In this paper a multi-parameter A*(Astar)-ants based algorithm is proposed in order to find the best optimized multi-parameter path between two desired points in regions. This algorithm recognizes paths, according to user desired... more
This thesis presents synthesis of the reversible comparator. The proposed circuits are designed using only parity preserving Fredkin and Feynman double gates. Thus, these circuits inherently turn into fault tolerant circuits. In addition,... more
The problem of imputing missing entries of a data matrix is easy to state: Some entries of the matrix are unknown and we want to assign "appropriate values" to these entries. The need for solving such problems arises in several... more
Business models (BMs) are expressions of how companies are organised to generate value for themselves and for their stakeholders. The literature indicates a lack of evidence that might characterise the relationship between the BM and the... more
World Wide Web (WWW) is a mine of information for most people. Due to the huge amount of information and documents available on the internet, the process of retrieving documents that are most relevant to user needs become a tremendous... more
This paper presents a transmission expansion algorithm based on ant colony optimization. It was developed and tested on a model for the Nordic area. The main focus of this work was to build a transmission expansion planning tool able to... more
This paper presents a transmission expansion algorithm based on ant colony optimization. It was developed and tested on a model for the Nordic area. The main focus of this work was to build a transmission expansion planning tool able to... more
The strategic integration of artificial intelligence with business process automation represents a fundamental reimagining of enterprise operational frameworks in the digital transformation era. This convergence transcends traditional... more
To harness the potential of advanced computing technologies, efficient (real time) analysis of large amounts of data is as essential as are front-line simulations. In order to optimise this process, experts need to be supported by... more
Sinica, for their helpful comments on earlier drafts of this paper and Jorge Menèndez for his research assistance. We especially wish to thank James Heckman for providing us with a version of the statistical software used in some of the... more
In today modern life the use of wireless networks have attain a great attraction because in wireless environment the nodes or user can move freely without any physical connection the network resources. The throughput is considering a... more
Cache prefetching technique can improve the hit ratio and expedite users visiting speed. Predictive Web prefetching refers to the mechanism of deducing the forth coming page accesses of a client based on its past accesses.Congestion in... more
Cache prefetching technique can improve the hit ratio and expedite users visiting speed. Predictive Web prefetching refers to the mechanism of deducing the forth coming page accesses of a client based on its past accesses.Congestion in... more
The optimal routing will only be possible if the link weights are calculated correctly. Also, the weight of the links should be different based on the type of destination nodes and the traffic flow of each path in the network and should... more
The research outlined in this paper aims the development of a methodology to arrive at critical path calculations in construction networks using Ant Colony Optimization (ACO) algorithms. Ant Colony Optimization is a population-based,... more
Context: The generation of dynamic test sequences from a formal specification, complementing traditional testing methods in order to find errors in the source code. Objective: In this paper we extend one specific combinatorial test... more
In this article we proposed a new data gathering exponential ratio type estimator for the estimation of finite population mean under systematic sampling .The mean square error of the suggested estimator is computed up to the first degree... more
The combined effects of piezo-viscous and surface roughness on the squeeze film characteristics of micropolar fluid in convex curved plates are analytically studied. The variation in viscosity along the film thickness is considered. The... more
Quality of Service Aware Routing Protocol for a Self-Organized Communication Network Mobile Ad-hoc Networks (MANETs) are characterized by two dimensions namely, anywhere and anytime. The freely moving participating nodes can form an ad... more
Regression testing is one of the most arduous and challenging activity which has been implemented during maintenance phase of the software development life cycle. With the ever increasing demand of updating the web applications to meet... more
Defects in a construction site is inevitable and these defects must be inspected and reported timely to minimize extract cost due to repair the defects. However, in practice, quality of structural elements is often inspected by a site... more
Cluster based protocols like LEACH were found best suited for routing in wireless sensor networks. In mobility centric environments some improvements were suggested in the basic scheme. LEACH-Mobile is one such protocol. The basic LEACH... more
Due to its complexity, modeling of the transportation network involves a very large number of node choices for completion of a travel route. Conventional route choice models approach this problem from the mathematical point of view. In... more
We study the problem of deploying a fleet of mobile robots to service tasks that arrive stochastically over time and at random locations in an environment. This is known as the Dynamic Vehicle Routing Problem (DVRP) and requires robots to... more
This paper describes how the Ant System can be improved by selfadaptation of its controlling parameters. Adaptation is achieved by integrating a genetic algorithm with the ant system and maintaining a population of agents (ants) that have... more
Churches are part of heritage structures that take an important role in Europe´s cultural identity. As such, these structures must be protected to prevent catastrophic collapse and any damage must be reported timely to establish planning... more
We have integrated a framework for computational steering developed at the Technische Universität München [1] into the AGENT [2] codebase. This framework allows for the arbitrary interruption of any simulation system for the purpose of... more
In this paper, the squeeze film behaviour of curved circular plates using micropolar .fluid as lubricant has been investigated theoretically. The pressure, load and the time of approach derived for the squeeze formed form the generalized... more
The effect of surface roughness on squeeze film elliptical plates with micro-polar fluid is theoretically presented in the present analysis. Based upon the Christensen’s stochastic model, stochastic Reynolds-type equation is derived. The... more
In this paper, the squeeze film behaviour of curved circular plates using micropolar .fluid as lubricant has been investigated theoretically. The pressure, load and the time of approach derived for the squeeze formed form the generalized... more
With the increasing demand for need of retrieval of images based on different properties, characteristics there has been tremendous research going on in the field of Content-based image retrieval (CBIR), also known as query by image... more
This paper proposes a family of exponential estimators for estimating the population mean Y of study variable y using an auxiliary variable x in circular systematic sampling design under single and two phase sampling. The expression of... more
In this article, the family of exponential type estimators with the auxiliary variable is proposed in the case of non-response scheme for the purpose of obtaining the unknown population mean of the study variable. The nonresponse scheme... more
Routing algorithm is the key element in networks performance and reliability, therefore, there is a need for an algorithm to manage traffic flows and deliver packets from the source to the destination in a realistic time. A modification... more
Wireless networks are becoming more and more ubiquitous in recent years, ranging from Digital cellular telephony up to satellite broadcasting. With the increasing demand and Penetration of wireless services, users of wireless networks now... more
The Costa Rica seismic network OVSICORI-UNA located a Mw=6.4 (Harvard CMT) earthquake that occurred on November 20, 2004 at 08:07 UTC. The seismic event was located in the central Pacific part of Costa Rica with a focal depth of 25 km and... more
The finite element method is classically based on nodal Lagrange basis functions defined on conforming meshes. In this context, total reaction forces are commonly computed from the so-called "nodal forces", yielding higher accuracy and... more
Significant developments in the field of additive manufacturing (AM) allowed the fabrication of complex microarchitectured components with varying porosity across different scales. However, due to the high complexity of this process, the... more
An important field in cultural heritage preservation is the study of the mechanical behavior of historical structures. As there are no computer models available for these objects, the corresponding simulation models are usually derived... more
Current trends show that UMTS network and WLAN will co-exist and work together to support more users with higher data rate services over a wider area. However, this integration invokes many challenges such as mobility management and... more
This paper addresses the problem of steering a swarm of autonomous agents out of an unknown maze to some goal located at an unknown location. This is particularly the case in situations where no direct communication between the agents is... more
Context: The generation of dynamic test sequences from a formal specification, complementing traditional testing methods in order to find errors in the source code. Objective: In this paper we extend one specific combinatorial test... more
To exploit the advantageous properties of isogeometric analysis (IGA) in a scan-based setting, it is important to extract a smooth geometric domain from the scan data (e.g., voxel data). IGA-suitable domains can be constructed by... more
The invention of graphical processing units (GPUs) has significantly improved the speed of long processes used in molecular dynamics (MD) to search for drug candidates to treat diseases, such as malaria. Previous work using a single GTX... more
Mobile ad hoc networks are infrastructure-less networks consisting of wireless, possibly mobile nodes which are organized in peer-to-peer and autonomous fashion. Each node is also a router that forwards data packets to its proper... more
In a packet network, the routes taken by traffic from sources to destinations can be determined according to predefined objectives. For example, a video stream application might benefit from a path where packet loss is reduced, whereas a... more
The development of an OCR system for recognition of old Gurmukhi handwritten manuscripts is a complex task involving many difficulties. Historical documents are affected by problems of ageing and repeated use and many other uncontrollable... more





















![FIGURE 2.3: Frame and delay sequence diagram for CSMA/CA with RTS/CTS [15] data transmission.](https://web.archive.org/web/20251202073549im_/https://figures.academia-assets.com/112910438/figure_003.jpg)


![A and link SA in common. FIGURE 2.6: Type of Multipath Routing Protocol [56] ultipath routing mechanism consists of three phases: route discovery, route mainte. wnce, and traffic allocation. Route discovery and maintenance phases are responsible r finding and maintaining multiple paths between source and destination node anc orks in a similar way as discussed in earlier section. Multipath routing protocols car > implemented with node-disjoint, link-disjoint, or non-disjoint routing mechanisms 6]. In the node-disjoint technique, the multiple routes between source and destinatior » not share any node or link. In a link-disjoint approach, the multiple routes do not are any link, but may share nodes on the path. In the non-disjoint method, the multi. e routes can share nodes and links. Figure 2.6 depicts the above three methods. Figure 6a represents the node-disjoint approach where the routes SAD, SBD, and SCD have » links or nodes in common. Figure 2.6b represents the link-disjoint approach where utes SABCD and SBD have node B in common but does not share any link. Figure 6c represents the non-disjoint approach where routes SAD and SABD have both, node](https://web.archive.org/web/20251202073549im_/https://figures.academia-assets.com/112910438/figure_006.jpg)
![FIGURE 3.1: An example of the path from nod 7 to destination d via neighbor node 9 QoS metrics are defined as a set of the unit measurements that reflects the state o the node in terms of the available bandwidth, delay, jitter, packet loss probability, etc Alternatively, the value of a QoS metric along the path is determined by the individua values of that metric at every intermediate node that forms the path. These metric: are broadly classified into three primary categories: additive, multiplicative, and concavi [62]. Let p(i, 7,d) denote the path from node i to destination d through a neighbor nod j as shown in figure 3.1. The symbols A, M, and C are the additive, multiplicative, anc concave metrics respectively. These metrics are described as follows. concave metrics respectively. These metrics are described as follows.](https://web.archive.org/web/20251202073549im_/https://figures.academia-assets.com/112910438/figure_007.jpg)



![FIGURE 4.3: Example explaining the QoRA Neighbor Table The equation 4.3 derived from [132], gives the current pheromone value 7;; available or the link. High pheromone value on the link indicates that a large number of packets have selected the link from 7 to 7 recently, because each ant or data packet will increase the accumulated pheromone amount by Az;;. Whereas, the smaller pheromone value indicates that the link has bad quality, and the pheromone available on the path is decaying i.e. constantly evaporating by the factor p, thus reducing its attractive strength. The pheromone value is limited between the initial pheromone value 0.01 to maximum value 1.](https://web.archive.org/web/20251202073549im_/https://figures.academia-assets.com/112910438/figure_011.jpg)



![FIGURE 4.11: Object identifiers in the Management Information Base-II [153]](https://web.archive.org/web/20251202073549im_/https://figures.academia-assets.com/112910438/figure_015.jpg)




![FIGURE 4.17: Example explaining the calculation of residual and threshold of QoS values [130]](https://web.archive.org/web/20251202073549im_/https://figures.academia-assets.com/112910438/figure_020.jpg)



![FIGURE 4.21: The utilization of the alternate path The figure 4.21 shows the utilization of the alternate path for the data transmission in the situations where congestion or link failure is observed on the currently active path. Consider the data is transmitted on the discovered path S-A-] 4.21a. After a certain time, the node E suffer from the problem of congestion or EantStack and will broadcast the ] tAantidesr nour nathea toa the deoetinat E ANT to inform the previous nodes in the path a routing table for an alternate path to the destination D for the ongoing communica n case, the neighbor node does not have the alternate path to the destination, it rebroadcast the EANT until it is received by the node that has a path to the destinati Inn E-C-D as shown in figure link ailure with the neighbor node C as shown in the figure. In the mean time, the node E will refresh its routing table and check for the alternative path to the destination so that the affected communication can be resumed. In the situations where the node does not have another path to the destination, it will add the flow information (FlowID) to bout ink failures or QoS violation. The neighbor node after receiving EANT will look in its tion. will L10N. n our example, the node B has an alternate path to the destination D, so it will drop the EANT, and resume the communication on the new alternate path S-A-B-C-D, as shown in figure 4.21b. If the EANT is received at the source node, the source node has to update its routing table for the affected flow and has to broadcast new FANT to](https://web.archive.org/web/20251202073549im_/https://figures.academia-assets.com/112910438/figure_024.jpg)

![Ipv4L3Protocol, Ipv4RoutingProtocol, and Ipv4Route [166]. FIGURE 5.2: The QoRA Architecture based on ns-3 framework](https://web.archive.org/web/20251202073549im_/https://figures.academia-assets.com/112910438/figure_026.jpg)










![FIGURE 6.8: Examples of Manhattan Grid Mobility with 200 vehicles Friis perform well for small distance as compared to Two Ray Ground . n this experimental setup, we compare the performance of the proposed routing protocol or MANETs and VANETs scenarios [130]. For MANETs, the network consists of 100 odes with RWP mobility model, while for VANETs we have 200 vehicles with 5 x 5 Janhattan Grid Mobility as shown in figure 6.8. The speed of the node is varied in both he cases from 5 m/s (18 Km/h) to 30 m/s (108 Km/h) in step 5 m/s. The variation in he maximum speed affects both these mobility model in the following ways. The higher peed means high mobility, which causes frequent topology changes and thus, making he scenario more difficult. We used 10 communication sessions to send voice traffic G.729) at a Constant Bit Rate (CBR) of 8 kb/s and a packet size of 218 bytes using the is-3 OnOffApplication. Additionally, we use Friis propagation loss model for small ransmission range in MANETs scenario and for large transmission range in VANETs cenario we use Two Ray Ground propagation loss model. As explain in section 6.2.1 ‘riis perform well for small distance as compared to Two Ray Ground .](https://web.archive.org/web/20251202073549im_/https://figures.academia-assets.com/112910438/figure_037.jpg)


![n the final scenario, we test the performance of QoRA for video transmission over high] realistic mobility setups. Here, we have used another simulator called SUMO for real time road traffic scenario simulation. The speed of the cars or mobile nodes in SUMC are influenced by a wide range of real life parameters like lane speed, car following th traffic, lane changing, intersections, signals, etc. while in the previous scenarios th« nodes are moving with a constant speed and do not support these parameters. Figur 6.11 shows the mobility network map for Ilmenau city. For the simulation, we choos 100 vehicles moving according to the traffic model in the area of size 1000 x 2000 m? . For the video application, we have used H.264/SVC (Scalable Video Coding) as it allows the scaling of the video transmissions so that the video can be delivered without any degradation in the quality between the devices. This property makes SVC an apt choice for MANETs/VANETs that are characterized by scarcity of resources like bandwidth, poor channel conditions, etc. Also, SVC benefits a large number of video applications ike streaming, conferencing, broadcast, surveillance, etc. We choose between 2 to 12 video communication sessions varying in the step of 2 flows at a time to send video traffic that is modeled using video trace file [176]. In this way, we can stress the network or check the protocol with the real-time video data. The simulation results shown in the figure 6.12. 6.11 shows the mobility network map for Imenau city. For the simulation, we choose For the video application, we have used H.264/SVC (Scalable Video Coding) as it allows](https://web.archive.org/web/20251202073549im_/https://figures.academia-assets.com/112910438/figure_040.jpg)


![TABLE 2.1: Types of IEEE 802.11 standard The quality of the physical parameters of the wireless channel is observed to be inversely proportional to the distance between the two communicating nodes. So, the trade-off is observed between the transmission range and the transmission rate. This trade-off has E 802.11 standard. In multi-rate ies lead to the inclusion of multi-rate capability in the IE] data transmissions, the data rate is varied according to the bit error rate observed on the channel so that the bit error rate can be kept under the threshold in order to facilitate the reliable communication on the available channel.](https://web.archive.org/web/20251202073549im_/https://figures.academia-assets.com/112910438/table_002.jpg)





















![Figure 2: Video game ECTM example. take our video game example and let us imagine that we need to execute some code when the user change the state of the object from starting game to running game. These operations can be modeled by extendin; the classification tree method with transitions between classes (see Figure 2). In a real-world example, thes transitions come from the semantics of the software object. We also assume that each classification has : default class that we highlight in the graphical representation by underlining the class. This extension of th classification tree can be seen as a hierarchical concurrent state machine (HCSM) or statechart [15] wher classes match states, and classifications match orthogonal regions.](https://web.archive.org/web/20251202073549im_/https://figures.academia-assets.com/107181846/figure_002.jpg)













