle users intuitively invade the exclusive lane of BRT, creating local traffic along the BRT network. Invaded BRT lanes costs become the same with the road network, making BRT which is supposed to be the main public transportation in the city becoming unreliable. Efforts to guard critical lanes with preventing the invasion by allocating traffic agents at several intersections have been expended, lead to the improving congestion level along the lane. Given a set of number of traffic agents, this study uses an analytical approach to finding the best deployment strategy of traffic agent on a simplified Jakarta road network in minimizing the BRT link cost which is expected to lead to the improvement of BRT system time reliability. User-equilibrium model of traffic assignment is used to reproduce the origin-destination demand flow on the network and the optimum solution conventionally can be obtained with brute force algorithm. This method’s main constraint is that traffic assignment simulation time escalates exponentially with the increase of set of agent’s number and network size. Our proposed metaheuristic and heuristic algorithms perform linear simulation time increase and result in minimized BRT cost approaching to brute force algorithm optimization. Further analysis of the overall network link cost should be performed to see the impact of traffic agent deployment to the network system. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=traffic%20assignment" title="traffic assignment">traffic assignment</a>, <a href="https://publications.waset.org/abstracts/search?q=user%20equilibrium" title=" user equilibrium"> user equilibrium</a>, <a href="https://publications.waset.org/abstracts/search?q=greedy%20algorithm" title=" greedy algorithm"> greedy algorithm</a>, <a href="https://publications.waset.org/abstracts/search?q=optimization" title=" optimization"> optimization</a> </p> <a href="https://publications.waset.org/abstracts/54258/optimization-of-traffic-agent-allocation-for-minimizing-bus-rapid-transit-cost-on-simplified-jakarta-network" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/54258.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">237</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">9275</span> Performance Evaluation of Vertical Handover on Silom Line BTS</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Silumpa%20Suboonsan">Silumpa Suboonsan</a>, <a href="https://publications.waset.org/abstracts/search?q=Suwat%20Pattaramalai"> Suwat Pattaramalai</a> </p> <p class="card-text"><strong>Abstract:</strong></p> In this paper, the performance of internet usage by using Vertical Handover (VHO) between cellular network and wireless local area network (WLAN) on Silom line Bangkok Mass Transit System (BTS) is evaluated. In the evaluation model, there is the WLAN on every BTS station and there are cellular base stations along the BTS path. The maximum data rates for cellular network are 7.2, 14.4, 42, and 100Mbps and for WLAN are 54, 150, and 300Mbps. The simulation are based on users using internet, watching VDOs and browsing web pages, on the BTS train from first station to the last station (full time usage) and on the BTS train for traveling some number of stations (random time). The results shows that VHO system has throughput a lot more than using only cellular network when the data rate of WLAN is more than one of cellular network. Lastly, the number of watching HD VDO and Full HD VDO is higher on VHO system on both regular time and rush hour of BTS travelling. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=vertical%20handover" title="vertical handover">vertical handover</a>, <a href="https://publications.waset.org/abstracts/search?q=WLAN" title=" WLAN"> WLAN</a>, <a href="https://publications.waset.org/abstracts/search?q=cellular" title=" cellular"> cellular</a>, <a href="https://publications.waset.org/abstracts/search?q=silom%20line%20BTS" title=" silom line BTS"> silom line BTS</a> </p> <a href="https://publications.waset.org/abstracts/17241/performance-evaluation-of-vertical-handover-on-silom-line-bts" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/17241.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">482</span> </span> </div> </div> <ul class="pagination"> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=network%20simulation&page=1" rel="prev">‹</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=network%20simulation&page=1">1</a></li> <li class="page-item active"><span class="page-link">2</span></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=network%20simulation&page=3">3</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=network%20simulation&page=4">4</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=network%20simulation&page=5">5</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=network%20simulation&page=6">6</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=network%20simulation&page=7">7</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=network%20simulation&page=8">8</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=network%20simulation&page=9">9</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=network%20simulation&page=10">10</a></li> <li class="page-item disabled"><span class="page-link">...</span></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=network%20simulation&page=311">311</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=network%20simulation&page=312">312</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=network%20simulation&page=3" rel="next">›</a></li> </ul> </div> </main> <footer> <div id="infolinks" class="pt-3 pb-2"> <div class="container"> <div style="background-color:#f5f5f5;" class="p-3"> <div class="row"> <div class="col-md-2"> <ul class="list-unstyled"> About <li><a href="https://waset.org/page/support">About Us</a></li> <li><a href="https://waset.org/page/support#legal-information">Legal</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/WASET-16th-foundational-anniversary.pdf">WASET celebrates its 16th foundational anniversary</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Account <li><a href="https://waset.org/profile">My Account</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Explore <li><a href="https://waset.org/disciplines">Disciplines</a></li> <li><a href="https://waset.org/conferences">Conferences</a></li> <li><a href="https://waset.org/conference-programs">Conference Program</a></li> <li><a href="https://waset.org/committees">Committees</a></li> <li><a href="https://publications.waset.org">Publications</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Research <li><a href="https://publications.waset.org/abstracts">Abstracts</a></li> <li><a href="https://publications.waset.org">Periodicals</a></li> <li><a href="https://publications.waset.org/archive">Archive</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Open Science <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Open-Science-Philosophy.pdf">Open Science Philosophy</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Open-Science-Award.pdf">Open Science Award</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Open-Society-Open-Science-and-Open-Innovation.pdf">Open Innovation</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Postdoctoral-Fellowship-Award.pdf">Postdoctoral Fellowship Award</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Scholarly-Research-Review.pdf">Scholarly Research Review</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Support <li><a href="https://waset.org/page/support">Support</a></li> <li><a href="https://waset.org/profile/messages/create">Contact Us</a></li> <li><a href="https://waset.org/profile/messages/create">Report Abuse</a></li> </ul> </div> </div> </div> </div> </div> <div class="container text-center"> <hr style="margin-top:0;margin-bottom:.3rem;"> <a href="https://creativecommons.org/licenses/by/4.0/" target="_blank" class="text-muted small">Creative Commons Attribution 4.0 International License</a> <div id="copy" class="mt-2">© 2025 World Academy of Science, Engineering and Technology</div> </div> </footer> <a href="javascript:" id="return-to-top"><i class="fas fa-arrow-up"></i></a> <div class="modal" id="modal-template"> <div class="modal-dialog"> <div class="modal-content"> <div class="row m-0 mt-1"> <div class="col-md-12"> <button type="button" class="close" data-dismiss="modal" aria-label="Close"><span aria-hidden="true">×</span></button> </div> </div> <div class="modal-body"></div> </div> </div> </div> <script src="https://cdn.waset.org/static/plugins/jquery-3.3.1.min.js"></script> <script src="https://cdn.waset.org/static/plugins/bootstrap-4.2.1/js/bootstrap.bundle.min.js"></script> <script src="https://cdn.waset.org/static/js/site.js?v=150220211556"></script> <script> jQuery(document).ready(function() { /*jQuery.get("https://publications.waset.org/xhr/user-menu", function (response) { jQuery('#mainNavMenu').append(response); });*/ jQuery.get({ url: "https://publications.waset.org/xhr/user-menu", cache: false }).then(function(response){ jQuery('#mainNavMenu').append(response); }); }); </script> </body> </html>