scholarly journals A Multi Stage Path Indexed Energy Conserving Routing in MANET

The technology behind Mobile Adhoc Network is growing day by day. This growth is triggered by the needs of the society and it remarks the influence and usage of MANET around the world. Due to the flexibility, scalability and ease of use, MANET has become a part of everyone’s life. So researches are carried out with a sole aim to maximize the throughput. There are many aspects to be covered to improve MANET performance which includes routing, energy usage, bandwidth usage, mobility management etc… Researchers try to bring better performance by tuning the above parameters to an optimal condition so as to bring an overall balance. Management of energy and its conservation by optimization is a critical issue to be addressed in MANET. This paper introduces a novel approach in MANET routing which enables better energy management during data exchange. This method uses a new paradigm which will provide Multi Stage Indexed Energy Conserving Routing in MANET (MSPIEC routing). MSPIEC routing identifies the overall energy equilibrium of the MANET during route discovery, and based on the statistics the data exchange will be carried out. Since MSPIEC routing has the data on energy equilibrium, more data will be passed through healthy routes and less data will be assigned through weaker paths, so that the entire data transfer will be balanced as a whole.

Author(s):  
Srinivasa P. Varanasi ◽  
Athamaram H. Soni

Abstract Data exchange between different CAD systems usually requires conversion between different representations of free-form curves and surfaces. Also, trimmed surfaces give rise to high degree boundary curves. Accurate conversion of these forms becomes necessary for reliable data transfer. Also important is the issue of shape control, specially in the aircraft industry. The objective of this paper is to investigate conversion methods and effect of shape control on the design and choice of such methods.


1993 ◽  
Vol 47 (8) ◽  
pp. 1093-1099 ◽  
Author(s):  
Antony N. Davies ◽  
Peter Lampen

Following the development and publication of the JCAMP-DX protocol 4.24 and its successful implementation in the field of infrared spectroscopy, data exchange without loss of information, between systems of different origin and internal format, has become a reality. The benefits of this system-independent data transfer standard have been recognized by workers in other areas who have expressed a wish for an equivalent, compatible standard in their own fields. This publication details a protocol for the exchange of Nuclear Magnetic Resonance (NMR) spectral data without any loss of information and in a format that is compatible with all storage media and computer systems. The protocol detailed below is designed for spectral data transfer, and its use for NMR imaging data transfer has not as yet been investigated.


2018 ◽  
Vol 45 (6) ◽  
pp. 767-778 ◽  
Author(s):  
Amjad Rehman ◽  
Tanzila Saba ◽  
Toqeer Mahmood ◽  
Zahid Mehmood ◽  
Mohsin Shah ◽  
...  

In the current era, due to the widespread availability of the Internet, it is extremely easy for people to communicate and share multimedia contents with each other. However, at the same time, secure transfer of personal and copyrighted material has become a critical issue. Consequently, secure means of data transfer are the most urgent need of the time. Steganography is the science and art of protecting the secret data from an unauthorised access. The steganographic approaches conceal secret data into a cover file of type audio, video, text and/or image. The actual challenge in steganography is to achieve high robustness and capacity without bargaining on the imperceptibility of the cover file. In this article, an efficient steganography method is proposed for the transfer of secret data in digital images using number theory. For this purpose, the proposed method represents the cover image using the Fibonacci sequence. The representation of an image in the Fibonacci sequence allows increasing the bit planes from 8-bit to 12-bit planes. The experimental results of the proposed method in comparison with other existing steganographic methods exhibit that our method not only achieves high embedding of secret data but also gives high quality of stego images in terms of peak signal-to-noise ratio (PSNR). Furthermore, the robustness of the technique is also evaluated in the presence of salt and pepper noise attack on the cover images.


Author(s):  
Maiyuren Srikumar ◽  
Charles Daniel Hill ◽  
Lloyd Hollenberg

Abstract Quantum machine learning (QML) is a rapidly growing area of research at the intersection of classical machine learning and quantum information theory. One area of considerable interest is the use of QML to learn information contained within quantum states themselves. In this work, we propose a novel approach in which the extraction of information from quantum states is undertaken in a classical representational-space, obtained through the training of a hybrid quantum autoencoder (HQA). Hence, given a set of pure states, this variational QML algorithm learns to identify – and classically represent – their essential distinguishing characteristics, subsequently giving rise to a new paradigm for clustering and semi-supervised classification. The analysis and employment of the HQA model are presented in the context of amplitude encoded states – which in principle can be extended to arbitrary states for the analysis of structure in non-trivial quantum data sets.


Author(s):  
Hoang Dang Hai ◽  
Thorsten Strufe ◽  
Pham Thieu Nga ◽  
Hoang Hong Ngoc ◽  
Nguyen Anh Son ◽  
...  

Sparse  Wireless  Sensor  Networks  using several  mobile  nodes  and  a  small  number  of  static sensor  nodes  have  been  widely  used  for  many applications,  especially  for  traffic-generated  pollution monitoring.  This  paper  proposes  a  method  for  data collection and forwarding using Mobile Elements (MEs), which are moving on predefined trajectories in contrast to previous works that use a mixture of MEsand static nodes. In our method, MEscan be used as data collector as well as dynamic bridges for data transfer. We design the  trajectories  in  such  a  way,  that  they  completely cover  the  deployed  area  and  data  will  be  gradually forwarded  from  outermost  trajectories  to  the  center whenever  a  pair  of MEs contacts  each  other  on  an overlapping road distance of respective trajectories. The method  is based  on  direction-oriented  level  and  weight assignment.  We  analyze  the  contact  opportunity  for data  exchange  while MEs move.  The  method  has  been successfully tested for traffic pollution monitoring in an urban area.


Author(s):  
A. Brook ◽  
E. Ben Dor

A novel approach for radiometric calibration and atmospheric correction of airborne hyperspectral (HRS) data, termed supervised vicarious calibration (SVC) was proposed by Brook and Ben-Dor in 2010. The present study was aimed at validating this SVC approach by simultaneously using several different airborne HSR sensors that acquired HSR data over several selected sites at the same time. The general goal of this study was to apply a cross-calibration approach to examine the capability and stability of the SVC method and to examine its validity. This paper reports the result of the multi sensors campaign took place over Salon de Provenance, France on behalf of the ValCalHyp project took place in 2011. The SVC method enabled the rectification of the radiometric drift of each sensor and improves their performance significantly. The flight direction of the SVC targets was found to be a critical issue for such correction and recommendations have been set for future utilization of this novel method. The results of the SVC method were examined by comparing ground-truth spectra of several selected validation targets with the image spectra as well as by comparing the classified water quality images generated from all sensors over selected water bodies.


Author(s):  
Mathias Kretschmer ◽  
Christian Niephaus ◽  
George Ghinea

Wireless Mesh Networks (WMNs) have matured in recent years and the visibility of WMN deployments has attracted commercial operators to investigate this technology for applicability in their networks. Having their roots in the Mobile Adhoc Network (MANET) world and rather cheap off-the-shelf single-radio WLAN routers, WMN routing protocols were not designed for applicability in carrier-grade back-haul networks. For example, protocols such as OLSR or B.A.T.M.A.N. can not address the QoS-requirements of a modern operator back-haul network with its increasing demand for triple-play content. Although numerous solutions have been proposed to introduce QoS-awareness at the protocol or the technology level, traditional WMNs fail to meet commercial operator requirements in terms of reliability, traffic engineering and QoS guarantees. This chapter proposes a novel approach combining an IEEE 802.21-based control plane and an MPLS-based data plane. To provide support for ubiquitous high-bandwidth multi-media services, it seamlessly integrates unidirectional broadcast technologies such as DVB into the heterogeneous multi-radio WiBACK architecture.


Geology ◽  
2020 ◽  
Vol 48 (4) ◽  
pp. 323-327 ◽  
Author(s):  
Chetan L. Nathwani ◽  
Matthew A. Loader ◽  
Jamie J. Wilkinson ◽  
Yannick Buret ◽  
Robert H. Sievwright ◽  
...  

Abstract Protracted magma storage in the deep crust is a key stage in the formation of evolved, hydrous arc magmas that can result in explosive volcanism and the formation of economically valuable magmatic-hydrothermal ore deposits. High magmatic water content in the deep crust results in extensive amphibole ± garnet fractionation and the suppression of plagioclase crystallization as recorded by elevated Sr/Y ratios and high Eu (high Eu/Eu*) in the melt. Here, we use a novel approach to track the petrogenesis of arc magmas using apatite trace element chemistry in volcanic formations from the Cenozoic arc of central Chile. These rocks formed in a magmatic cycle that culminated in high-Sr/Y magmatism and porphyry ore deposit formation in the Miocene. We use Sr/Y, Eu/Eu*, and Mg in apatite to track discrete stages of arc magma evolution. We apply fractional crystallization modeling to show that early-crystallizing apatite can inherit a high-Sr/Y and high-Eu/Eu* melt chemistry signature that is predetermined by amphibole-dominated fractional crystallization in the lower crust. Our modeling shows that crystallization of the in situ host-rock mineral assemblage in the shallow crust causes competition for trace elements in the melt that leads to apatite compositions diverging from bulk-magma chemistry. Understanding this decoupling behavior is important for the use of apatite as an indicator of metallogenic fertility in arcs and for interpretation of provenance in detrital studies.


2008 ◽  
pp. 1839-1864
Author(s):  
Elisa Bertino ◽  
Barbara Carminati ◽  
Elena Ferrari

In this chapter, we present the main security issues related to the selective dissemination of information (SDI system). More precisely, after provided an overview of the work carried out in this field, we have focused on the security properties that a secure SDI system (SSDI system) must satisfy and on some of the strategies and mechanisms that can be used to ensure them.  Indeed, since XML is the today emerging standard for data exchange over the Web, we have casted our attention on Secure and Selective XML data dissemination (SSXD).  As a result, we have presented a SSXD system providing a comprehensive solution to XML documents. In the proposed chapter, we also consider innovative architecture for the data dissemination, by suggesting a SSXD system exploiting the third-party architecture, since this architecture is receiving growing attention as a new paradigm for data dissemination over the web. In a third-party architecture, there is a distinction between the  Owner  and the Publisher of information. The Owner is the producer of the information, whereas Publishers are responsible for managing (a portion of) the Owner information and for answering user queries. A relevant issue in this architecture is how the Owner can ensure a secure dissemination of its data, even if the data are managed by a third-party. Such scenario requires a redefinition of dissemination mechanisms developed for the traditional SSXD system. Indeed, the traditional techniques cannot be exploited in a third party scenario. For instance, let us consider the traditional digital signature techniques, used to ensure data integrity and authenticity. In a third party scenario, that is, a scenario where a third party may prune some of the nodes of the original document based on user queries, the traditional digital signature is not applicable, since its correctness is based on the requirement that the signing and verification process are performed on exactly the same bits.


Sign in / Sign up

Export Citation Format

Share Document