CINXE.COM
Search results for: packet reordering
<!DOCTYPE html> <html lang="en" dir="ltr"> <head> <!-- Google tag (gtag.js) --> <script async src="https://www.googletagmanager.com/gtag/js?id=G-P63WKM1TM1"></script> <script> window.dataLayer = window.dataLayer || []; function gtag(){dataLayer.push(arguments);} gtag('js', new Date()); gtag('config', 'G-P63WKM1TM1'); </script> <!-- Yandex.Metrika counter --> <script type="text/javascript" > (function(m,e,t,r,i,k,a){m[i]=m[i]||function(){(m[i].a=m[i].a||[]).push(arguments)}; m[i].l=1*new Date(); for (var j = 0; j < document.scripts.length; j++) {if (document.scripts[j].src === r) { return; }} k=e.createElement(t),a=e.getElementsByTagName(t)[0],k.async=1,k.src=r,a.parentNode.insertBefore(k,a)}) (window, document, "script", "https://mc.yandex.ru/metrika/tag.js", "ym"); ym(55165297, "init", { clickmap:false, trackLinks:true, accurateTrackBounce:true, webvisor:false }); </script> <noscript><div><img src="https://mc.yandex.ru/watch/55165297" style="position:absolute; left:-9999px;" alt="" /></div></noscript> <!-- /Yandex.Metrika counter --> <!-- Matomo --> <!-- End Matomo Code --> <title>Search results for: packet reordering</title> <meta name="description" content="Search results for: packet reordering"> <meta name="keywords" content="packet reordering"> <meta name="viewport" content="width=device-width, initial-scale=1, minimum-scale=1, maximum-scale=1, user-scalable=no"> <meta charset="utf-8"> <link href="https://cdn.waset.org/favicon.ico" type="image/x-icon" rel="shortcut icon"> <link href="https://cdn.waset.org/static/plugins/bootstrap-4.2.1/css/bootstrap.min.css" rel="stylesheet"> <link href="https://cdn.waset.org/static/plugins/fontawesome/css/all.min.css" rel="stylesheet"> <link href="https://cdn.waset.org/static/css/site.css?v=150220211555" rel="stylesheet"> </head> <body> <header> <div class="container"> <nav class="navbar navbar-expand-lg navbar-light"> <a class="navbar-brand" href="https://waset.org"> <img src="https://cdn.waset.org/static/images/wasetc.png" alt="Open Science Research Excellence" title="Open Science Research Excellence" /> </a> <button class="d-block d-lg-none navbar-toggler ml-auto" type="button" data-toggle="collapse" data-target="#navbarMenu" aria-controls="navbarMenu" aria-expanded="false" aria-label="Toggle navigation"> <span class="navbar-toggler-icon"></span> </button> <div class="w-100"> <div class="d-none d-lg-flex flex-row-reverse"> <form method="get" action="https://waset.org/search" class="form-inline my-2 my-lg-0"> <input class="form-control mr-sm-2" type="search" placeholder="Search Conferences" value="packet reordering" name="q" aria-label="Search"> <button class="btn btn-light my-2 my-sm-0" type="submit"><i class="fas fa-search"></i></button> </form> </div> <div class="collapse navbar-collapse mt-1" id="navbarMenu"> <ul class="navbar-nav ml-auto align-items-center" id="mainNavMenu"> <li class="nav-item"> <a class="nav-link" href="https://waset.org/conferences" title="Conferences in 2024/2025/2026">Conferences</a> </li> <li class="nav-item"> <a class="nav-link" href="https://waset.org/disciplines" title="Disciplines">Disciplines</a> </li> <li class="nav-item"> <a class="nav-link" href="https://waset.org/committees" rel="nofollow">Committees</a> </li> <li class="nav-item dropdown"> <a class="nav-link dropdown-toggle" href="#" id="navbarDropdownPublications" role="button" data-toggle="dropdown" aria-haspopup="true" aria-expanded="false"> Publications </a> <div class="dropdown-menu" aria-labelledby="navbarDropdownPublications"> <a class="dropdown-item" href="https://publications.waset.org/abstracts">Abstracts</a> <a class="dropdown-item" href="https://publications.waset.org">Periodicals</a> <a class="dropdown-item" href="https://publications.waset.org/archive">Archive</a> </div> </li> <li class="nav-item"> <a class="nav-link" href="https://waset.org/page/support" title="Support">Support</a> </li> </ul> </div> </div> </nav> </div> </header> <main> <div class="container mt-4"> <div class="row"> <div class="col-md-9 mx-auto"> <form method="get" action="https://publications.waset.org/abstracts/search"> <div id="custom-search-input"> <div class="input-group"> <i class="fas fa-search"></i> <input type="text" class="search-query" name="q" placeholder="Author, Title, Abstract, Keywords" value="packet reordering"> <input type="submit" class="btn_search" value="Search"> </div> </div> </form> </div> </div> <div class="row mt-3"> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Commenced</strong> in January 2007</div> </div> </div> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Frequency:</strong> Monthly</div> </div> </div> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Edition:</strong> International</div> </div> </div> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Paper Count:</strong> 146</div> </div> </div> </div> <h1 class="mt-3 mb-3 text-center" style="font-size:1.6rem;">Search results for: packet reordering</h1> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">146</span> Analysis of Economic Order Quantity, Safety Stock, Maximum Inventory Control, Lot Size and Reorder Point for Engro Polymers and Chemicals</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Ali%20Akber%20Jaffri">Ali Akber Jaffri</a>, <a href="https://publications.waset.org/abstracts/search?q=Asad%20Naseem"> Asad Naseem</a>, <a href="https://publications.waset.org/abstracts/search?q=Javeria%20Khan"> Javeria Khan</a>, <a href="https://publications.waset.org/abstracts/search?q=Zubair%20Hamza"> Zubair Hamza</a>, <a href="https://publications.waset.org/abstracts/search?q=Ishtiaq"> Ishtiaq</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The purpose of this study is to determine safety stock, maximum inventory level, reordering point, and reordering quantity by rearranging lot sizes for supplier and customer in MRO (maintenance repair operations) warehouse of Engro Polymers & Chemicals. To achieve the aim, physical analysis method and excel commands were carried out to elicit the customer and supplier data provided by the company. Initially, we rearranged the current lot sizes and MOUs (measure of units) in SAP software. Due to change in lot sizes, we have to determine the new quantities for safety stock, maximum inventory, reordering point and reordering quantity as per company's demand. By proposed system, we saved extra cost in terms of reducing time of receiving from vendor and in issuance to customer, ease of material handling in MRO warehouse and also reduce human efforts. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=maintenance%20repair%20operation" title="maintenance repair operation">maintenance repair operation</a>, <a href="https://publications.waset.org/abstracts/search?q=maximum%20inventory" title=" maximum inventory"> maximum inventory</a>, <a href="https://publications.waset.org/abstracts/search?q=reorder%20quantity" title=" reorder quantity"> reorder quantity</a>, <a href="https://publications.waset.org/abstracts/search?q=safety%20stock" title=" safety stock"> safety stock</a> </p> <a href="https://publications.waset.org/abstracts/47482/analysis-of-economic-order-quantity-safety-stock-maximum-inventory-control-lot-size-and-reorder-point-for-engro-polymers-and-chemicals" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/47482.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">276</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">145</span> Digital Forensic Exploration Framework for Email and Instant Messaging Applications</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=T.%20Manesh">T. Manesh</a>, <a href="https://publications.waset.org/abstracts/search?q=Abdalla%20A.%20Alameen"> Abdalla A. Alameen</a>, <a href="https://publications.waset.org/abstracts/search?q=M.%20Mohemmed%20Sha"> M. Mohemmed Sha</a>, <a href="https://publications.waset.org/abstracts/search?q=A.%20Mohamed%20Mustaq%20Ahmed"> A. Mohamed Mustaq Ahmed</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Email and instant messaging applications are foremost and extensively used electronic communication methods in this era of information explosion. These applications are generally used for exchange of information using several frontend applications from various service providers by its users. Almost all such communications are now secured using SSL or TLS security over HTTP communication. At the same time, it is also noted that cyber criminals and terrorists have started exchanging information using these methods. Since communication is encrypted end-to-end, tracing significant forensic details and actual content of messages are found to be unattended and severe challenges by available forensic tools. These challenges seriously affect in procuring substantial evidences against such criminals from their working environments. This paper presents a vibrant forensic exploration and architectural framework which not only decrypts any communication or network session but also reconstructs actual message contents of email as well as instant messaging applications. The framework can be effectively used in proxy servers and individual computers and it aims to perform forensic reconstruction followed by analysis of webmail and ICQ messaging applications. This forensic framework exhibits a versatile nature as it is equipped with high speed packet capturing hardware, a well-designed packet manipulating algorithm. It regenerates message contents over regular as well as SSL encrypted SMTP, POP3 and IMAP protocols and catalyzes forensic presentation procedure for prosecution of cyber criminals by producing solid evidences of their actual communication as per court of law of specific countries. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=forensics" title="forensics">forensics</a>, <a href="https://publications.waset.org/abstracts/search?q=network%20sessions" title=" network sessions"> network sessions</a>, <a href="https://publications.waset.org/abstracts/search?q=packet%20reconstruction" title=" packet reconstruction"> packet reconstruction</a>, <a href="https://publications.waset.org/abstracts/search?q=packet%20reordering" title=" packet reordering"> packet reordering</a> </p> <a href="https://publications.waset.org/abstracts/57591/digital-forensic-exploration-framework-for-email-and-instant-messaging-applications" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/57591.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">344</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">144</span> Analysis of Inventory Control, Lot Size and Reorder Point for Engro Polymers and Chemicals</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Ali%20Akber%20Jaffri">Ali Akber Jaffri</a>, <a href="https://publications.waset.org/abstracts/search?q=Asad%20Naseem"> Asad Naseem</a>, <a href="https://publications.waset.org/abstracts/search?q=Javeria%20Khan"> Javeria Khan</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The purpose of this study is to determine safety stock, maximum inventory level, reordering point, and reordering quantity by rearranging lot sizes for supplier and customer in MRO (maintenance repair operations) warehouse of Engro Polymers & Chemicals. To achieve the aim, physical analysis method and excel commands were carried out to elicit the customer and supplier data provided by the company. Initially, we rearranged the current lot sizes and MOUs (measure of units) in SAP software. Due to change in lot sizes we have to determine the new quantities for safety stock, maximum inventory, reordering point and reordering quantity as per company's demand. By proposed system, we saved extra cost in terms of reducing the time of receiving from vendor and in issuance to customer, ease of material handling in MRO warehouse and also reduce human efforts. The information requirements identified in this study can be utilized in calculating Economic Order Quantity. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=carrying%20cost" title="carrying cost">carrying cost</a>, <a href="https://publications.waset.org/abstracts/search?q=economic%20order%20quantity" title=" economic order quantity"> economic order quantity</a>, <a href="https://publications.waset.org/abstracts/search?q=fast%20moving" title=" fast moving"> fast moving</a>, <a href="https://publications.waset.org/abstracts/search?q=lead%20time" title=" lead time"> lead time</a>, <a href="https://publications.waset.org/abstracts/search?q=lot%20size" title=" lot size"> lot size</a>, <a href="https://publications.waset.org/abstracts/search?q=MRO" title=" MRO"> MRO</a>, <a href="https://publications.waset.org/abstracts/search?q=maximum%20inventory" title=" maximum inventory"> maximum inventory</a>, <a href="https://publications.waset.org/abstracts/search?q=ordering%20cost" title=" ordering cost"> ordering cost</a>, <a href="https://publications.waset.org/abstracts/search?q=physical%20inspection" title=" physical inspection"> physical inspection</a>, <a href="https://publications.waset.org/abstracts/search?q=reorder%20point" title=" reorder point"> reorder point</a> </p> <a href="https://publications.waset.org/abstracts/46048/analysis-of-inventory-control-lot-size-and-reorder-point-for-engro-polymers-and-chemicals" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/46048.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">239</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">143</span> Multi-Focus Image Fusion Using SFM and Wavelet Packet</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Somkait%20Udomhunsakul">Somkait Udomhunsakul</a> </p> <p class="card-text"><strong>Abstract:</strong></p> In this paper, a multi-focus image fusion method using Spatial Frequency Measurements (SFM) and Wavelet Packet was proposed. The proposed fusion approach, firstly, the two fused images were transformed and decomposed into sixteen subbands using Wavelet packet. Next, each subband was partitioned into sub-blocks and each block was identified the clearer regions by using the Spatial Frequency Measurement (SFM). Finally, the recovered fused image was reconstructed by performing the Inverse Wavelet Transform. From the experimental results, it was found that the proposed method outperformed the traditional SFM based methods in terms of objective and subjective assessments. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=multi-focus%20image%20fusion" title="multi-focus image fusion">multi-focus image fusion</a>, <a href="https://publications.waset.org/abstracts/search?q=wavelet%20packet" title=" wavelet packet"> wavelet packet</a>, <a href="https://publications.waset.org/abstracts/search?q=spatial%20frequency%20measurement" title=" spatial frequency measurement"> spatial frequency measurement</a> </p> <a href="https://publications.waset.org/abstracts/4886/multi-focus-image-fusion-using-sfm-and-wavelet-packet" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/4886.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">474</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">142</span> Avoiding Packet Drop for Improved through Put in the Multi-Hop Wireless N/W</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Manish%20Kumar%20Rajak">Manish Kumar Rajak</a>, <a href="https://publications.waset.org/abstracts/search?q=Sanjay%20Gupta"> Sanjay Gupta</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Mobile ad hoc networks (MANETs) are infrastructure less and intercommunicate using single-hop and multi-hop paths. Network based congestion avoidance which involves managing the queues in the network devices is an integral part of any network. QoS: A set of service requirements that are met by the network while transferring a packet stream from a source to a destination. Especially in MANETs, packet loss results in increased overheads. This paper presents a new algorithm to avoid congestion using one or more queue on nodes and corresponding flow rate decided in advance for each node. When any node attains an initial value of queue then it sends this status to its downstream nodes which in turn uses the pre-decided flow rate of packet transfer to its upstream nodes. The flow rate on each node is adjusted according to the status received from its upstream nodes. This proposed algorithm uses the existing infrastructure to inform to other nodes about its current queue status. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=mesh%20networks" title="mesh networks">mesh networks</a>, <a href="https://publications.waset.org/abstracts/search?q=MANET" title=" MANET"> MANET</a>, <a href="https://publications.waset.org/abstracts/search?q=packet%20count" title=" packet count"> packet count</a>, <a href="https://publications.waset.org/abstracts/search?q=threshold" title=" threshold"> threshold</a>, <a href="https://publications.waset.org/abstracts/search?q=throughput" title=" throughput"> throughput</a> </p> <a href="https://publications.waset.org/abstracts/23702/avoiding-packet-drop-for-improved-through-put-in-the-multi-hop-wireless-nw" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/23702.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">474</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">141</span> Analysis of Interleaving Scheme for Narrowband VoIP System under Pervasive Environment</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Monica%20Sharma">Monica Sharma</a>, <a href="https://publications.waset.org/abstracts/search?q=Harjit%20Pal%20Singh"> Harjit Pal Singh</a>, <a href="https://publications.waset.org/abstracts/search?q=Jasbinder%20Singh"> Jasbinder Singh</a>, <a href="https://publications.waset.org/abstracts/search?q=Manju%20Bala"> Manju Bala</a> </p> <p class="card-text"><strong>Abstract:</strong></p> In Voice over Internet Protocol (VoIP) system, the speech signal is degraded when passed through the network layers. The speech signal is processed through the best effort policy based IP network, which leads to the network degradations including delay, packet loss and jitter. The packet loss is the major issue of the degradation in the VoIP signal quality; even a single lost packet may generate audible distortion in the decoded speech signal. In addition to these network degradations, the quality of the speech signal is also affected by the environmental noises and coder distortions. The signal quality of the VoIP system is improved through the interleaving technique. The performance of the system is evaluated for various types of noises at different network conditions. The performance of the enhanced VoIP signal is evaluated using perceptual evaluation of speech quality (PESQ) measurement for narrow band signal. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=VoIP" title="VoIP">VoIP</a>, <a href="https://publications.waset.org/abstracts/search?q=interleaving" title=" interleaving"> interleaving</a>, <a href="https://publications.waset.org/abstracts/search?q=packet%20loss" title=" packet loss"> packet loss</a>, <a href="https://publications.waset.org/abstracts/search?q=packet%20size" title=" packet size"> packet size</a>, <a href="https://publications.waset.org/abstracts/search?q=background%20noise" title=" background noise "> background noise </a> </p> <a href="https://publications.waset.org/abstracts/14305/analysis-of-interleaving-scheme-for-narrowband-voip-system-under-pervasive-environment" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/14305.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">479</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">140</span> Airy Wave Packet for a Particle in a Time-Dependant Linear Potential </h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=M.%20Berrehail">M. Berrehail</a>, <a href="https://publications.waset.org/abstracts/search?q=F.%20Benamira"> F. Benamira</a> </p> <p class="card-text"><strong>Abstract:</strong></p> We study the quantum motion of a particle in the presence of a time- dependent linear potential using an operator invariant that is quadratic in p and linear in q within the framework of the Lewis-Riesenfeld invariant, The special invariant operator proposed in this work is demonstrated to be an Hermitian operator which has an Airy wave packet as its Eigenfunction <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=airy%20wave%20packet" title="airy wave packet">airy wave packet</a>, <a href="https://publications.waset.org/abstracts/search?q=ivariant" title=" ivariant"> ivariant</a>, <a href="https://publications.waset.org/abstracts/search?q=time-dependent%20linear%20potential" title=" time-dependent linear potential"> time-dependent linear potential</a>, <a href="https://publications.waset.org/abstracts/search?q=unitary%20transformation" title=" unitary transformation"> unitary transformation</a> </p> <a href="https://publications.waset.org/abstracts/31077/airy-wave-packet-for-a-particle-in-a-time-dependant-linear-potential" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/31077.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">492</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">139</span> Analysis of the IEEE 802.15.4 MAC Parameters to Achive Lower Packet Loss Rates</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Imen%20Bouazzi">Imen Bouazzi</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The IEEE-802.15.4 standard utilizes the CSMA-CA mechanism to control nodes access to the shared wireless communication medium. It is becoming the popular choice for various applications of surveillance and control used in wireless sensor network (WSN). The benefit of this standard is evaluated regarding of the packet loss probability who depends on the configuration of IEEE 802.15.4 MAC parameters and the traffic load. Our exigency is to evaluate the effects of various configurable MAC parameters on the performance of beaconless IEEE 802.15.4 networks under different traffic loads, static values of IEEE 802.15.4 MAC parameters (macMinBE, macMaxCSMABackoffs, and macMaxFrame Retries) will be evaluated. To performance analysis, we use ns-2[2] network simulator. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=WSN" title="WSN">WSN</a>, <a href="https://publications.waset.org/abstracts/search?q=packet%20loss" title=" packet loss"> packet loss</a>, <a href="https://publications.waset.org/abstracts/search?q=CSMA%2FCA" title=" CSMA/CA"> CSMA/CA</a>, <a href="https://publications.waset.org/abstracts/search?q=IEEE-802.15.4" title=" IEEE-802.15.4 "> IEEE-802.15.4 </a> </p> <a href="https://publications.waset.org/abstracts/21701/analysis-of-the-ieee-802154-mac-parameters-to-achive-lower-packet-loss-rates" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/21701.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">340</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">138</span> A Packet Loss Probability Estimation Filter Using Most Recent Finite Traffic Measurements</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Pyung%20Soo%20Kim">Pyung Soo Kim</a>, <a href="https://publications.waset.org/abstracts/search?q=Eung%20Hyuk%20Lee"> Eung Hyuk Lee</a>, <a href="https://publications.waset.org/abstracts/search?q=Mun%20Suck%20Jang"> Mun Suck Jang</a> </p> <p class="card-text"><strong>Abstract:</strong></p> A packet loss probability (PLP) estimation filter with finite memory structure is proposed to estimate the packet rate mean and variance of the input traffic process in real-time while removing undesired system and measurement noises. The proposed PLP estimation filter is developed under a weighted least square criterion using only the finite traffic measurements on the most recent window. The proposed PLP estimation filter is shown to have several inherent properties such as unbiasedness, deadbeat, robustness. A guideline for choosing appropriate window length is described since it can affect significantly the estimation performance. Using computer simulations, the proposed PLP estimation filter is shown to be superior to the Kalman filter for the temporarily uncertain system. One possible explanation for this is that the proposed PLP estimation filter can have greater convergence time of a filtered estimate as the window length M decreases. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=packet%20loss%20probability%20estimation" title="packet loss probability estimation">packet loss probability estimation</a>, <a href="https://publications.waset.org/abstracts/search?q=finite%20memory%20filter" title=" finite memory filter"> finite memory filter</a>, <a href="https://publications.waset.org/abstracts/search?q=infinite%20memory%20filter" title=" infinite memory filter"> infinite memory filter</a>, <a href="https://publications.waset.org/abstracts/search?q=Kalman%20filter" title=" Kalman filter"> Kalman filter</a> </p> <a href="https://publications.waset.org/abstracts/9519/a-packet-loss-probability-estimation-filter-using-most-recent-finite-traffic-measurements" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/9519.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">674</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">137</span> Feature Extraction Technique for Prediction the Antigenic Variants of the Influenza Virus</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Majid%20Forghani">Majid Forghani</a>, <a href="https://publications.waset.org/abstracts/search?q=Michael%20Khachay"> Michael Khachay</a> </p> <p class="card-text"><strong>Abstract:</strong></p> In genetics, the impact of neighboring amino acids on a target site is referred as the nearest-neighbor effect or simply neighbor effect. In this paper, a new method called wavelet particle decomposition representing the one-dimensional neighbor effect using wavelet packet decomposition is proposed. The main idea lies in known dependence of wavelet packet sub-bands on location and order of neighboring samples. The method decomposes the value of a signal sample into small values called particles that represent a part of the neighbor effect information. The results have shown that the information obtained from the particle decomposition can be used to create better model variables or features. As an example, the approach has been applied to improve the correlation of test and reference sequence distance with titer in the hemagglutination inhibition assay. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=antigenic%20variants" title="antigenic variants">antigenic variants</a>, <a href="https://publications.waset.org/abstracts/search?q=neighbor%20effect" title=" neighbor effect"> neighbor effect</a>, <a href="https://publications.waset.org/abstracts/search?q=wavelet%20packet" title=" wavelet packet"> wavelet packet</a>, <a href="https://publications.waset.org/abstracts/search?q=wavelet%20particle%20decomposition" title=" wavelet particle decomposition"> wavelet particle decomposition</a> </p> <a href="https://publications.waset.org/abstracts/96149/feature-extraction-technique-for-prediction-the-antigenic-variants-of-the-influenza-virus" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/96149.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">157</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">136</span> A Reactive Fast Inter-MAP Handover for Hierarchical Mobile IPv6</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Pyung%20Soo%20Kim">Pyung Soo Kim</a> </p> <p class="card-text"><strong>Abstract:</strong></p> This paper proposes an optimized reactive fast intermobility anchor point (MAP) handover scheme for Hierarchical Mobile IPv6, called the ORFH-HMIPv6, to minimize packet loss of the existing scheme. The key idea of the proposed ORFHHMIPv6 scheme is that the serving MAP buffers packets toward the mobile node (MN) as soon as the link layer between MN and serving base station is disconnected. To implement the proposed scheme, the MAP discovery message exchanged between MN and serving MAP is extended. In addition, the IEEE 802.21 Media Independent Handover Function (MIHF) event service message is defined newly. Through analytic performance evaluation, the proposed ORFH-HMIPv6 scheme can be shown to minimize packet loss much than the existing scheme. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=hierarchical%20mobile%20IPv6%20%28HMIPv6%29" title="hierarchical mobile IPv6 (HMIPv6)">hierarchical mobile IPv6 (HMIPv6)</a>, <a href="https://publications.waset.org/abstracts/search?q=fast%20handover" title=" fast handover"> fast handover</a>, <a href="https://publications.waset.org/abstracts/search?q=reactive%20behavior" title=" reactive behavior"> reactive behavior</a>, <a href="https://publications.waset.org/abstracts/search?q=packet%20loss" title=" packet loss"> packet loss</a> </p> <a href="https://publications.waset.org/abstracts/47084/a-reactive-fast-inter-map-handover-for-hierarchical-mobile-ipv6" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/47084.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">213</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">135</span> Enhancing Throughput for Wireless Multihop Networks</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=K.%20Kalaiarasan">K. Kalaiarasan</a>, <a href="https://publications.waset.org/abstracts/search?q=B.%20Pandeeswari"> B. Pandeeswari</a>, <a href="https://publications.waset.org/abstracts/search?q=A.%20Arockia%20John%20Francis"> A. Arockia John Francis </a> </p> <p class="card-text"><strong>Abstract:</strong></p> Wireless, Multi-hop networks consist of one or more intermediate nodes along the path that receive and forward packets via wireless links. The backpressure algorithm provides throughput optimal routing and scheduling decisions for multi-hop networks with dynamic traffic. Xpress, a cross-layer backpressure architecture was designed to reach the capacity of wireless multi-hop networks and it provides well coordination between layers of network by turning a mesh network into a wireless switch. Transmission over the network is scheduled using a throughput-optimal backpressure algorithm. But this architecture operates much below their capacity due to out-of-order packet delivery and variable packet size. In this paper, we present Xpress-T, a throughput optimal backpressure architecture with TCP support designed to reach maximum throughput of wireless multi-hop networks. Xpress-T operates at the IP layer, and therefore any transport protocol, including TCP, can run on top of Xpress-T. The proposed design not only avoids bottlenecks but also handles out-of-order packet delivery and variable packet size, optimally load-balances traffic across them when needed, improving fairness among competing flows. Our simulation results shows that Xpress-T gives 65% more throughput than Xpress. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=backpressure%20scheduling%20and%20routing" title="backpressure scheduling and routing">backpressure scheduling and routing</a>, <a href="https://publications.waset.org/abstracts/search?q=TCP" title=" TCP"> TCP</a>, <a href="https://publications.waset.org/abstracts/search?q=congestion%20control" title=" congestion control"> congestion control</a>, <a href="https://publications.waset.org/abstracts/search?q=wireless%20multihop%20network" title=" wireless multihop network"> wireless multihop network</a> </p> <a href="https://publications.waset.org/abstracts/30049/enhancing-throughput-for-wireless-multihop-networks" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/30049.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">518</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">134</span> An Enhanced Connectivity Aware Routing Protocol for Vehicular Ad Hoc Networks</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Ahmadu%20Maidorawa">Ahmadu Maidorawa</a>, <a href="https://publications.waset.org/abstracts/search?q=Kamalrulnizam%20Abu%20Bakar"> Kamalrulnizam Abu Bakar</a> </p> <p class="card-text"><strong>Abstract:</strong></p> This paper proposed an Enhanced Connectivity Aware Routing (ECAR) protocol for Vehicular Ad hoc Network (VANET). The protocol uses a control broadcast to reduce the number of overhead packets needed in a route discovery process. It is also equipped with an alternative backup route that is used whenever a primary path to destination failed, which highly reduces the frequent launching and re-launching of the route discovery process that waste useful bandwidth and unnecessarily prolonging the average packet delay. NS2 simulation results show that the performance of ECAR protocol outperformed the original connectivity aware routing (CAR) protocol by reducing the average packet delay by 28%, control overheads by 27% and increased the packet delivery ratio by 22%. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=alternative%20path" title="alternative path">alternative path</a>, <a href="https://publications.waset.org/abstracts/search?q=primary%20path" title=" primary path"> primary path</a>, <a href="https://publications.waset.org/abstracts/search?q=protocol" title=" protocol"> protocol</a>, <a href="https://publications.waset.org/abstracts/search?q=routing" title=" routing"> routing</a>, <a href="https://publications.waset.org/abstracts/search?q=VANET" title=" VANET"> VANET</a>, <a href="https://publications.waset.org/abstracts/search?q=vehicular%20ad%20hoc%20networks" title=" vehicular ad hoc networks"> vehicular ad hoc networks</a> </p> <a href="https://publications.waset.org/abstracts/15880/an-enhanced-connectivity-aware-routing-protocol-for-vehicular-ad-hoc-networks" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/15880.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">402</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">133</span> Energy Efficient Clustering with Reliable and Load-Balanced Multipath Routing for Wireless Sensor Networks</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Alamgir%20Naushad">Alamgir Naushad</a>, <a href="https://publications.waset.org/abstracts/search?q=Ghulam%20Abbas"> Ghulam Abbas</a>, <a href="https://publications.waset.org/abstracts/search?q=Shehzad%20Ali%20Shah"> Shehzad Ali Shah</a>, <a href="https://publications.waset.org/abstracts/search?q=Ziaul%20Haq%20Abbas"> Ziaul Haq Abbas</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Unlike conventional networks, it is particularly challenging to manage resources efficiently in Wireless Sensor Networks (WSNs) due to their inherent characteristics, such as dynamic network topology and limited bandwidth and battery power. To ensure energy efficiency, this paper presents a routing protocol for WSNs, namely, Enhanced Hybrid Multipath Routing (EHMR), which employs hierarchical clustering and proposes a next hop selection mechanism between nodes according to a maximum residual energy metric together with a minimum hop count. Load-balancing of data traffic over multiple paths is achieved for a better packet delivery ratio and low latency rate. Reliability is ensured in terms of higher data rate and lower end-to-end delay. EHMR also enhances the fast-failure recovery mechanism to recover a failed path. Simulation results demonstrate that EHMR achieves a higher packet delivery ratio, reduced energy consumption per-packet delivery, lower end-to-end latency, and reduced effect of data rate on packet delivery ratio when compared with eminent WSN routing protocols. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=energy%20efficiency" title="energy efficiency">energy efficiency</a>, <a href="https://publications.waset.org/abstracts/search?q=load-balancing" title=" load-balancing"> load-balancing</a>, <a href="https://publications.waset.org/abstracts/search?q=hierarchical%20clustering" title=" hierarchical clustering"> hierarchical clustering</a>, <a href="https://publications.waset.org/abstracts/search?q=multipath%20routing" title=" multipath routing"> multipath routing</a>, <a href="https://publications.waset.org/abstracts/search?q=wireless%20sensor%20networks" title=" wireless sensor networks"> wireless sensor networks</a> </p> <a href="https://publications.waset.org/abstracts/169528/energy-efficient-clustering-with-reliable-and-load-balanced-multipath-routing-for-wireless-sensor-networks" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/169528.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">85</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">132</span> The OQAM-OFDM System Using WPT/IWPT Replaced FFT/IFFT</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Alaa%20H.%20Thabet">Alaa H. Thabet</a>, <a href="https://publications.waset.org/abstracts/search?q=Ehab%20F.%20Badran"> Ehab F. Badran</a>, <a href="https://publications.waset.org/abstracts/search?q=Moustafa%20H.%20Aly"> Moustafa H. Aly</a> </p> <p class="card-text"><strong>Abstract:</strong></p> With the rapid expand of wireless digital communications, demand for wireless systems that are reliable and have a high spectral efficiency have increased too. FBMC scheme based on the OFDM/OQAM has been recognized for its good performance to achieve high data rates. Fast Fourier Transforms (FFT) has been used to produce the orthogonal sub-carriers. Due to the drawbacks of OFDM -FFT based system which are the high peak-to-average ratio (PAR) and the synchronization. In this paper, Wavelet Packet Transform (WPT) is used in the place of FFT, and show better performance. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=OQAM-OFDM" title="OQAM-OFDM">OQAM-OFDM</a>, <a href="https://publications.waset.org/abstracts/search?q=wavelet%20packet%20transform" title=" wavelet packet transform"> wavelet packet transform</a>, <a href="https://publications.waset.org/abstracts/search?q=PAPR" title=" PAPR"> PAPR</a>, <a href="https://publications.waset.org/abstracts/search?q=FFT" title=" FFT"> FFT</a> </p> <a href="https://publications.waset.org/abstracts/28850/the-oqam-ofdm-system-using-wptiwpt-replaced-fftifft" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/28850.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">460</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">131</span> Packet Fragmentation Caused by Encryption and Using It as a Security Method</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Said%20Rabah%20Azzam">Said Rabah Azzam</a>, <a href="https://publications.waset.org/abstracts/search?q=Andrew%20Graham"> Andrew Graham</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Fragmentation of packets caused by encryption applied on the network layer of the IOS model in Internet Protocol version 4 (IPv4) networks as well as the possibility of using fragmentation and Access Control Lists (ACLs) as a method of restricting network access to certain hosts or areas of a network.Using default settings, fragmentation is expected to occur and each fragment to be reassembled at the other end. If this does not occur then a high number of ICMP messages should be generated back towards the source host indicating that the packet is too large and that it needs to be made smaller. This result is also expected when the MTU is changed for certain links between devices.When using ACLs and packet fragments to restrict access to hosts or network segments it is possible that ACLs cannot be set up in this way. If ACLs cannot be setup to allow only fragments then it is a limitation of the hardware’s firmware holding back this particular method. If the ACL on the restricted switch can be set up in such a way to allow only fragments then a connection that forces packets to fragment should be allowed to pass through the ACL. This should then make a network connection to the destination machine allowing data to be sent to and from the destination machine. ICMP messages from the restricted access switch and host should also be blocked from being sent back across the link which will be shown in an SSH session into the switch. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=fragmentation" title="fragmentation">fragmentation</a>, <a href="https://publications.waset.org/abstracts/search?q=encryption" title=" encryption"> encryption</a>, <a href="https://publications.waset.org/abstracts/search?q=security" title=" security"> security</a>, <a href="https://publications.waset.org/abstracts/search?q=switch" title=" switch "> switch </a> </p> <a href="https://publications.waset.org/abstracts/30056/packet-fragmentation-caused-by-encryption-and-using-it-as-a-security-method" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/30056.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">336</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">130</span> An Enhanced Hybrid Backoff Technique for Minimizing the Occurrence of Collision in Mobile Ad Hoc Networks</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=N.%20Sabiyath%20Fatima">N. Sabiyath Fatima</a>, <a href="https://publications.waset.org/abstracts/search?q=R.%20K.%20Shanmugasundaram"> R. K. Shanmugasundaram</a> </p> <p class="card-text"><strong>Abstract:</strong></p> In Mobile Ad-hoc Networks (MANETS), every node performs both as transmitter and receiver. The existing backoff models do not exactly forecast the performance of the wireless network. Also, the existing models experience elevated packet collisions. Every time a collision happens, the station’s contention window (CW) is doubled till it arrives at the utmost value. The main objective of this paper is to diminish collision by means of contention window Multiplicative Increase Decrease Backoff (CWMIDB) scheme. The intention of rising CW is to shrink the collision possibility by distributing the traffic into an outsized point in time. Within wireless Ad hoc networks, the CWMIDB algorithm dynamically controls the contention window of the nodes experiencing collisions. During packet communication, the backoff counter is evenly selected from the given choice of [0, CW-1]. At this point, CW is recognized as contention window and its significance lies on the amount of unsuccessful transmission that had happened for the packet. On the initial transmission endeavour, CW is put to least amount value (C min), if transmission effort fails, subsequently the value gets doubled, and once more the value is set to least amount on victorious broadcast. CWMIDB is simulated inside NS2 environment and its performance is compared with Binary Exponential Backoff Algorithm. The simulation results show improvement in transmission probability compared to that of the existing backoff algorithm. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=backoff" title="backoff">backoff</a>, <a href="https://publications.waset.org/abstracts/search?q=contention%20window" title=" contention window"> contention window</a>, <a href="https://publications.waset.org/abstracts/search?q=CWMIDB" title=" CWMIDB"> CWMIDB</a>, <a href="https://publications.waset.org/abstracts/search?q=MANET" title=" MANET"> MANET</a> </p> <a href="https://publications.waset.org/abstracts/77080/an-enhanced-hybrid-backoff-technique-for-minimizing-the-occurrence-of-collision-in-mobile-ad-hoc-networks" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/77080.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">277</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">129</span> Multi-Level Clustering Based Congestion Control Protocol for Cyber Physical Systems</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Manpreet%20Kaur">Manpreet Kaur</a>, <a href="https://publications.waset.org/abstracts/search?q=Amita%20Rani"> Amita Rani</a>, <a href="https://publications.waset.org/abstracts/search?q=Sanjay%20Kumar"> Sanjay Kumar</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The Internet of Things (IoT), a cyber-physical paradigm, allows a large number of devices to connect and send the sensory data in the network simultaneously. This tremendous amount of data generated leads to very high network load consequently resulting in network congestion. It further amounts to frequent loss of useful information and depletion of significant amount of nodes’ energy. Therefore, there is a need to control congestion in IoT so as to prolong network lifetime and improve the quality of service (QoS). Hence, we propose a two-level clustering based routing algorithm considering congestion score and packet priority metrics that focus on minimizing the network congestion. In the proposed Priority based Congestion Control (PBCC) protocol the sensor nodes in IoT network form clusters that reduces the amount of traffic and the nodes are prioritized to emphasize important data. Simultaneously, a congestion score determines the occurrence of congestion at a particular node. The proposed protocol outperforms the existing Packet Discard Network Clustering (PDNC) protocol in terms of buffer size, packet transmission range, network region and number of nodes, under various simulation scenarios. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=internet%20of%20things" title="internet of things">internet of things</a>, <a href="https://publications.waset.org/abstracts/search?q=cyber-physical%20systems" title=" cyber-physical systems"> cyber-physical systems</a>, <a href="https://publications.waset.org/abstracts/search?q=congestion%20control" title=" congestion control"> congestion control</a>, <a href="https://publications.waset.org/abstracts/search?q=priority" title=" priority"> priority</a>, <a href="https://publications.waset.org/abstracts/search?q=transmission%20rate" title=" transmission rate"> transmission rate</a> </p> <a href="https://publications.waset.org/abstracts/108306/multi-level-clustering-based-congestion-control-protocol-for-cyber-physical-systems" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/108306.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">308</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">128</span> A Performance Analysis of Different Scheduling Schemes in WiMAX</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=A.%20Youseef">A. Youseef</a> </p> <p class="card-text"><strong>Abstract:</strong></p> One of the most aims of IEEE 802.16 (WiMAX) is to present high-speed wireless access to cover wide range coverage. The base station (BS) and the subscriber station (SS) are the main parts of WiMAX. WiMAX uses either Point-to-Multipoint (PMP) or mesh topologies. In the PMP mode, the SSs connect to the BS to gain access to the network. However, in the mesh mode, the SSs connect to each other to gain access to the BS. The main components of QoS management in the 802.16 standard are the admission control, buffer management, and packet scheduling. There are several researches proposed to create an efficient packet scheduling schemes. Therefore, we use QualNet 5.0.2 to study the performance of different scheduling schemes, such as WFQ, SCFQ, RR, and SP when the numbers of SSs increase. We find that when the number of SSs increases, the average jitter and average end-to-end delay is increased and the throughput is reduced. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=WiMAX" title="WiMAX">WiMAX</a>, <a href="https://publications.waset.org/abstracts/search?q=scheduling%20scheme" title=" scheduling scheme"> scheduling scheme</a>, <a href="https://publications.waset.org/abstracts/search?q=QoS" title=" QoS"> QoS</a>, <a href="https://publications.waset.org/abstracts/search?q=QualNet" title=" QualNet"> QualNet</a> </p> <a href="https://publications.waset.org/abstracts/22519/a-performance-analysis-of-different-scheduling-schemes-in-wimax" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/22519.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">456</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">127</span> Ternary Content Addressable Memory Cell with a Leakage Reduction Technique</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Gagnesh%20Kumar">Gagnesh Kumar</a>, <a href="https://publications.waset.org/abstracts/search?q=Nitin%20Gupta"> Nitin Gupta</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Ternary Content Addressable Memory cells are mainly popular in network routers for packet forwarding and packet classification, but they are also useful in a variety of other applications that require high-speed table look-up. The main TCAM-design challenge is to decrease the power consumption associated with the large amount of parallel active circuitry, without compromising with speed or memory density. Furthermore, when the channel length decreases, leakage power becomes more significant, and it can even dominate dynamic power at lower technologies. In this paper, we propose a TCAM-design technique, called Virtual Power Supply technique that reduces the leakage by a substantial amount. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=match%20line%20%28ML%29" title="match line (ML)">match line (ML)</a>, <a href="https://publications.waset.org/abstracts/search?q=search%20line%20%28SL%29" title=" search line (SL)"> search line (SL)</a>, <a href="https://publications.waset.org/abstracts/search?q=ternary%20content%20addressable%20memory%20%28TCAM%29" title=" ternary content addressable memory (TCAM)"> ternary content addressable memory (TCAM)</a>, <a href="https://publications.waset.org/abstracts/search?q=Leakage%20power%20%28LP%29" title=" Leakage power (LP)"> Leakage power (LP)</a> </p> <a href="https://publications.waset.org/abstracts/52223/ternary-content-addressable-memory-cell-with-a-leakage-reduction-technique" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/52223.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">299</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">126</span> Time-Evolving Wave Packet in Phase Space</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Mitsuyoshi%20Tomiya">Mitsuyoshi Tomiya</a>, <a href="https://publications.waset.org/abstracts/search?q=Kentaro%20Kawamura"> Kentaro Kawamura</a>, <a href="https://publications.waset.org/abstracts/search?q=Shoichi%20Sakamoto"> Shoichi Sakamoto</a> </p> <p class="card-text"><strong>Abstract:</strong></p> In chaotic billiard systems, scar-like localization has been found on time-evolving wave packet. We may call it the “dynamical scar” to separate it to the original scar in stationary states. It also comes out along the vicinity of classical unstable periodic orbits, when the wave packets are launched along the orbits, against the hypothesis that the waves become homogenous all around the billiard. Then time-evolving wave packets are investigated numerically in phase space. The Wigner function is adopted to detect the wave packets in phase space. The 2-dimensional Poincaré sections of the 4-dimensional phase space are introduced to clarify the dynamical behavior of the wave packets. The Poincaré sections of the coordinate (x or y) and the momentum (Px or Py) can visualize the dynamical behavior of the wave packets, including the behavior in the momentum degree also. For example, in “dynamical scar” states, a bit larger momentum component comes first, and then the a bit smaller and smaller components follow next. The sections made in the momentum space (Px or Py) elucidates specific trajectories that have larger contribution to the “dynamical scar” states. It is the fixed point observation of the momentum degrees at a specific fixed point(x0, y0) in the phase space. The accumulation are also calculated to search the “dynamical scar” in the Poincare sections. It is found the scars as bright spots in momentum degrees of the phase space. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=chaotic%20billiard" title="chaotic billiard">chaotic billiard</a>, <a href="https://publications.waset.org/abstracts/search?q=Poincar%C3%A9%20section" title=" Poincaré section"> Poincaré section</a>, <a href="https://publications.waset.org/abstracts/search?q=scar" title=" scar"> scar</a>, <a href="https://publications.waset.org/abstracts/search?q=wave%20packet" title=" wave packet"> wave packet</a> </p> <a href="https://publications.waset.org/abstracts/32869/time-evolving-wave-packet-in-phase-space" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/32869.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">452</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">125</span> Spatial Direct Numerical Simulation of Instability Waves in Hypersonic Boundary Layers </h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Jayahar%20Sivasubramanian">Jayahar Sivasubramanian</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Understanding laminar-turbulent transition process in hyper-sonic boundary layers is crucial for designing viable high speed flight vehicles. The study of transition becomes particularly important in the high speed regime due to the effect of transition on aerodynamic performance and heat transfer. However, even after many years of research, the transition process in hyper-sonic boundary layers is still not understood. This lack of understanding of the physics of the transition process is a major impediment to the development of reliable transition prediction methods. Towards this end, spatial Direct Numerical Simulations are conducted to investigate the instability waves generated by a localized disturbance in a hyper-sonic flat plate boundary layer. In order to model a natural transition scenario, the boundary layer was forced by a short duration (localized) pulse through a hole on the surface of the flat plate. The pulse disturbance developed into a three-dimensional instability wave packet which consisted of a wide range of disturbance frequencies and wave numbers. First, the linear development of the wave packet was studied by forcing the flow with low amplitude (0.001% of the free-stream velocity). The dominant waves within the resulting wave packet were identified as two-dimensional second mode disturbance waves. Hence the wall-pressure disturbance spectrum exhibited a maximum at the span wise mode number k = 0. The spectrum broadened in downstream direction and the lower frequency first mode oblique waves were also identified in the spectrum. However, the peak amplitude remained at k = 0 which shifted to lower frequencies in the downstream direction. In order to investigate the nonlinear transition regime, the flow was forced with a higher amplitude disturbance (5% of the free-stream velocity). The developing wave packet grows linearly at first before reaching the nonlinear regime. The wall pressure disturbance spectrum confirmed that the wave packet developed linearly at first. The response of the flow to the high amplitude pulse disturbance indicated the presence of a fundamental resonance mechanism. Lower amplitude secondary peaks were also identified in the disturbance wave spectrum at approximately half the frequency of the high amplitude frequency band, which would be an indication of a sub-harmonic resonance mechanism. The disturbance spectrum indicates, however, that fundamental resonance is much stronger than sub-harmonic resonance. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=boundary%20layer" title="boundary layer">boundary layer</a>, <a href="https://publications.waset.org/abstracts/search?q=DNS" title=" DNS"> DNS</a>, <a href="https://publications.waset.org/abstracts/search?q=hyper%20sonic%20flow" title=" hyper sonic flow"> hyper sonic flow</a>, <a href="https://publications.waset.org/abstracts/search?q=instability%20waves" title=" instability waves"> instability waves</a>, <a href="https://publications.waset.org/abstracts/search?q=wave%20packet" title=" wave packet"> wave packet</a> </p> <a href="https://publications.waset.org/abstracts/138691/spatial-direct-numerical-simulation-of-instability-waves-in-hypersonic-boundary-layers" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/138691.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">183</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">124</span> Comparative Performance Analysis of Fiber Delay Line Based Buffer Architectures for Contention Resolution in Optical WDM Networks</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Manoj%20Kumar%20Dutta">Manoj Kumar Dutta</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Wavelength division multiplexing (WDM) technology is the most promising technology for the proper utilization of huge raw bandwidth provided by an optical fiber. One of the key problems in implementing the all-optical WDM network is the packet contention. This problem can be solved by several different techniques. In time domain approach the packet contention can be reduced by incorporating fiber delay lines (FDLs) as optical buffer in the switch architecture. Different types of buffering architectures are reported in literatures. In the present paper a comparative performance analysis of three most popular FDL architectures are presented in order to obtain the best contention resolution performance. The analysis is further extended to consider the effect of different fiber non-linearities on the network performance. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=WDM%20network" title="WDM network">WDM network</a>, <a href="https://publications.waset.org/abstracts/search?q=contention%20resolution" title=" contention resolution"> contention resolution</a>, <a href="https://publications.waset.org/abstracts/search?q=optical%20buffering" title=" optical buffering"> optical buffering</a>, <a href="https://publications.waset.org/abstracts/search?q=non-linearity" title=" non-linearity"> non-linearity</a>, <a href="https://publications.waset.org/abstracts/search?q=throughput" title=" throughput"> throughput</a> </p> <a href="https://publications.waset.org/abstracts/38257/comparative-performance-analysis-of-fiber-delay-line-based-buffer-architectures-for-contention-resolution-in-optical-wdm-networks" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/38257.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">451</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">123</span> NOx Prediction by Quasi-Dimensional Combustion Model of Hydrogen Enriched Compressed Natural Gas Engine</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Anas%20Rao">Anas Rao</a>, <a href="https://publications.waset.org/abstracts/search?q=Hao%20Duan"> Hao Duan</a>, <a href="https://publications.waset.org/abstracts/search?q=Fanhua%20Ma"> Fanhua Ma</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The dependency on the fossil fuels can be minimized by using the hydrogen enriched compressed natural gas (HCNG) in the transportation vehicles. However, the NOx emissions of HCNG engines are significantly higher, and this turned to be its major drawback. Therefore, the study of NOx emission of HCNG engines is a very important area of research. In this context, the experiments have been performed at the different hydrogen percentage, ignition timing, air-fuel ratio, manifold-absolute pressure, load and engine speed. Afterwards, the simulation has been accomplished by the quasi-dimensional combustion model of HCNG engine. In order to investigate the NOx emission, the NO mechanism has been coupled to the quasi-dimensional combustion model of HCNG engine. The three NOx mechanism: the thermal NOx, prompt NOx and N2O mechanism have been used to predict NOx emission. For the validation purpose, NO curve has been transformed into NO packets based on the temperature difference of 100 K for the lean-burn and 60 K for stoichiometric condition. While, the width of the packet has been taken as the ratio of crank duration of the packet to the total burnt duration. The combustion chamber of the engine has been divided into three zones, with the zone equal to the product of summation of NO packets and space. In order to check the accuracy of the model, the percentage error of NOx emission has been evaluated, and it lies in the range of ±6% and ±10% for the lean-burn and stoichiometric conditions respectively. Finally, the percentage contribution of each NO formation has been evaluated. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=quasi-dimensional%20combustion" title="quasi-dimensional combustion ">quasi-dimensional combustion </a>, <a href="https://publications.waset.org/abstracts/search?q=thermal%20NO" title=" thermal NO"> thermal NO</a>, <a href="https://publications.waset.org/abstracts/search?q=prompt%20NO" title=" prompt NO"> prompt NO</a>, <a href="https://publications.waset.org/abstracts/search?q=NO%20packet" title=" NO packet"> NO packet</a> </p> <a href="https://publications.waset.org/abstracts/74819/nox-prediction-by-quasi-dimensional-combustion-model-of-hydrogen-enriched-compressed-natural-gas-engine" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/74819.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">251</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">122</span> Signaling Using Phase Shifting in Wi-Fi Backscatter System</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Chang-Bin%20Ha">Chang-Bin Ha</a>, <a href="https://publications.waset.org/abstracts/search?q=Young-Min%20Ko"> Young-Min Ko</a>, <a href="https://publications.waset.org/abstracts/search?q=Seongjoo%20Lee"> Seongjoo Lee</a>, <a href="https://publications.waset.org/abstracts/search?q=Hyoung-Kyu%20Song"> Hyoung-Kyu Song</a> </p> <p class="card-text"><strong>Abstract:</strong></p> In this paper, the signaling scheme using phase shifting is proposed for the improved performance of the Wi-Fi backscatter system. Because the communication in the Wi-Fi backscatter system is based on on-off modulation and impedance modulation by unit of packet, the data rate is very low compared to the conventional wireless systems. Also, because the Wi-Fi backscatter system is based on the RF-powered device, the achievement of high reliability is difficult. In order to increase the low data rate, the proposed scheme transmits information of multiple bits during one packet period. Also, in order to increase the reliability, the proposed scheme shifts the phase of signal in according to the transmitting information. The simulation result shows that the proposed scheme has the improved throughput performance. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=phase%20shifting" title="phase shifting">phase shifting</a>, <a href="https://publications.waset.org/abstracts/search?q=RF-powered%20device" title=" RF-powered device"> RF-powered device</a>, <a href="https://publications.waset.org/abstracts/search?q=Wi-Fi%20backscatter%20system" title=" Wi-Fi backscatter system"> Wi-Fi backscatter system</a>, <a href="https://publications.waset.org/abstracts/search?q=IoT" title=" IoT"> IoT</a> </p> <a href="https://publications.waset.org/abstracts/50322/signaling-using-phase-shifting-in-wi-fi-backscatter-system" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/50322.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">442</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">121</span> Resource Allocation Scheme For IEEE802.16 Networks</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Elmabruk%20Laias">Elmabruk Laias</a> </p> <p class="card-text"><strong>Abstract:</strong></p> IEEE Standard 802.16 provides QoS (Quality of Service) for the applications such as Voice over IP, video streaming and high bandwidth file transfer. With the ability of broadband wireless access of an IEEE 802.16 system, a WiMAX TDD frame contains one downlink subframe and one uplink subframe. The capacity allocated to each subframe is a system parameter that should be determined based on the expected traffic conditions. a proper resource allocation scheme for packet transmissions is imperatively needed. In this paper, we present a new resource allocation scheme, called additional bandwidth yielding (ABY), to improve transmission efficiency of an IEEE 802.16-based network. Our proposed scheme can be adopted along with the existing scheduling algorithms and the multi-priority scheme without any change. The experimental results show that by using our ABY, the packet queuing delay could be significantly improved, especially for the service flows of higher-priority classes. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=IEEE%20802.16" title="IEEE 802.16">IEEE 802.16</a>, <a href="https://publications.waset.org/abstracts/search?q=WiMAX" title=" WiMAX"> WiMAX</a>, <a href="https://publications.waset.org/abstracts/search?q=OFDMA" title=" OFDMA"> OFDMA</a>, <a href="https://publications.waset.org/abstracts/search?q=resource%20allocation" title=" resource allocation"> resource allocation</a>, <a href="https://publications.waset.org/abstracts/search?q=uplink-downlink%20mapping" title=" uplink-downlink mapping"> uplink-downlink mapping</a> </p> <a href="https://publications.waset.org/abstracts/15555/resource-allocation-scheme-for-ieee80216-networks" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/15555.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">475</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">120</span> A Secure Routing Algorithm for Underwater Wireless Sensor Networks</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Seyed%20Mahdi%20Jameii">Seyed Mahdi Jameii</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Underwater wireless sensor networks have been attracting the interest of many researchers lately, and the past three decades have beheld the rapid progress of underwater acoustic communication. One of the major problems in underwater wireless sensor networks is how to transfer data from the moving node to the base stations and choose the optimized route for data transmission. Secure routing in underwater wireless sensor network (UWCNs) is necessary for packet delivery. Some routing protocols are proposed for underwater wireless sensor networks. However, a few researches have been done on secure routing in underwater sensor networks. In this article, a secure routing protocol is provided to resist against wormhole and sybil attacks. The results indicated acceptable performance in terms of increasing the packet delivery ratio with regards to the attacks, increasing network lifetime by creating balance in the network energy consumption, high detection rates against the attacks, and low-end to end delay. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=attacks" title="attacks">attacks</a>, <a href="https://publications.waset.org/abstracts/search?q=routing" title=" routing"> routing</a>, <a href="https://publications.waset.org/abstracts/search?q=security" title=" security"> security</a>, <a href="https://publications.waset.org/abstracts/search?q=underwater%20wireless%20sensor%20networks" title=" underwater wireless sensor networks"> underwater wireless sensor networks</a> </p> <a href="https://publications.waset.org/abstracts/70929/a-secure-routing-algorithm-for-underwater-wireless-sensor-networks" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/70929.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">418</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">119</span> Mechanism for Network Security via Routing Protocols Estimated with Network Simulator 2 (NS-2)</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Rashid%20Mahmood">Rashid Mahmood</a>, <a href="https://publications.waset.org/abstracts/search?q=Muhammad%20Sufyan"> Muhammad Sufyan</a>, <a href="https://publications.waset.org/abstracts/search?q=Nasir%20Ahmed"> Nasir Ahmed</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The MANETs have lessened transportation and decentralized network. There are numerous basis of routing protocols. We derived the MANETs protocol into three major categories like Reactive, Proactive and hybrid. In these protocols, we discussed only some protocols like Distance Sequenced Distance Vector (DSDV), Ad hoc on Demand Distance Vector (AODV) and Dynamic Source Routing (DSR). The AODV and DSR are both reactive type of protocols. On the other hand, DSDV is proactive type protocol here. We compare these routing protocols for network security estimated by network simulator (NS-2). In this dissertation some parameters discussed such as simulation time, packet size, number of node, packet delivery fraction, push time and speed etc. We will construct all these parameters on routing protocols under suitable conditions for network security measures. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=DSDV" title="DSDV">DSDV</a>, <a href="https://publications.waset.org/abstracts/search?q=AODV" title=" AODV"> AODV</a>, <a href="https://publications.waset.org/abstracts/search?q=DSR%20NS-2" title=" DSR NS-2"> DSR NS-2</a>, <a href="https://publications.waset.org/abstracts/search?q=PDF" title=" PDF"> PDF</a>, <a href="https://publications.waset.org/abstracts/search?q=push%20time" title=" push time"> push time</a> </p> <a href="https://publications.waset.org/abstracts/24997/mechanism-for-network-security-via-routing-protocols-estimated-with-network-simulator-2-ns-2" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/24997.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">433</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">118</span> Enhancing Visual Corporate Identity on Festive Money Packets Design with Cultural Symbolisms</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Noranis%20Ismail">Noranis Ismail</a>, <a href="https://publications.waset.org/abstracts/search?q=Shamsul%20H.%20A.%20Rahman"> Shamsul H. A. Rahman</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The objective of this research is to accentuate the importance of Visual Corporate Identity by utilizing Malay motifs amalgamated with Malay proverbs to enhance the corporate brand of The Design School (TDS) of Taylor’s University. The researchers aim to manipulate festive money packet as a mean to communicate to the audience by using non-verbal visual cues such as colour, languages, and symbols that reflect styles and cultural heritage. The paper concluded that it is possible to utilize Hari Raya packet as a medium for creative expressions by creating high-impact design through the symbolism of selected Malay proverbs and traditional Malay motifs to enhance TDS corporate visual identity. It also provides a vital contribution to other organizations to understand an integral part of corporate visual identity in heightening corporate brand by communicating indirectly to its stakeholders using visual mnemonic and cultural heritage. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=corporate%20branding" title="corporate branding">corporate branding</a>, <a href="https://publications.waset.org/abstracts/search?q=cultural%20cues" title=" cultural cues"> cultural cues</a>, <a href="https://publications.waset.org/abstracts/search?q=Malay%20culture" title=" Malay culture"> Malay culture</a>, <a href="https://publications.waset.org/abstracts/search?q=visual%20identity" title=" visual identity"> visual identity</a> </p> <a href="https://publications.waset.org/abstracts/62238/enhancing-visual-corporate-identity-on-festive-money-packets-design-with-cultural-symbolisms" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/62238.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">428</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">117</span> Message Framework for Disaster Management: An Application Model for Mines</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=A.%20Baloglu">A. Baloglu</a>, <a href="https://publications.waset.org/abstracts/search?q=A.%20%C3%87%C4%B1nar"> A. Çınar</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Different tools and technologies were implemented for Crisis Response and Management (CRM) which is generally using available network infrastructure for information exchange. Depending on type of disaster or crisis, network infrastructure could be affected and it could not be able to provide reliable connectivity. Thus any tool or technology that depends on the connectivity could not be able to fulfill its functionalities. As a solution, a new message exchange framework has been developed. Framework provides offline/online information exchange platform for CRM Information Systems (CRMIS) and it uses XML compression and packet prioritization algorithms and is based on open source web technologies. By introducing offline capabilities to the web technologies, framework will be able to perform message exchange on unreliable networks. The experiments done on the simulation environment provide promising results on low bandwidth networks (56kbps and 28.8 kbps) with up to 50% packet loss and the solution is to successfully transfer all the information on these low quality networks where the traditional 2 and 3 tier applications failed. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=crisis%20response%20and%20management" title="crisis response and management">crisis response and management</a>, <a href="https://publications.waset.org/abstracts/search?q=XML%20messaging" title=" XML messaging"> XML messaging</a>, <a href="https://publications.waset.org/abstracts/search?q=web%20services" title=" web services"> web services</a>, <a href="https://publications.waset.org/abstracts/search?q=XML%20compression" title=" XML compression"> XML compression</a>, <a href="https://publications.waset.org/abstracts/search?q=mining" title=" mining"> mining</a> </p> <a href="https://publications.waset.org/abstracts/12571/message-framework-for-disaster-management-an-application-model-for-mines" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/12571.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">339</span> </span> </div> </div> <ul class="pagination"> <li class="page-item disabled"><span class="page-link">‹</span></li> <li class="page-item active"><span class="page-link">1</span></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=packet%20reordering&page=2">2</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=packet%20reordering&page=3">3</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=packet%20reordering&page=4">4</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=packet%20reordering&page=5">5</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=packet%20reordering&page=2" rel="next">›</a></li> </ul> </div> </main> <footer> <div id="infolinks" class="pt-3 pb-2"> <div class="container"> <div style="background-color:#f5f5f5;" class="p-3"> <div class="row"> <div class="col-md-2"> <ul class="list-unstyled"> About <li><a href="https://waset.org/page/support">About Us</a></li> <li><a href="https://waset.org/page/support#legal-information">Legal</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/WASET-16th-foundational-anniversary.pdf">WASET celebrates its 16th foundational anniversary</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Account <li><a href="https://waset.org/profile">My Account</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Explore <li><a href="https://waset.org/disciplines">Disciplines</a></li> <li><a href="https://waset.org/conferences">Conferences</a></li> <li><a href="https://waset.org/conference-programs">Conference Program</a></li> <li><a href="https://waset.org/committees">Committees</a></li> <li><a href="https://publications.waset.org">Publications</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Research <li><a href="https://publications.waset.org/abstracts">Abstracts</a></li> <li><a href="https://publications.waset.org">Periodicals</a></li> <li><a href="https://publications.waset.org/archive">Archive</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Open Science <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Open-Science-Philosophy.pdf">Open Science Philosophy</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Open-Science-Award.pdf">Open Science Award</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Open-Society-Open-Science-and-Open-Innovation.pdf">Open Innovation</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Postdoctoral-Fellowship-Award.pdf">Postdoctoral Fellowship Award</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Scholarly-Research-Review.pdf">Scholarly Research Review</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Support <li><a href="https://waset.org/page/support">Support</a></li> <li><a href="https://waset.org/profile/messages/create">Contact Us</a></li> <li><a href="https://waset.org/profile/messages/create">Report Abuse</a></li> </ul> </div> </div> </div> </div> </div> <div class="container text-center"> <hr style="margin-top:0;margin-bottom:.3rem;"> <a href="https://creativecommons.org/licenses/by/4.0/" target="_blank" class="text-muted small">Creative Commons Attribution 4.0 International License</a> <div id="copy" class="mt-2">© 2024 World Academy of Science, Engineering and Technology</div> </div> </footer> <a href="javascript:" id="return-to-top"><i class="fas fa-arrow-up"></i></a> <div class="modal" id="modal-template"> <div class="modal-dialog"> <div class="modal-content"> <div class="row m-0 mt-1"> <div class="col-md-12"> <button type="button" class="close" data-dismiss="modal" aria-label="Close"><span aria-hidden="true">×</span></button> </div> </div> <div class="modal-body"></div> </div> </div> </div> <script src="https://cdn.waset.org/static/plugins/jquery-3.3.1.min.js"></script> <script src="https://cdn.waset.org/static/plugins/bootstrap-4.2.1/js/bootstrap.bundle.min.js"></script> <script src="https://cdn.waset.org/static/js/site.js?v=150220211556"></script> <script> jQuery(document).ready(function() { /*jQuery.get("https://publications.waset.org/xhr/user-menu", function (response) { jQuery('#mainNavMenu').append(response); });*/ jQuery.get({ url: "https://publications.waset.org/xhr/user-menu", cache: false }).then(function(response){ jQuery('#mainNavMenu').append(response); }); }); </script> </body> </html>