scholarly journals A novel adaptive schema to facilitates playback switching technique for video delivery in dense LTE cellular heterogeneous network environments

Author(s):  
Saleh Ali Alomari ◽  
Mowafaq Salem Alzboon ◽  
Mohammad Subhi Al-Batah ◽  
Belal Zaqaibeh

The services of the Video on Demand (VoD) are currently based on the developments of the technology of the digital video and the network’s high speed. The files of the video are retrieved from many viewers according to the permission, which is given by VoD services. The remote VoD servers conduct this access. A server permits the user to choose videos anywhere/anytime in order to enjoy a unified control of the video playback. In this paper, a novel adaptive method is produced in order to deliver various facilities of the VoD to all mobile nodes that are moving within several networks. This process is performed via mobility modules within the produced method since it applies a seamless playback technique for retrieving the facilities of the VoD through environments of heterogeneous networks. The main components comprise two servers, which are named as the GMF and the LMF. The performance of the simulation is tested for checking clients’ movements through different networks with different sizes and speeds, which are buffered in the storage. It is found to be proven from the results that the handoff latency has various types of rapidity. The method applies smooth connections and delivers various facilities of the VoD. Meantime, the mobile device transfers through different networks. This implies that the system transports video segments easily without encountering any notable effects.In the experimental analysis for the Slow movements mobile node handoff latency (8 Km/hour or 4 m/s) ,the mobile device’s speed reaches 4m/s, the delay time ranges from 1 to 1.2 seconds in the proposed system, while the MobiVoD system ranges from 1.1 to 1.5. In the proposed technique reaches 1.1026 seconds forming the required time of a mobile device that is switching from a single network to its adjacent one. while the handoff termination average in the MobiVoD reaches 1.3098 seconds. Medium movement mobile node handoff latency (21 Km/ hour or 8 m/s) The average handoff time for the proposed system reaches 1.1057 seconds where this implies that this technique can seamlessly provide several segments of a video segments regardless of any encountered problems. while the average handoff time for the MobiVoD reaches 1.53006623 seconds. Furthermore, Fast movement mobile node handoff latency (390 Km/ hour or 20 m/s). The average time latency of the proposed technique reaches 1.0964 seconds, while the MobiVoD System reaches to 1.668225 seconds.

2018 ◽  
Vol 15 (1) ◽  
pp. 21-33
Author(s):  
Ying Wei ◽  
Yongqiao Liu ◽  
Yifan Hele ◽  
Weiwei Sun ◽  
Yang Wang ◽  
...  

Background: Gentianella acuta (Michx.) Hulten is an important type of medicinal plant found in several Chinese provinces. It has been widely used in folk medicine to treat various illnesses. However, there is not enough detailed information about the chemical constituents of this plant or methods for their content determination. Objective: The focus of this work is the isolation and characterization of the major chemical constituents of Gentianella acuta, and developing an analytical method for their determination. Methods: The components of Gentianella acuta were isolated using (1) ethanol extraction and adsorption on macroporous resin. (2) and ethyl acetate extraction and high speed countercurrent chromatography. A HPLC-DAD method was developed using a C18 column and water-acetonitrile as the mobile phase. Based on compound polarities, both isocratic and gradient elution methods were developed. Results: A total of 29 compounds were isolated from this plant, of which 17 compounds were isolated from this genus for the first time. The main components in this plant were found to be xanthones. The HPLC-DAD method was developed and validated for their determination, and found to show good sensitivity and reliability. Conclusion: The results of this work add to the limited body of work available on this important medicinal plant. The findings will be useful for further investigation and development of Gentianella acuta for its valuable medicinal properties.


2014 ◽  
Vol 2014 ◽  
pp. 1-16
Author(s):  
Peer Azmat Shah ◽  
Halabi B. Hasbullah ◽  
Ibrahim A. Lawal ◽  
Abubakar Aminu Mu’azu ◽  
Low Tang Jung

Due to the proliferation of handheld mobile devices, multimedia applications like Voice over IP (VoIP), video conferencing, network music, and online gaming are gaining popularity in recent years. These applications are well known to be delay sensitive and resource demanding. The mobility of mobile devices, running these applications, across different networks causes delay and service disruption. Mobile IPv6 was proposed to provide mobility support to IPv6-based mobile nodes for continuous communication when they roam across different networks. However, the Route Optimization procedure in Mobile IPv6 involves the verification of mobile node’s reachability at the home address and at the care-of address (home test and care-of test) that results in higher handover delays and signalling overhead. This paper presents an enhanced procedure, time-based one-time password Route Optimization (TOTP-RO), for Mobile IPv6 Route Optimization that uses the concepts of shared secret Token, time based one-time password (TOTP) along with verification of the mobile node via direct communication and maintaining the status of correspondent node’s compatibility. The TOTP-RO was implemented in network simulator (NS-2) and an analytical analysis was also made. Analysis showed that TOTP-RO has lower handover delays, packet loss, and signalling overhead with an increased level of security as compared to the standard Mobile IPv6’s Return-Routability-based Route Optimization (RR-RO).


2021 ◽  
Vol 3 (56) ◽  
pp. 25-41
Author(s):  
Alexander E. KOVENSKY ◽  
◽  
Vladimir L. BASINIUK ◽  
Ryta E. VOLKOTRUB ◽  
◽  
...  

The article presents the results of studies of the shaft oscillation processes of a precision horizontal highspeed electric spindle with aerostatic radial and axial supports, used at Planar OJSC in equipment for separation of semiconductor plates into crystals. The studies were carried out using the developed mathematical models that take into account the design features of these electric spindles, including the cantilever mounting of the cutting tool, the imbalance of the diamond disc with the mandrel and the mass ratio of the main components of the electric spindle, as well as the results of their full-scale tests. Based on the analysis of the data obtained, regularities are shown that connect the amplitude values of the oscillations of the electric spindle shaft with the imbalance of the diamond disc with the mandrel and the rotational speed of the electric spindle, which made it possible to propose engineering dependences for choosing the permissible values of the imbalance and rational, from the standpoint of resonance conditions and permissible shaft oscillations, rotational speed of the electric spindle. Recommendations have been developed for the creation of a system for monitoring and active control of the parameters and functioning of the electric spindle in the process of separating semiconductor plates into crystals, which make it possible to use the resonant mode of radial oscillations to improve cutting conditions, excluding direct contact of the working surfaces of aerostatic supports, their seizure and loss of performance of the electric spindle. The article presents a method of selecting the operation parameters of a high-speed precision horizontal electric spindle with aerostatic radial and axial supports and a cantilever mounting of a diamond cutting disc. It is based on the analysis of the simulation results of shaft forced oscillations and data on the shaft oscillations during the operation of the electric spindle with different rotation frequencies and imbalances. The results obtained can be used to monitor shaft oscillations during the operation of the electric spindle, while the high operation efficiency of which is achieved by adaptive control of rotation frequencies taking into account the amplitudes of these oscillations.


2021 ◽  
Author(s):  
Bingxin Chen ◽  
Lifei Kuang ◽  
Wei He

Abstract Today, with the rapid development of information age, the communication of science and technology is getting closer to each other, and our country has begun to conduct in-depth research on WSN. This study mainly discusses the computer simulation algorithm of gymnastics formation transformation path based on wireless sensor. In this study, an improved leader follower method is designed. In the research of gymnastics formation transformation of mobile nodes in wireless sensor network environment, the traditional three types of nodes are divided into four categories according to different formation responsibilities, namely coordinator, beacon node, leader and follower. When it makes accurate positioning with the help of beacon node information, it will send the information in the form of broadcast, and then the coordinator will send the information to the host computer through the serial port for tracking display. In order to make the mobile nodes in the network keep the current gymnastics formation moving towards the target point after completing the gymnastics formation transformation, this paper uses the L - φ closed-loop control method to modify the gymnastics formation in real time. The method based on the received signal strength is used to locate the mobile node. Combined with the positioning engine in the core processor CC2431 of the mobile node, the efficient and low-energy wireless positioning can be realized. Multiple mobile nodes coordinate and control each other, and each node communicates with each other through wireless mode, and senses its own heading angle information through geomagnetic sensor, so as to judge and adjust the maintenance and transformation of the current gymnastics formation. In the process of formation transformation, the analysis shows that the maximum offset of follower2 relative to the ideal path is + 0.28M in the process of marching to the desired position in the triangle queue. This research effectively realizes the computer simulation of autonomous formation.


2021 ◽  
Vol 18 (4) ◽  
pp. 1287-1293
Author(s):  
M. P. Haripriya ◽  
P. Venkadesh

The 5G mobile wireless network systems faces a lot of security issues due to the opening of network and its insecurity. The insecure network prone to various attacks and it disrupts secure data communications between legitimate users. Many works have addressed the security problems in 3G and 4G networks in efficient way through authentication and cryptographic techniques. But, the security in 5G networks during data communication was not improved. Subtractive Gradient Boost Clustered Node Authentication (SGBCNA) Method is introduced to perform secure data communication. The subtractive gradient boost clustering technique is applied to authenticate the mobile node as normal nodes and malicious nodes based on the selected features. The designed ensemble clustering model combines the weak learners to make final strong clustering results with minimum loss. Finally, the malicious nodes are eliminated and normal mobile nodes are taken for performing the secured communication in 5G networks. Simulation is carried out on factors such as authentication accuracy, computation overhead and security level with respect to a number of mobile nodes and data packets. The observed outcomes clearly illustrate that the SGBCNA Method efficiently improves node authentication accuracy, security level with minimum overhead than the state-of-the-art-methods.


Author(s):  
Vasuky Mohanan ◽  
Rahmat Budiarto ◽  
Sivakumar Ramakrishnan

4G networks provide bandwidth of up to 1Gbps for a Mobile Node (MN) that is moving at pedestrian speed. On the other hand, it also supports mobile nodes that can move at a speed of 250 km/hr with bandwidths value of 100 Mbps. This sets the premise of a network that supports diverse needs. This goal will be harder to achieve if Network Selection Problems (NSP) are not addressed comprehensively. NSP refers to the selection of target access network selection from a collection of Candidate Networks (CNs) when MNs are moving from one access network into another. The most logical way of achieving this is to select the “best” network. This translates to identifying performance values of the CNs. The analysis in this chapter shows clearly that access network selection done based on limited criteria is detrimental in achieving optimum communication. Instead, this chapter suggests a framework that would be complementary to a 4G network.


Author(s):  
Omar Raoof ◽  
Hamed Al-Raweshidy

This chapter proposes a novel game-based green interface/network selection mechanism that is an extension to the multi-interface fast-handover mobile IPv6 protocol and works when the mobile node has more than one wireless interface. The mechanism controls the handover decision process by deciding whether a handover is needed or not and helps the node to choose the right access point at the right time. Additionally, the mechanism switches the mobile nodes interfaces “ON” and “OFF” when needed to control the mobile node’s energy consumption and improves the handover latency.


2020 ◽  
Vol 157 ◽  
pp. 04027 ◽  
Author(s):  
Sergey Ageev ◽  
Vladimir Karetnikov ◽  
Evgeny Ol’khovik ◽  
Andrey Privalov

In the paper, an adaptive hybrid heuristic (behavioral) method for detecting small traffic anomalies in high-speed multiservice communication networks, which operates in real time, is proposed and investigated. The relevance of this study is determined by the fact that network security management processes in high-speed multiservice communication networks need to be implemented in a mode close to real-time mode, as well as identifying possible network security threats in the early stages of the implementation of possible network attacks. The proposed method and algorithm belong to the class of adaptive methods and algorithms with preliminary training. The average relative error in estimating the evaluated traffic parameters does not exceed 10%, which is sufficient for the implementation of operational network management tasks. Anomalies of the expectation of traffic intensity and its dispersion are identified if their valuesexceed the normal values by 15% or more, which makes it possible to detect possible network attacks in the early phases of their implementation, for example, at the stage of scanning ports and interfaces of the attacked system. The procedure for detecting anomalous traffic behavior is implemented based on the Mamdani’s method of hierarchical fuzzy logical inference. A study of the proposed method for detecting anomalous behavior of network traffic showed its high efficiency.


Author(s):  
Z. Abdul-Mehdi ◽  
A. Mamat ◽  
H. Ibrahim ◽  
M. Dirs

In this article, we consider the distributed database that can make up mobile nodes and the peer-to-peer concept. These nodes are peers and may be replicated both for fault-tolerance, dependability, and to compensate for nodes that are currently disconnected. Thus we have a distributed replicated database where several sites must participate in the synchronization of transactions. The capabilities of the distributed replicated database are extended to allow mobile nodes to plan disconnection, with the capability of updating the database on behalf of the mobile node by using a fixed proxy server to make these updates during the mobile disconnection, once a mobile reconnects automatically, synchronously, and integrates into the database.


2011 ◽  
Vol 204-210 ◽  
pp. 2171-2175
Author(s):  
Zi Yu Liu ◽  
Dong Li Zhang ◽  
Xue Hui Li

Domain ontology can effectively organize the knowledge of that domain and make it easier to share and reuse. We can build domain ontology on thesaurus and thematic words and index document knowledge using domain ontology. Under which this paper designs a semantic retrieval system for the document knowledge based on domain ontology, and the system consists of four main components: ontology query, semantic precomputation for document and the concept similarity, semantic extended search and reasoning search. Finally, this paper makes an experiment on high-speed railway domain. The experimental results show that the developed semantic retrieval system can reach the satisfied recall and precision.


Sign in / Sign up

Export Citation Format

Share Document