scholarly journals Analysis for Modulation and Coding Scheme with Data Rate Traffic Over IEEE 802.11AC and 802.11N in Wireless Multimedia

2021 ◽  
pp. 109-118
Author(s):  
Aymen Mohammed Khodayer Al-Dulaimi ◽  
Mohammed Khodayer Hassan Al-Dulaimi

This paper discusses wireless traffic consisting of various types of data packets. Regardless of the type of data being sent and received, the transmission can suffer from latency problems. The wireless multimedia standard enables the service provider to prioritize voice, video, best-effort, and background data by adding differentiated services code point value to the internet protocol header. This effectively allows network users to benefit from optimal network performance while using various applications with different latency and throughput requirements. In this paper, we conducted a study of five use-cases over two common wireless standards, IEEE 802.11n and IEEE 802.11ac. The study was carried out by prioritizing, respectively, voice, video data packets, with lowest priority assigned to best-effort data packets. The best-effort traffic can have more bandwidth than the voice or video. Under each use case, we evaluated the impact of additional network load on video streaming.

Author(s):  
Ziyad Khalaf Farej ◽  
Omer Mohammed Ali

The increase in the number of users on wireless local area networks (WLAN) and the development of large size applications have increased the demand for high-speed data rate and low latency. The IEEE 802.11ac was developed to provide very high throughput WLANs. Many enhancements are added to the medium access control (MAC) and physical (PHY) layers to increase data rate and improve network performance, these features enable the IEEE 802.11ac standard to provide quality of service (QoS) for multimedia applications. This paper concentrates on the impact of QoS on the system performance in term of delay and throughput. Four scenarios are proposed to investigate the network performance with different (from 1 up to 8) spatial stream (SS). The objective modular network testbed in C++ (OMNet++ modeler v5.5.1) is used to simulate and model these scenarios. For 8×8 SS, the results of simulation show the best throughput (maximum) and delay (minimum) values of (622, 484, 399.3, 382.96 Mbps) and (0.0211, 0.0589, 0.1037, 0.1202 sec) for 5, 15, 30 and 45 node number scenarios respectively. Although the number of nodes increases, the system performance decreases, however when QoS is deployed the performance is enhanced and its best improvement is obtained at the highest (45) node number scenario with values of 94.4% and 56.1% for throughput and delay respectively.


2018 ◽  
Vol 1 (4) ◽  
Author(s):  
Niloofar Movahedian Attar

The present paper focused on ad hoc networks with an emphasis on their dynamic nature. After an introduction to ad hoc networks, there are the AODV (Ad hoc On-demand Distance Vector) routing protocol with the node malicious behaviour and consequent damages to ad hoc networks. Then, trust is described as one of the solutions for identifying secure routes when there are malicious nodes in the network. Accordingly, the paper focuses on the proposed solutions that are based on the parameter trust and the prevention of the impact of malicious networks and vulnerable connections to identify a secure route. Then, an equation is presented to calculate trust using packet forwarding rate to select a secure route for sending data packets. The proposed model was implemented on OMNET++ to evaluate the network performance. The feature of the proposed method is better performance than of the methods TVAODV and AODV. Using the proposed method, packet delivery rate increases more significantly when malicious nodes increases than that of the basic method AODV and TVAODV. There is thus a lower packet dropping rate.


2020 ◽  
Vol 39 (6) ◽  
pp. 8927-8935
Author(s):  
Bing Zheng ◽  
Dawei Yun ◽  
Yan Liang

Under the impact of COVID-19, research on behavior recognition are highly needed. In this paper, we combine the algorithm of self-adaptive coder and recurrent neural network to realize the research of behavior pattern recognition. At present, most of the research of human behavior recognition is focused on the video data, which is based on the video number. At the same time, due to the complexity of video image data, it is easy to violate personal privacy. With the rapid development of Internet of things technology, it has attracted the attention of a large number of experts and scholars. Researchers have tried to use many machine learning methods, such as random forest, support vector machine and other shallow learning methods, which perform well in the laboratory environment, but there is still a long way to go from practical application. In this paper, a recursive neural network algorithm based on long and short term memory (LSTM) is proposed to realize the recognition of behavior patterns, so as to improve the accuracy of human activity behavior recognition.


Metahumaniora ◽  
2017 ◽  
Vol 7 (3) ◽  
pp. 411
Author(s):  
Abu Bakar Ramadhan Muhamad

AbstrakHegemoni kolonialisme dalam budaya poskolonial merupakan alasan penelitian inikemudian mengkaji wacana kolonial dalam novel Max Havellar (MH) khususnya dampakditimbulkannya. Dampak dimaksud adalah posisi keberpihakan pemikiran tersirat darikarya tersebut. Hasil pembahasan menunjukkan, secara temporal maupun permanen MHmenyuarakan ketidakadilan dalam kondisi-kondisi kolonial menyangkut penindasan sangpenjajah terhadap terjajah. Hanya saja, upaya mengatasnamakan atau mewakili suarakaum terjajah terbukti mengimplikasikan ciri ideologis statis kerangka kolonialisme(orientalisme); yakni cara pandang Eropasentris, di mana “Barat” sebagai self adalah superior,dan “Timur” sebagai other adalah inferior. Dalam konteks poskolonialisme, MH dengan sifatkritisnya yang berupaya “menyuarakan” nasib pribumi terjajah, justru menampilkan stigmapenguatan kolonialitas itu sendiri secara hegemonik. Artinya, “menyuarakan” nasib pribumidimaknai sebagai keberpihankan kolonial yang kontradiktif, di mana stigma penguatankolonialitas justru lebih terasa, ujung-ujungnya melanggengkan hegemoni kolonial. Tidakmembela yang terjajah, tetapi memperhalus cara kerja mesin kolonial.AbstractThe hegemony of colonialism in the culture of postcolonial society is the reason this studythen examines the colonial discourse in the novel Max Havellar (MH) in particular the impactit brings. The impact in question is the implied position of thought in the work. The resultsof the discussion show that, temporarily or permanently, MH voiced injustice in the colonialconditions regarding the oppression of the colonist against the colonized. However, the effort toname or represent the voice of the colonized has proven to imply a static ideological characterin the framework of colonialism (orientalism); ie Eropacentric point of view, in which “West” asself is superior, and “East” as the other is the inferior. In the context of postcolonialism, MH withits critical nature that seeks to “voice” the fate of the colonized natives, actually presents thestigma of strengthening coloniality itself hegemonicly. That is, “voicing” the fate of the pribumiis interpreted as a contradictory colonial flare, where the stigma of strengthening colonialityis more pronounced, which ultimately perpetuates the hegemony of colonialism. No longerdefending the colonized, but refining the workings of the colonial machinery.


Author(s):  
Qingtao Wu ◽  
Zaihui Cao

: Cloud monitoring technology is an important maintenance and management tool for cloud platforms.Cloud monitoring system is a kind of network monitoring service, monitoring technology and monitoring platform based on Internet. At present, the monitoring system is changed from the local monitoring to cloud monitoring, with the flexibility and convenience improved, but also exposed more security issues. Cloud video may be intercepted or changed in the transmission process. Most of the existing encryption algorithms have defects in real-time and security. Aiming at the current security problems of cloud video surveillance, this paper proposes a new video encryption algorithm based on H.264 standard. By using the advanced FMO mechanism, the related macro blocks can be driven into different Slice. The encryption algorithm proposed in this paper can encrypt the whole video content by encrypting the FMO sub images. The method has high real-time performance, and the encryption process can be executed in parallel with the coding process. The algorithm can also be combined with traditional scrambling algorithm, further improve the video encryption effect. The algorithm selects the encrypted part of the video data, which reducing the amount of data to be encrypted. Thus reducing the computational complexity of the encryption system, with faster encryption speed, improve real-time and security, suitable for transfer through mobile multimedia and wireless multimedia network.


Author(s):  
Jiawei Huang ◽  
Shiqi Wang ◽  
Shuping Li ◽  
Shaojun Zou ◽  
Jinbin Hu ◽  
...  

AbstractModern data center networks typically adopt multi-rooted tree topologies such leaf-spine and fat-tree to provide high bisection bandwidth. Load balancing is critical to achieve low latency and high throughput. Although the per-packet schemes such as Random Packet Spraying (RPS) can achieve high network utilization and near-optimal tail latency in symmetric topologies, they are prone to cause significant packet reordering and degrade the network performance. Moreover, some coding-based schemes are proposed to alleviate the problem of packet reordering and loss. Unfortunately, these schemes ignore the traffic characteristics of data center network and cannot achieve good network performance. In this paper, we propose a Heterogeneous Traffic-aware Partition Coding named HTPC to eliminate the impact of packet reordering and improve the performance of short and long flows. HTPC smoothly adjusts the number of redundant packets based on the multi-path congestion information and the traffic characteristics so that the tailing probability of short flows and the timeout probability of long flows can be reduced. Through a series of large-scale NS2 simulations, we demonstrate that HTPC reduces average flow completion time by up to 60% compared with the state-of-the-art mechanisms.


Sensors ◽  
2021 ◽  
Vol 21 (8) ◽  
pp. 2681
Author(s):  
Kedir Mamo Besher ◽  
Juan Ivan Nieto-Hipolito ◽  
Raymundo Buenrostro-Mariscal ◽  
Mohammed Zamshed Ali

With constantly increasing demand in connected society Internet of Things (IoT) network is frequently becoming congested. IoT sensor devices lose more power while transmitting data through congested IoT networks. Currently, in most scenarios, the distributed IoT devices in use have no effective spectrum based power management, and have no guarantee of a long term battery life while transmitting data through congested IoT networks. This puts user information at risk, which could lead to loss of important information in communication. In this paper, we studied the extra power consumed due to retransmission of IoT data packet and bad communication channel management in a congested IoT network. We propose a spectrum based power management solution that scans channel conditions when needed and utilizes the lowest congested channel for IoT packet routing. It also effectively measured power consumed in idle, connected, paging and synchronization status of a standard IoT device in a congested IoT network. In our proposed solution, a Freescale Freedom Development Board (FREDEVPLA) is used for managing channel related parameters. While supervising the congestion level and coordinating channel allocation at the FREDEVPLA level, our system configures MAC and Physical layer of IoT devices such that it provides the outstanding power utilization based on the operating network in connected mode compared to the basic IoT standard. A model has been set up and tested using freescale launchpads. Test data show that battery life of IoT devices using proposed spectrum based power management increases by at least 30% more than non-spectrum based power management methods embedded within IoT devices itself. Finally, we compared our results with the basic IoT standard, IEEE802.15.4. Furthermore, the proposed system saves lot of memory for IoT devices, improves overall IoT network performance, and above all, decrease the risk of losing data packets in communication. The detail analysis in this paper also opens up multiple avenues for further research in future use of channel scanning by FREDEVPLA board.


Electronics ◽  
2021 ◽  
Vol 10 (15) ◽  
pp. 1774
Author(s):  
Ming-Chin Chuang ◽  
Chia-Cheng Yen ◽  
Chia-Jui Hung

Recently, with the increase in network bandwidth, various cloud computing applications have become popular. A large number of network data packets will be generated in such a network. However, most existing network architectures cannot effectively handle big data, thereby necessitating an efficient mechanism to reduce task completion time when large amounts of data are processed in data center networks. Unfortunately, achieving the minimum task completion time in the Hadoop system is an NP-complete problem. Although many studies have proposed schemes for improving network performance, they have shortcomings that degrade their performance. For this reason, in this study, we propose a centralized solution, called the bandwidth-aware rescheduling (BARE) mechanism for software-defined network (SDN)-based data center networks. BARE improves network performance by employing a prefetching mechanism and a centralized network monitor to collect global information, sorting out the locality data process, splitting tasks, and executing a rescheduling mechanism with a scheduler to reduce task completion time. Finally, we used simulations to demonstrate our scheme’s effectiveness. Simulation results show that our scheme outperforms other existing schemes in terms of task completion time and the ratio of data locality.


2021 ◽  
Vol 48 (2) ◽  
pp. 77-92
Author(s):  
Isabel Seguí

Beatriz Palacios’s instrumental role in the Ukamau group has been largely ignored by film historiography and criticism. The authorial persona of her comrade and husband, Jorge Sanjinés, has eclipsed Palacios’s work and ideas. Her erasure is due to the perspectives chosen to analyze Ukamau (male-centered auteurist and formalist approaches) and to the almost exclusive use of the voice of Sanjinés (interviews, essays, and films interpreted in an authorial key) to construct the group’s history. Ignoring the contribution and importance of Palacios’s work and not accounting for her share in the authorship of the films made during the years they lived and worked together impedes a correct understanding of the complexity of the production context and the amplitude of the contribution of Ukamau to Latin American cinema. While her work as a producer is increasingly recognized, delving into her roles as a disseminator of political cinema in alternative circuits, evaluator of the impact of the movies on the popular classes, and documentary director completes the portrait of her all-encompassing life and career. En gran medida, el papel instrumental de Beatriz Palacios en el grupo Ukamau ha sido ignorado por la historiografía y la crítica cinematográficas. La persona autoral de su camarada y esposo, Jorge Sanjinés, ha eclipsado la obra e ideas de Palacios. Dicha eliminación se debe a las perspectivas elegidas para analizar Ukamau (enfoques y formalistas) y al uso casi exclusivo de la voz de Sanjinés (entrevistas, ensayos y películas interpretadas en clave autoral) para construir la historia del grupo. Ignorar la contribución e importancia del trabajo de Palacios, así como su participación en la autoría de las películas realizadas durante los años que vivieron y trabajaron juntos, impide una correcta contribución de Ukamau al cine latinoamericano. Mientras que su trabajo como productora es cada vez más reconocido, ahondar en su labor como divulgadora de cine político en circuitos alternativos, evaluadora del impacto de las películas en las clases populares y directora de documentales, completa debidamente retrato de su vida y carrera.


2020 ◽  
Vol 36 (1) ◽  
Author(s):  
Nesreen Fathi Mahmoud ◽  
Huda Zahran ◽  
Sherif Abdelmonam

Abstract Background This study focuses on the self-perception of the voice in the elderly as assessed by the Voice-Related Quality of Life (V-RQOL) questionnaire. This work aimed to compare differences in the voice-related quality of life outcomes between (1) elderly with and without voice disorders, (2) female and male elderly with voice disorders, and (3) different types of voice disorders, and to explore the correlation between the V-RQOL and perceptual analysis done by the clinician. Forty-three dysphonic and 44 non-dysphonic elderly filled out the Voice-Related Quality of Life (V-RQOL) protocol that analyzes the impact of dysphonia on life quality. Vocal perceptual assessment of each subject with dysphonia was made by three voice therapists, followed by a flexible nasofibrolaryngoscope. Results A significant statistical difference was found between the means of total V-RQOL scores and its subdomains for each group (dysphonic and non-dysphonic). No significant differences were found between male and female elderly with dysphonia. The statistical analysis showed a significant correlation with the vocal assessment made by the clinicians and the V-RQOL self-assessment made by the subjects. Conclusions This study provides valuable information regarding the risk factors that contribute to vocal quality in the elderly population. Our results revealed that different types of voice disorders are common among the elderly population with significant negative effects on quality of life. It was observed that the poorest score on the V-RQOL was for functional voice disorders, followed by neoplastic lesions, whereas MAPLs had the best score on the V-RQOL.


Sign in / Sign up

Export Citation Format

Share Document