Search results for: pointer forwarding
60 An Efficient Resource Management Algorithm for Mobility Management in Wireless Mesh Networks
Authors: Mallikarjuna Rao Yamarthy, Subramanyam Makam Venkata, Satya Prasad Kodati
Abstract:
The main objective of the proposed work is to reduce the overall network traffic incurred by mobility management, packet delivery cost and to increase the resource utilization. The proposed algorithm, An Efficient Resource Management Algorithm (ERMA) for mobility management in wireless mesh networks, relies on pointer based mobility management scheme. Whenever a mesh client moves from one mesh router to another, the pointer is set up dynamically between the previous mesh router and current mesh router based on the distance constraints. The algorithm evaluated for signaling cost, data delivery cost and total communication cost performance metrics. The proposed algorithm is demonstrated for both internet sessions and intranet sessions. The proposed algorithm yields significantly better performance in terms of signaling cost, data delivery cost, and total communication cost.Keywords: data delivery cost, mobility management, pointer forwarding, resource management, wireless mesh networks
Procedia PDF Downloads 36759 Mitigating Denial of Service Attacks in Information Centric Networking
Authors: Bander Alzahrani
Abstract:
Information-centric networking (ICN) using architectures such as Publish-Subscribe Internet Routing Paradigm (PSIRP) is one of the promising candidates for a future Internet, has recently been under the spotlight by the research community to investigate the possibility of redesigning the current Internet architecture to solve many issues such as routing scalability, security, and quality of services issues.. The Bloom filter-based forwarding is a source-routing approach that is used in the PSIRP architecture. This mechanism is vulnerable to brute force attacks which may lead to denial-of-service (DoS) attacks. In this work, we present a new forwarding approach that keeps the advantages of Bloom filter-based forwarding while mitigates attacks on the forwarding mechanism. In practice, we introduce a special type of forwarding nodes called Edge-FW to be placed at the edge of the network. The role of these node is to add an extra security layer by validating and inspecting packets at the edge of the network against brute-force attacks and check whether the packet contains a legitimate forwarding identifier (FId) or not. We leverage Certificateless Aggregate Signature (CLAS) scheme with a small size of 64-bit which is used to sign the FId. Hence, this signature becomes bound to a specific FId. Therefore, malicious nodes that inject packets with random FIds will be easily detected and dropped at the Edge-FW node when the signature verification fails. Our preliminary security analysis suggests that with the proposed approach, the forwarding plane is able to resist attacks such as DoS with very high probability.Keywords: bloom filter, certificateless aggregate signature, denial-of-service, information centric network
Procedia PDF Downloads 19858 A Survey of Novel Opportunistic Routing Protocols in Mobile Ad Hoc Networks
Authors: R. Poonkuzhali, M. Y. Sanavullah, M. R. Gurupriya
Abstract:
Opportunistic routing is used, where the network has the features like dynamic topology changes and intermittent network connectivity. In Delay Tolerant network or Disruption tolerant network opportunistic forwarding technique is widely used. The key idea of opportunistic routing is selecting forwarding nodes to forward data and coordination among these nodes to avoid duplicate transmissions. This paper gives the analysis of pros and cons of various opportunistic routing techniques used in MANET.Keywords: ETX, opportunistic routing, PSR, throughput
Procedia PDF Downloads 49457 Secure Optimized Ingress Filtering in Future Internet Communication
Authors: Bander Alzahrani, Mohammed Alreshoodi
Abstract:
Information-centric networking (ICN) using architectures such as the Publish-Subscribe Internet Technology (PURSUIT) has been proposed as a new networking model that aims at replacing the current used end-centric networking model of the Internet. This emerged model focuses on what is being exchanged rather than which network entities are exchanging information, which gives the control plane functions such as routing and host location the ability to be specified according to the content items. The forwarding plane of the PURSUIT ICN architecture uses a simple and light mechanism based on Bloom filter technologies to forward the packets. Although this forwarding scheme solve many problems of the today’s Internet such as the growth of the routing table and the scalability issues, it is vulnerable to brute force attacks which are starting point to distributed- denial-of-service (DDoS) attacks. In this work, we design and analyze a novel source-routing and information delivery technique that keeps the simplicity of using Bloom filter-based forwarding while being able to deter different attacks such as denial of service attacks at the ingress of the network. To achieve this, special forwarding nodes called Edge-FW are directly attached to end user nodes and used to perform a security test for malicious injected random packets at the ingress of the path to prevent any possible attack brute force attacks at early stage. In this technique, a core entity of the PURSUIT ICN architecture called topology manager, that is responsible for finding shortest path and creating a forwarding identifiers (FId), uses a cryptographically secure hash function to create a 64-bit hash, h, over the formed FId for authentication purpose to be included in the packet. Our proposal restricts the attacker from injecting packets carrying random FIds with a high amount of filling factor ρ, by optimizing and reducing the maximum allowed filling factor ρm in the network. We optimize the FId to the minimum possible filling factor where ρ ≤ ρm, while it supports longer delivery trees, so the network scalability is not affected by the chosen ρm. With this scheme, the filling factor of any legitimate FId never exceeds the ρm while the filling factor of illegitimate FIds cannot exceed the chosen small value of ρm. Therefore, injecting a packet containing an FId with a large value of filling factor, to achieve higher attack probability, is not possible anymore. The preliminary analysis of this proposal indicates that with the designed scheme, the forwarding function can detect and prevent malicious activities such DDoS attacks at early stage and with very high probability.Keywords: forwarding identifier, filling factor, information centric network, topology manager
Procedia PDF Downloads 15456 Exploiting SLMail Server with a Developed Buffer Overflow with Kali Linux
Authors: Senesh Wijayarathne
Abstract:
This study focuses on how someone could develop a Buffer Overflow and could use that to exploit the SLMail Server. This study uses a Kali Linux V2018.4 Virtual Machine and Windows 7 - Internet Explorer V8 Virtual Machine (IPv4 Address - 192.168.56.107). This study starts by sending continued bytes to the SLMail Server to find the crashing point range and creating a unique pattern of the length of the crashing point range to control the Extended Instruction Pointer (EIP). Then by sending all characters to SLMail Server, we could observe and find which characters are not rendered properly by the software, also known as Bad Characters. By finding the ‘Jump to the ESP register (JMP ESP) and with the help of ‘Mona Modules’, we could use msfvenom to create a non-stage windows reverse shell payload. By including all the details gathered previously on one script, we could get a system-level reverse shell of the Windows 7 PC. The end of this paper will discuss how to mitigate this vulnerability.Keywords: slmail server, extended instruction pointer, jump to the esp register, bad characters, virtual machine, windows 7, kali Linux, buffer overflow, Seattle lab, vulnerability
Procedia PDF Downloads 16555 Visualisation in Health Communication: Taking Weibo Interaction in COVD19 as the Example
Authors: Zicheng Zhang, Linli Zhang
Abstract:
As China's biggest social media platform, Weibo has taken on essential health communication responsibilities during the pandemic. This research takes 105 posters in 15 health-related official Weibo accounts as the analysis objects to explore COVID19 health information communication and visualisation. First, the interaction between the audiences and Weibo, including forwarding, comments, and likes, is statistically analysed. The comments about the information design are extracted manually, and then the sentiment analysis is carried out to verdict audiences' views about the poster's design. The forwarding and comments are quantified as the attention index for a reference to the degree of likes. In addition, this study also designed an evaluation scale based on the standards of Health Literacy Resource by the Centers for Medicare& Medicaid Services (US). Then designers scored all selected posters one by one. Finally, combining the data of the two parts, concluded that: 1. To a certain extent, people think that the posters do not deliver substantive and practical information; 2. Non-knowledge posters(i.e., cartoon posters) gained more Forwarding and Likes, such as Go, Wuhan poster; 3. The analysis of COVID posters is still mainly picture-oriented, mainly about encouraging people to overcome difficulties; 4. Posters for pandemic prevention usually contain more text and fewer illustrations and do not clearly show cultural differences. In conclusion, health communication usually involves a lot of professional knowledge, so visualising that knowledge in an accessible way for the general public is challenging. The relevant posters still have the problems of lack of effective communication, superficial design, and insufficient content accessibility.Keywords: weibo, visualisation, covid posters, poster design
Procedia PDF Downloads 12754 Improving Ghana's Oil Industry Through Integrated Operations
Authors: Esther Simpson, Evans Addo Tetteh
Abstract:
One of the most important sectors in Ghana’s economy is the oil and gas sector. Effective supply chain management is required to ensure the timely delivery of these products to the end users, given the rise in nationwide demand for petroleum products. Contrarily, freight forwarding plays a crucial role in facilitating intra- and intra-country trade, particularly the movement of oil goods. Nevertheless, there has not been enough scientific study done on how marketing, supply chain management, and freight forwarding are integrated in the oil business. By highlighting possible areas for development in the supply chain management of petroleum products, this article seeks to close this gap. The study was predominantly qualitative and featured semi-structured interviews with influential figures in the oil and gas sector, such as marketers, distributors, freight forwarders, and regulatory organizations. The purpose of the interviews was to determine the difficulties and possibilities for enhancing the management of the petroleum products supply chain. Thematic analysis was used to examine the data obtained in order to find patterns and themes that arose. The findings from the study revealed that the oil sector faced a number of issues in terms of supply chain management. Inadequate infrastructure, insufficient storage facilities, a lack of cooperation among parties, and an inadequate regulatory framework were among the obstacles. Furthermore, the study indicated significant prospects for enhancing petroleum product supply chain management, such as the integration of more advanced digital technologies, the formation of strategic alliances, and the adoption of sustainable practices in petroleum product supply chain management. The study's conclusions have far-reaching ramifications for the oil and gas sector, freight forwarding, and Ghana’s economy as a whole. Marketing, supply chain management, and freight forwarding has high prospects from being integrated to improve the efficiency of the petroleum product supply chain, resulting in considerable cost savings for the industry. Furthermore, the use of sustainable practices will improve the industry's sustainability and lessen the environmental effect of the petroleum product supply chain. Based on the findings, we propose that stakeholders in Ghana’s oil and gas sector work together and collaborate to enhance petroleum supply chain management. This collaboration should include the use of digital technologies, the formation of strategic alliances, and the implementation of sustainable practices. Moreover, we urge that governments establish suitable rules to guarantee the efficient and sustainable management of petroleum product supply chains. In conclusion, the integration and combination of marketing, supply chain management, and freight forwarding in the oil business gives a tremendous opportunity for enhancing petroleum product supply chain management. The study's conclusions have far-reaching ramifications for the sector, freight forwarding, and the economy as a whole. Using sustainable practices, integrating digital technology, and forming strategic alliances will improve the efficiency and sustainability of the petroleum product supply chain. We expect that this conference paper will encourage more study and collaboration among oil and gas sector stakeholders to improve petroleum supply chain management.Keywords: collaboration, logistics, sustainability, supply chain management
Procedia PDF Downloads 8153 Implementation and Demonstration of Software-Defined Traffic Grooming
Authors: Lei Guo, Xu Zhang, Weigang Hou
Abstract:
Since the traditional network is closed and it has no architecture to create applications, it has been unable to evolve with changing demands under the rapid innovation in services. Additionally, due to the lack of the whole network profile, the quality of service cannot be well guaranteed in the traditional network. The Software Defined Network (SDN) utilizes global resources to support on-demand applications/services via open, standardized and programmable interfaces. In this paper, we implement the traffic grooming application under a real SDN environment, and the corresponding analysis is made. In our SDN: 1) we use OpenFlow protocol to control the entire network by using software applications running on the network operating system; 2) several virtual switches are combined into the data forwarding plane through Open vSwitch; 3) An OpenFlow controller, NOX, is involved as a logically centralized control plane that dynamically configures the data forwarding plane; 4) The traffic grooming based on SDN is demonstrated through dynamically modifying the idle time of flow entries. The experimental results demonstrate that the SDN-based traffic grooming effectively reduces the end-to-end delay, and the improvement ratio arrives to 99%.Keywords: NOX, OpenFlow, Software Defined Network (SDN), traffic grooming
Procedia PDF Downloads 25152 Advanced Mouse Cursor Control and Speech Recognition Module
Authors: Prasad Kalagura, B. Veeresh kumar
Abstract:
We constructed an interface system that would allow a similarly paralyzed user to interact with a computer with almost full functional capability. A real-time tracking algorithm is implemented based on adaptive skin detection and motion analysis. The clicking of the mouse is activated by the user's eye blinking through a sensor. The keyboard function is implemented by voice recognition kit.Keywords: embedded ARM7 processor, mouse pointer control, voice recognition
Procedia PDF Downloads 57851 An Energy Holes Avoidance Routing Protocol for Underwater Wireless Sensor Networks
Authors: A. Khan, H. Mahmood
Abstract:
In Underwater Wireless Sensor Networks (UWSNs), sensor nodes close to water surface (final destination) are often preferred for selection as forwarders. However, their frequent selection makes them depleted of their limited battery power. In consequence, these nodes die during early stage of network operation and create energy holes where forwarders are not available for packets forwarding. These holes severely affect network throughput. As a result, system performance significantly degrades. In this paper, a routing protocol is proposed to avoid energy holes during packets forwarding. The proposed protocol does not require the conventional position information (localization) of holes to avoid them. Localization is cumbersome; energy is inefficient and difficult to achieve in underwater environment where sensor nodes change their positions with water currents. Forwarders with the lowest water pressure level and the maximum number of neighbors are preferred to forward packets. These two parameters together minimize packet drop by following the paths where maximum forwarders are available. To avoid interference along the paths with the maximum forwarders, a packet holding time is defined for each forwarder. Simulation results reveal superior performance of the proposed scheme than the counterpart technique.Keywords: energy holes, interference, routing, underwater
Procedia PDF Downloads 40950 Cluster Based Ant Colony Routing Algorithm for Mobile Ad-Hoc Networks
Authors: Alaa Eddien Abdallah, Bajes Yousef Alskarnah
Abstract:
Ant colony based routing algorithms are known to grantee the packet delivery, but they suffer from the huge overhead of control messages which are needed to discover the route. In this paper we utilize the network nodes positions to group the nodes in connected clusters. We use clusters-heads only on forwarding the route discovery control messages. Our simulations proved that the new algorithm has decreased the overhead dramatically without affecting the delivery rate.Keywords: ad-hoc network, MANET, ant colony routing, position based routing
Procedia PDF Downloads 42549 Comprehensive Studies on the Aerodynamic Characteristics of Subsonic Scarf Inlets
Authors: M. Jegannath, V. Akshaya, B. Arunkumar, G. Lakshmi Soundharya, V. Thenmozhi, S. Varun, V. R. S. Kumar
Abstract:
For scarf inlet design, the primary variable of interest is the circumferential extent over which the extended lower lip is formed. In this paper, an attempt has been made to optimize the aerodynamic shape of a subsonic scarf inlet with aerodynamically shaped center-body with a particular value of the circumferential extent. The parametric analytical studies have been carried out using a Spalart-Allmaras turbulence model. From our preliminary studies, we concluded that for a particular value of circumferential extent, there will be an exact shape of the center-body with certain geometric orientation for the existence of an aerodynamically efficient scarf inlet for modern aircraft engines. This numerical study is a pointer towards for the design optimization of scarf inlets for modern aircraft engines.Keywords: aerodynamics of scarf inlets, inlet design, modern aircraft inlets, subsonic scarf inlet
Procedia PDF Downloads 31748 Generation of Symmetric Key Using Randomness of Hash Function
Authors: Sai Charan Kamana, Harsha Vardhan Nakkina, B.R. Chandavarkar
Abstract:
In a highly secure and robust key generation process, a key role is played by randomness and random numbers when current real-world cryptosystems are observed. Most of the present-day cryptographic protocols depend upon the Random Number Generators (RNG), Pseudo-Random Number Generator (PRNG). These protocols often use noisy channels such as Disk seek time, CPU temperature, Mouse pointer movement, Fan noise to obtain true random values. Despite being cost-effective, these noisy channels may need additional hardware devices to continuously communicate with them. On the other hand, Hash functions are Pseudo-Random (because of their requirements). So, they are a good replacement for these noisy channels and have low hardware requirements. This paper discusses, some of the key generation methodologies, and their drawbacks. This paper explains how hash functions can be used in key generation, how to combine Key Derivation Functions with hash functions.Keywords: key derivation, hash based key derivation, password based key derivation, symmetric key derivation
Procedia PDF Downloads 16147 Extending the AOP Joinpoint Model for Memory and Type Safety
Authors: Amjad Nusayr
Abstract:
Software security is a general term used to any type of software architecture or model in which security aspects are incorporated in this architecture. These aspects are not part of the main logic of the underlying program. Software security can be achieved using a combination of approaches, including but not limited to secure software designs, third part component validation, and secure coding practices. Memory safety is one feature in software security where we ensure that any object in memory has a valid pointer or a reference with a valid type. Aspect-Oriented Programming (AOP) is a paradigm that is concerned with capturing the cross-cutting concerns in code development. AOP is generally used for common cross-cutting concerns like logging and DB transaction managing. In this paper, we introduce the concepts that enable AOP to be used for the purpose of memory and type safety. We also present ideas for extending AOP in software security practices.Keywords: aspect oriented programming, programming languages, software security, memory and type safety
Procedia PDF Downloads 12746 Misleading Node Detection and Response Mechanism in Mobile Ad-Hoc Network
Authors: Earleen Jane Fuentes, Regeene Melarese Lim, Franklin Benjamin Tapia, Alexis Pantola
Abstract:
Mobile Ad-hoc Network (MANET) is an infrastructure-less network of mobile devices, also known as nodes. These nodes heavily rely on each other’s resources such as memory, computing power, and energy. Thus, some nodes may become selective in forwarding packets so as to conserve their resources. These nodes are called misleading nodes. Several reputation-based techniques (e.g. CORE, CONFIDANT, LARS, SORI, OCEAN) and acknowledgment-based techniques (e.g. TWOACK, S-TWOACK, EAACK) have been proposed to detect such nodes. These techniques do not appropriately punish misleading nodes. Hence, this paper addresses the limitations of these techniques using a system called MINDRA.Keywords: acknowledgment-based techniques, mobile ad-hoc network, selfish nodes, reputation-based techniques
Procedia PDF Downloads 38545 Cooperative AF Scheme for Multi Source and Terminal in Edge of Cell Coverage
Authors: Myoung-Jin Kim, Chang-Bin Ha, Yeong-Seop Ahn, Hyoung-Kyu Song
Abstract:
This paper proposes a cooperative communication scheme for improve wireless communication performance. When the receiver is located in the edge of coverage, the signal from the transmitter is distorted for various reasons such as inter-cell interference (ICI), power reduction, incorrect channel estimation. In order to improve communication performance, the proposed scheme adds the relay. By the relay, the receiver has diversity gain. In this paper, two base stations, one relay and one destination are considered. The two base stations transmit same time to relay and destination. The relay forwarding to destination and the destination detects signals.Keywords: cooperative communication, diversity gain, OFDM, MMSE
Procedia PDF Downloads 38944 Reliable and Energy-Aware Data Forwarding under Sink-Hole Attack in Wireless Sensor Networks
Authors: Ebrahim Alrashed
Abstract:
Wireless sensor networks are vulnerable to attacks from adversaries attempting to disrupt their operations. Sink-hole attacks are a type of attack where an adversary node drops data forwarded through it and hence affecting the reliability and accuracy of the network. Since sensor nodes have limited battery power, it is essential that any solution to the sinkhole attack problem be very energy-aware. In this paper, we present a reliable and energy efficient scheme to forward data from source nodes to the base station while under sink-hole attack. The scheme also detects sink-hole attack nodes and avoid paths that includes them.Keywords: energy-aware routing, reliability, sink-hole attack, WSN
Procedia PDF Downloads 39643 Ternary Content Addressable Memory Cell with a Leakage Reduction Technique
Authors: Gagnesh Kumar, Nitin Gupta
Abstract:
Ternary Content Addressable Memory cells are mainly popular in network routers for packet forwarding and packet classification, but they are also useful in a variety of other applications that require high-speed table look-up. The main TCAM-design challenge is to decrease the power consumption associated with the large amount of parallel active circuitry, without compromising with speed or memory density. Furthermore, when the channel length decreases, leakage power becomes more significant, and it can even dominate dynamic power at lower technologies. In this paper, we propose a TCAM-design technique, called Virtual Power Supply technique that reduces the leakage by a substantial amount.Keywords: match line (ML), search line (SL), ternary content addressable memory (TCAM), Leakage power (LP)
Procedia PDF Downloads 29942 A Comparative Analysis of Geometric and Exponential Laws in Modelling the Distribution of the Duration of Daily Precipitation
Authors: Mounia El Hafyani, Khalid El Himdi
Abstract:
Precipitation is one of the key variables in water resource planning. The importance of modeling wet and dry durations is a crucial pointer in engineering hydrology. The objective of this study is to model and analyze the distribution of wet and dry durations. For this purpose, the daily rainfall data from 1967 to 2017 of the Moroccan city of Kenitra’s station are used. Three models are implemented for the distribution of wet and dry durations, namely the first-order Markov chain, the second-order Markov chain, and the truncated negative binomial law. The adherence of the data to the proposed models is evaluated using Chi-square and Kolmogorov-Smirnov tests. The Akaike information criterion is applied to assess the most effective model distribution. We go further and study the law of the number of wet and dry days among k consecutive days. The calculation of this law is done through an algorithm that we have implemented based on conditional laws. We complete our work by comparing the observed moments of the numbers of wet/dry days among k consecutive days to the calculated moment of the three estimated models. The study shows the effectiveness of our approach in modeling wet and dry durations of daily precipitation.Keywords: Markov chain, rainfall, truncated negative binomial law, wet and dry durations
Procedia PDF Downloads 12541 Design Manufacture and Testing of a Combined Alpha-Beta Double Piston Stirling Engine
Authors: A. Calvin Antony, Sakthi Kumar Arul Prakash, V. R. Sanal Kumar
Abstract:
In this paper a unique alpha-beta double piston 'stirling engine' is designed, manufactured and conducted laboratory test to ameliorate the efficiency of the stirling engine. The paper focuses on alpha and beta type engines, capturing their benefits and eradicating their short comings; along with the output observed from the flywheel. In this model alpha engine is kinematically with a piston cylinder arrangement which works quite like a beta engine. The piston of the new cylinder is so designed that it replicates a glued displacer and power piston as similar to that of beta engine. The bigger part of the piston is the power piston, which has a gap around it, while the smaller part of the piston is tightly fit in the cylinder and acts like the displacer piston. We observed that the alpha-beta double piston stirling engine produces 25% increase in power compare to a conventional alpha stirling engine. This working model is a pointer towards for the design and development of an alpha-beta double piston Stirling engine for industrial applications for producing electricity from the heat producing exhaust gases.Keywords: alpha-beta double piston stirling engine , alpha stirling engine , beta double piston stirling engine , electricity from stirling engine
Procedia PDF Downloads 53340 Compact Low-Voltage Biomedical Instrumentation Amplifiers
Authors: Phanumas Khumsat, Chalermchai Janmane
Abstract:
Low-voltage instrumentation amplifier has been proposed for 3-lead electrocardiogram measurement system. The circuit’s interference rejection technique is based upon common-mode feed-forwarding where common-mode currents have cancelled each other at the output nodes. The common-mode current for cancellation is generated by means of common-mode sensing and emitter or source followers with resistors employing only one transistor. Simultaneously this particular transistor also provides common-mode feedback to the patient’s right/left leg to further reduce interference entering the amplifier. The proposed designs have been verified with simulations in 0.18-µm CMOS process operating under 1.0-V supply with CMRR greater than 80dB. Moreover ECG signals have experimentally recorded with the proposed instrumentation amplifiers implemented from discrete BJT (BC547, BC558) and MOSFET (ALD1106, ALD1107) transistors working with 1.5-V supply.Keywords: electrocardiogram, common-mode feedback, common-mode feedforward, communication engineering
Procedia PDF Downloads 38439 Competence of E-Office System of Suan Sunandha Rajabhat University
Authors: Somkiat Korbuakaew, Bongkoch Puttawong
Abstract:
This research aims to study the level of e-office system competence of Suan Sunandha Rajabhat University graded by age, education background, position and work experience. Sample of this research is 291 staff at Suan Sunandha Rajabhat University. Data were collected by questionnaire. Statistics used in the research are percentage, mean and standard deviation. The result shows that the overall competence of E-office System of the university staff is at average level. When considered in each aspect, it was found that competency level for creating-forwarding-signing documents is high, while competency level for booking meeting rooms, requesting for transportation service, blackboard system, public relations and making appointment and meeting are average.Keywords: competence, e-office, education background, work experience
Procedia PDF Downloads 25638 [Keynote Talk]: Formal Specification and Description Language and Message Sequence Chart to Model and Validate Session Initiation Protocol Services
Authors: Sa’ed Abed, Mohammad H. Al Shayeji, Ovais Ahmed, Sahel Alouneh
Abstract:
Session Initiation Protocol (SIP) is a signaling layer protocol for building, adjusting and ending sessions among participants including Internet conferences, telephone calls and multimedia distribution. SIP facilitates user movement by proxying and forwarding requests to the present location of the user. In this paper, we provide a formal Specification and Description Language (SDL) and Message Sequence Chart (MSC) to model and define the Internet Engineering Task Force (IETF) SIP protocol and its sample services resulted from informal SIP specification. We create an “Abstract User Interface” using case analysis so that can be applied to identify SIP services more explicitly. The issued sample SIP features are then used as case scenarios; they are revised in MSCs format and validated to their corresponding SDL models.Keywords: modeling, MSC, SDL, SIP, validating
Procedia PDF Downloads 21037 Intra-Erythrocytic Trace Elements Profile of EMU (Dromaius novaehollandiae) Le Souef 1907
Authors: Adebayo Adewumi
Abstract:
Emu Dromaius novaehollandiae the second largest bird in the world started its domestication in the United States in the early 1980's and the present trend in the production of emu in the U.S can be compared with cattle industry. As the population of many wildlife species in Nigeria declined due to unsustainable harvest of bush meat, animals like snails, antelopes,Ostrich, Emu and rodents have been domesticated. Although this improved livestock production in Nigeria, the basic physiological parameters of these mini- livestock are not known. Especially the intra-erythrocyte trace elements of domesticated emu, For this study, emu blood was obtained from Ajanla farms, Ibadan, Oyo State, Nigeria. There, 16 emus at age of 20 months were bled through jugular vein in a semi-intensive system for a period of 12 months. The intra-erythrocyte trace elements Cu, Zn, and Mg in healthy Emu were measured. The influences of sex and age on these parameters were investigated. No age or sex differences were observed in intra-erythrocytic Cu levels. Intra-erythrocytic Zn and Mg levels were significantly higher (P<0.05) in young Emu than in adults while males used significantly (P<0.05) higher intra erythrocytic Mg than females. intra-erythrocyte trace elements Cu, Zn and Mg is a good pointer to haemoglobin concentration which determines the state of wellness of an animal. The information from this work has provided a baseline data for further understanding of erythrocyte biochemistry of Emu in Nigeria.Keywords: intra erythrocyte, trace elements, Emu, biochemistry
Procedia PDF Downloads 61036 Performance Evaluation of Routing Protocols for Video Conference over MPLS VPN Network
Authors: Abdullah Al Mamun, Tarek R. Sheltami
Abstract:
Video conferencing is a highly demanding facility now a days in order to its real time characteristics, but faster communication is the prior requirement of this technology. Multi Protocol Label Switching (MPLS) IP Virtual Private Network (VPN) address this problem and it is able to make a communication faster than others techniques. However, this paper studies the performance comparison of video traffic between two routing protocols namely the Enhanced Interior Gateway Protocol(EIGRP) and Open Shortest Path First (OSPF). The combination of traditional routing and MPLS improve the forwarding mechanism, scalability and overall network performance. We will use GNS3 and OPNET Modeler 14.5 to simulate many different scenarios and metrics such as delay, jitter and mean opinion score (MOS) value are measured. The simulation result will show that OSPF and BGP-MPLS VPN offers best performance for video conferencing application.Keywords: OSPF, BGP, EIGRP, MPLS, Video conference, Provider router, edge router, layer3 VPN
Procedia PDF Downloads 33135 On Increase and Development Prospects of Competitiveness of Georgia’s Transport-Logistical System on the Contemporary Stage
Authors: Ketevan Goletiani
Abstract:
MMultimodal transport is Europe-Asia’s rational decision of the XXI century. Success prerequisite of this form of cargo carriage is not technologic decision, but the comprehensive attitude towards it. Integration of the transport industry must refer to both technical and organizational-economic fields. Support of the multimodal’s must be the priority of the transport policy in different organizations of Europe and Asia. The method of approach to the transport as a unified system has been changed to a certain extent in the market conditions. Nowadays the competition between the different kinds of transport is not to be considered as a competition of one kind of transport towards another one, but is to be considered as a stimulator of the transport development. Basically, transport logistic, as the recent methodology and organization of the rationally flow of cargos at the specialized logistic centres during their procession provides effective rise of such flow of cargos, decreases non-operating expenses and gives the opportunity to the transport companies to come along with the time, to meet market clients’ requirements. It is apparent that the advanced transport-forwarding and logistic firms are being analized.Keywords: transport systems, multimodal transport, competition, transport logistics
Procedia PDF Downloads 43734 Optimal Production Planning in Aromatic Coconuts Supply Chain Based on Mixed-Integer Linear Programming
Authors: Chaimongkol Limpianchob
Abstract:
This work addresses the problem of production planning that arises in the production of aromatic coconuts from Samudsakhorn province in Thailand. The planning involves the forwarding of aromatic coconuts from the harvest areas to the factory, which is classified into two groups; self-owned areas and contracted areas, the decisions of aromatic coconuts flow in the plant, and addressing a question of which warehouse will be in use. The problem is formulated as a mixed-integer linear programming model within supply chain management framework. The objective function seeks to minimize the total cost including the harvesting, labor and inventory costs. Constraints on the system include the production activities in the company and demand requirements. Numerical results are presented to demonstrate the feasibility of coconuts supply chain model compared with base case.Keywords: aromatic coconut, supply chain management, production planning, mixed-integer linear programming
Procedia PDF Downloads 46033 Soft Power Building through International Education: Indonesia's KNB Scholarship Scheme
Authors: Ratih Indraswari
Abstract:
As it occupies a new status in international relations, Indonesia needs to re-organize its resources in projecting the preferred image internationally. Attractiveness becomes crucial as Indonesia needs to maintain its posture as a reliable contributor to the world. This paper tries to scrutinize the un-tap potential of ideational powers Indonesia possesses. Herein the ideational power is assumed to be translated into a soft power, intangible and rely on its influential degree to persuade and attract other countries, through its public diplomacy activities. A specific correlation will be dedicated to the effort of Indonesia public diplomacy on international education. It is believed that international education progresses mutual understanding in disseminating Indonesia values and engages public audience. As a result these exchanges and engagements support the attainment of Indonesia’s interests and forwarding Indonesia’s foreign policies. A case study on KNB (Kemitraan Negara berkembang) scholarship scheme will be provided and its impact towards building people-to-people connections.Keywords: Indonesia, international education, KNB (Kemitraan Negara Berkembang), public diplomacy
Procedia PDF Downloads 36932 An Archaeological Approach to Dating Polities and Architectural Ingenuity in Ijebu, South Western Nigeria
Authors: Olanrewaju B. Lasisi
Abstract:
The position of Ijebu-Ode, the historical capital of the Ijebu Kingdom, at the center of gravity of Ijebu land is enclosed by the 180-km-long earthwork and suggests a centrally controlled project. This paper reflects on the first stratigraphic drawing of the banks and ditches of this earthwork, and place its construction mechanism in a chronological framework. Nine radiocarbon dates obtained at the site suggest that the earthwork was built in the late 14th or early 15th century. This suggests a relationship with the Ijebu Kingdom, which pre-existed the opening of the Atlantic trade but first became visible only in the Portuguese records in the 1480s. In June 2017, more earthworks were found but within the core of Ijebu Land. This most recent finding points to an extension of territory from the center to the outlying villages. One central question about this discovery of monumental architectures that was functional around the 14th century or before is in its mode of construction. Apparently, iron tools must have been used in the construction of ‘a 20m deep ditch that runs 180km in circumference.’ Thus, the discovery of iron-working sites around the vicinity of the earthwork is a pointer to this building process that is up till now shrouded in mystery. By comparing the chronology of Ijebu earthworks with the evidence of Iron working in south western Nigeria around the first half of the first millennium AD, it can be thought that the rise in polity triggered the knowledge of metallurgy in the region.Keywords: archaeology, earthworks, Ijebu, metallurgy
Procedia PDF Downloads 24431 Equation for Predicting Inferior Vena Cava Diameter as a Potential Pointer for Heart Failure Diagnosis among Adult in Azare, Bauchi State, Nigeria
Authors: M. K. Yusuf, W. O. Hamman, U. E. Umana, S. B. Oladele
Abstract:
Background: Dilatation of the inferior vena cava (IVC) is used as the ultrasonic diagnostic feature in patients suspected of congestive heart failure. The IVC diameter has been reported to vary among the various body mass indexes (BMI) and body shape indexes (ABSI). Knowledge of these variations is useful in precision diagnoses of CHF by imaging scientists. Aim: The study aimed to establish an equation for predicting the ultrasonic mean diameter of the IVC among the various BMI/ABSI of inhabitants of Azare, Bauchi State-Nigeria. Methodology: Two hundred physically healthy adult subjects of both sexes were classified into under, normal, over, and obese weights using their BMIs after selection using a structured questionnaire following their informed consent for an abdominal ultrasound scan. The probe was placed on the midline of the body, halfway between the xiphoid process and the umbilicus, with the marker on the probe directed towards the patient's head to obtain a longitudinal view of the IVC. The maximum IVC diameter was measured from the subcostal view using the electronic caliper of the scan machine. The mean value of each group was obtained, and the results were analysed. Results: A novel equation {(IVC Diameter = 1.04 +0.01(X) where X= BMI} has been generated for determining the IVC diameter among the populace. Conclusion: An equation for predicting the IVC diameter from individual BMI values in apparently healthy subjects has been established.Keywords: equation, ultrasonic, IVC diameter, body adiposities
Procedia PDF Downloads 72