Abstract: CloudSim is a useful tool to simulate the cloud
environment. It shows the service availability, the power consumption,
and the network traffic of services on the cloud environment.
Moreover, it supports to calculate a network communication delay
through a network topology data easily. CloudSim allows inputting a
file of topology data, but it does not provide any generating process.
Thus, it needs the file of topology data generated from some other
tools. The BRITE is typical network topology generator. Also, it
supports various type of topology generating algorithms. If CloudSim
can include the BRITE, network simulation for clouds is easier than
existing version. This paper shows the potential of connection between
BRITE and CloudSim. Also, it proposes the direction to link between
them.
Abstract: To support mobility in ATM networks, a number of
technical challenges need to be resolved. The impact of handoff
schemes in terms of service disruption, handoff latency, cost
implications and excess resources required during handoffs needs to
be addressed. In this paper, a one phase handoff and route
optimization solution using reserved PVCs between adjacent ATM
switches to reroute connections during inter-switch handoff is
studied. In the second phase, a distributed optimization process is
initiated to optimally reroute handoff connections. The main
objective is to find the optimal operating point at which to perform
optimization subject to cost constraint with the purpose of reducing
blocking probability of inter-switch handoff calls for delay tolerant
traffic. We examine the relation between the required bandwidth
resources and optimization rate. Also we calculate and study the
handoff blocking probability due to lack of bandwidth for resources
reserved to facilitate the rapid rerouting.
Abstract: This paper may be considered as combination of both pervasive computing and Differential GPS (global positioning satellite) which relates to control automatic traffic signals in such a
way as to pre-empt normal signal operation and permit lifesaving vehicles. Before knowing the arrival of the lifesaving vehicles from
the signal there is a chance of clearing the traffic. Traffic signal
preemption system includes a vehicle equipped with onboard computer system capable of capturing diagnostic information and
estimated location of the lifesaving vehicle using the information provided by GPS receiver connected to the onboard computer system
and transmitting the information-s using a wireless transmitter via a
wireless network. The fleet management system connected to a
wireless receiver is capable of receiving the information transmitted
by the lifesaving vehicle .A computer is also located at the
intersection uses corrected vehicle position, speed & direction
measurements, in conjunction with previously recorded data defining
approach routes to the intersection, to determine the optimum time to
switch a traffic light controller to preemption mode so that lifesaving
vehicles can pass safely. In case when the ambulance need to take a
“U" turn in a heavy traffic area we suggest a solution. Now we are
going to make use of computerized median which uses LINKED
BLOCKS (removable) to solve the above problem.
Abstract: For controlling urban transportations, traffic lights
show similar behavior for different kinds of vehicles at intersections.
Emergency vehicles need special behavior at intersections, so traffic
lights should behave in different manner when emergency vehicles
approach them. At the present time, intelligent traffic lights control
urban transportations intelligently. In this paper the ethical aspect of
this topic is considered. A model is proposed for adding special
component to emergency vehicles and traffic lights for controlling
traffic in ethical manner. The proposed model is simulated by JADE.
Abstract: This paper address the network reliability optimization
problem in the optical access network design for the 3G cellular
systems. We presents a novel 0-1 integer programming model for
designing optical access network topologies comprised of multi-rings
with common-edge in order to guarantee always-on services. The
results show that the proposed model yields access network
topologies with the optimal reliablity and satisfies both network cost
limitations and traffic demand requirements.
Abstract: Background: Blunt aortic trauma (BAT) includes
various morphological changes that occur during deceleration,
acceleration and/or body compression in traffic accidents. The
various forms of BAT, from limited laceration of the intima to
complete transection of the aorta, depends on the force acting on the
vessel wall and the tolerance of the aorta to injury. The force depends
on the change in velocity, the dynamics of the accident and of the
seating position in the car. Tolerance to aortic injury depends on the
anatomy, histological structure and pathomorphological alterations
due to aging or disease of the aortic wall.
An overview of the literature and medical documentation reveals
that different terms are used to describe certain forms of BAT, which
can lead to misinterpretation of findings or diagnoses. We therefore,
propose a classification that would enable uniform systematic
screening of all forms of BAT. We have classified BAT into three
morphologycal types: TYPE I (intramural), TYPE II (transmural) and
TYPE III (multiple) aortic ruptures with appropriate subtypes.
Methods: All car accident casualties examined at the Institute of
Forensic Medicine from 2001 to 2009 were included in this
retrospective study. Autopsy reports were used to determine the
occurrence of each morphological type of BAT in deceased drivers,
front seat passengers and other passengers in cars and to define the
morphology of BAT in relation to the accident dynamics and the age
of the fatalities.
Results: A total of 391 fatalities in car accidents were included in
the study. TYPE I, TYPE II and TYPE III BAT were observed in
10,9%, 55,6% and 33,5%, respectively. The incidence of BAT in
drivers, front seat and other passengers was 36,7%, 43,1% and
28,6%, respectively. In frontal collisions, the incidence of BAT was
32,7%, in lateral collisions 54,2%, and in other traffic accidents
29,3%. The average age of fatalities with BAT was 42,8 years and of
those without BAT 39,1 years.
Conclusion: Identification and early recognition of the risk factors
of BAT following a traffic accident is crucial for successful treatment
of patients with BAT. Front seat passengers over 50 years of age who
have been injured in a lateral collision are the most at risk of BAT.
Abstract: This paper presents design trade-off and performance impacts of
the amount of pipeline phase of control path signals in a wormhole-switched
network-on-chip (NoC). The numbers of the pipeline phase of the control
path vary between two- and one-cycle pipeline phase. The control paths
consist of the routing request paths for output selection and the arbitration
paths for input selection. Data communications between on-chip routers are
implemented synchronously and for quality of service, the inter-router data
transports are controlled by using a link-level congestion control to avoid
lose of data because of an overflow. The trade-off between the area (logic
cell area) and the performance (bandwidth gain) of two proposed NoC router
microarchitectures are presented in this paper. The performance evaluation is
made by using a traffic scenario with different number of workloads under
2D mesh NoC topology using a static routing algorithm. By using a 130-nm
CMOS standard-cell technology, our NoC routers can be clocked at 1 GHz,
resulting in a high speed network link and high router bandwidth capacity
of about 320 Gbit/s. Based on our experiments, the amount of control path
pipeline stages gives more significant impact on the NoC performance than
the impact on the logic area of the NoC router.
Abstract: Traffic congestion has become a major problem in
many countries. One of the main causes of traffic congestion is due
to road merges. Vehicles tend to move slower when they reach the
merging point. In this paper, an enhanced algorithm for traffic
simulation based on the fluid-dynamic algorithm and kinematic wave
theory is proposed. The enhanced algorithm is used to study traffic
congestion at a road merge. This paper also describes the
development of a dynamic traffic simulation tool which is used as a
scenario planning and to forecast traffic congestion level in a certain
time based on defined parameter values. The tool incorporates the
enhanced algorithm as well as the two original algorithms. Output
from the three above mentioned algorithms are measured in terms of
traffic queue length, travel time and the total number of vehicles
passing through the merging point. This paper also suggests an
efficient way of reducing traffic congestion at a road merge by
analyzing the traffic queue length and travel time.
Abstract: Existing ground movement surveillance technologies
at airports are subjected to limitations due to shadowing effects or
multiple reflections. Therefore, there is a strong demand for a new
sensing technology, which will be cost effective and will provide
detection of non-cooperative targets under any weather conditions.
This paper aims to present a new intelligent system, developed
within the framework of the EC-funded ISMAEL project, which is
based on a new magnetic sensing technology and provides detection,
tracking and automatic classification of targets moving on the airport
surface. The system is currently being installed at two European
airports. Initial experimental results under real airport traffic
demonstrate the great potential of the proposed system.
Abstract: MultiProtocol Label Switching (MPLS) is an
emerging technology that aims to address many of the existing issues
associated with packet forwarding in today-s Internetworking
environment. It provides a method of forwarding packets at a high
rate of speed by combining the speed and performance of Layer 2
with the scalability and IP intelligence of Layer 3. In a traditional IP
(Internet Protocol) routing network, a router analyzes the destination
IP address contained in the packet header. The router independently
determines the next hop for the packet using the destination IP
address and the interior gateway protocol. This process is repeated at
each hop to deliver the packet to its final destination. In contrast, in
the MPLS forwarding paradigm routers on the edge of the network
(label edge routers) attach labels to packets based on the forwarding
Equivalence class (FEC). Packets are then forwarded through the
MPLS domain, based on their associated FECs , through swapping
the labels by routers in the core of the network called label switch
routers. The act of simply swapping the label instead of referencing
the IP header of the packet in the routing table at each hop provides
a more efficient manner of forwarding packets, which in turn allows
the opportunity for traffic to be forwarded at tremendous speeds and
to have granular control over the path taken by a packet. This paper
deals with the process of MPLS forwarding mechanism,
implementation of MPLS datapath , and test results showing the
performance comparison of MPLS and IP routing. The discussion
will focus primarily on MPLS IP packet networks – by far the
most common application of MPLS today.
Abstract: Tanzania is a developing country, which significantly lags behind the rest of the world in information communications technology (ICT), especially for the Internet. Internet connectivity to the rest of the world is via expensive satellite links, thus leaving the majority of the population unable to access the Internet due to the high cost. This paper introduces the concept of an optical WDM network for Internet infrastructure in Tanzania, so as to reduce Internet connection costs, and provide Internet access to the majority of people who live in both urban and rural areas. We also present a proposed optical WDM network, which mitigates the effects of system impairments, and provide simulation results to show that the data is successfully transmitted over a longer distance using a WDM network.
Abstract: This paper describes the design and results of FROID,
an outbound intrusion detection system built with agent technology
and supported by an attacker-centric ontology. The prototype
features a misuse-based detection mechanism that identifies remote
attack tools in execution. Misuse signatures composed of attributes
selected through entropy analysis of outgoing traffic streams and
process runtime data are derived from execution variants of attack
programs. The core of the architecture is a mesh of self-contained
detection cells organized non-hierarchically that group agents in a
functional fashion. The experiments show performance gains when
the ontology is enabled as well as an increase in accuracy achieved
when correlation cells combine detection evidence received from
independent detection cells.
Abstract: How to efficiently assign system resource to route the
Client demand by Gateway servers is a tricky predicament. In this
paper, we tender an enhanced proposal for autonomous recital of
Gateway servers under highly vibrant traffic loads. We devise a
methodology to calculate Queue Length and Waiting Time utilizing
Gateway Server information to reduce response time variance in
presence of bursty traffic.
The most widespread contemplation is performance, because
Gateway Servers must offer cost-effective and high-availability
services in the elongated period, thus they have to be scaled to meet
the expected load. Performance measurements can be the base for
performance modeling and prediction. With the help of performance
models, the performance metrics (like buffer estimation, waiting
time) can be determined at the development process.
This paper describes the possible queue models those can be
applied in the estimation of queue length to estimate the final value
of the memory size. Both simulation and experimental studies using
synthesized workloads and analysis of real-world Gateway Servers
demonstrate the effectiveness of the proposed system.
Abstract: The modern world is experiencing fundamental and dynamic changes. The transformation of international relations; the end of confrontation and successive overcoming of the Cold War consequences have expanded possible international cooperation. The global nuclear conflict threat has been minimized, while a tendency to establish a unipolar world structure with the U.S. economic and power domination is growing. The current world system of international relations, apparently is secular. However, the religious beliefs of one or another nations play a certain (sometimes a key) role, both in the domestic affairs of the individual countries and in the development of bilateral ties. Political situation in Central Asia has been characterized by new factors such as international terrorism; religious extremism and radicalism; narcotrafficking and illicit arms trade of a global character immediately threaten to peace and political stability in Central Asia. The role and influence of Islamic fundamentalism is increasing; political ethnocentrism and the associated aggravation of inter-ethnic relations, the ambiguity of national interests and objectives of major geo-political groups in the Central Asian region regarding the division the political influence, emerge. This article approaches the following issues: the role of Islam in Central Asia; destabilizing factors in Central Asia; Islamic movements in Central Asia, Western Europe and the United States; the United States, Western Europe and Central Asia: religion, politics, ideology, and the US-Central Asia antiterrorism and religious extremism cooperation.
Abstract: The provision of urban public transport in Indonesia is not free of problems. Some of the problems include: an overall lack of capacity, lack of quality and choice, severe traffic congestions and insufficient fund to renew and repair vehicles. Generally, the comfort and quality of the city bus is poor, and many of the vehicles are dilapidated and dirty. Surveys were carried out in the city of Yogyakarta, by counting city bus vehicles and occupancies, interviewing the bus passengers, drivers and institutional staffs, who involve in public transport management. This paper will then analyze the possible plan to develop the public transport system to become more attractive and to improve the public transport management. The short, medium and long term plans are analyzed, to find the best solutions. Some constraints such as social impacts and financial impact are also taken into accounts.
Abstract: This research is designed for helping a WAPbased mobile phone-s user in order to analyze of logistics in the traffic area by applying and designing the accessible processes from mobile user to server databases. The research-s design comprises Mysql 4.1.8-nt database system for being the server which there are three sub-databases, traffic light – times of intersections in periods of the day, distances on the road of area-blocks where are divided from the main sample-area and speeds of sample vehicles (motorcycle, personal car and truck) in periods of the day. For interconnections between the server and user, PHP is used to calculate distances and travelling times from the beginning point to destination, meanwhile XHTML applied for receiving, sending and displaying data from PHP to user-s mobile. In this research, the main sample-area is focused at the Huakwang-Ratchada-s area, Bangkok, Thailand where usually the congested point and 6.25 km2 surrounding area which are split into 25 blocks, 0.25 km2 for each. For simulating the results, the designed server-database and all communicating models of this research have been uploaded to www.utccengineering.com/m4tg and used the mobile phone which supports WAP 2.0 XHTML/HTML multimode browser for observing values and displayed pictures. According to simulated results, user can check the route-s pictures from the requiring point to destination along with analyzed consuming times when sample vehicles travel in various periods of the day.
Abstract: Mobile Ad hoc Network (MANET) is a wireless ad hoc self-configuring network of mobile routers (and associated hosts) connected by wireless links, the union of which forms an arbitrary topology, cause of the random mobility of the nodes. In this paper, an attempt has been made to compare these three protocols DSDV, AODV and DSR on the performance basis under different traffic protocols namely CBR and TCP in a large network. The simulation tool is NS2, the scenarios are made to see the effect of pause times. The results presented in this paper clearly indicate that the different protocols behave differently under different pause times. Also, the results show the main characteristics of different traffic protocols operating on MANETs and thus select the best protocol on each scenario.
Abstract: Many corporations are seriously concerned about
security of networks and therefore, their network supervisors are still
reluctant to install WLANs. In this regards, the IEEE802.11i standard
was developed to address the security problems, even though the
mistrust of the wireless LAN technology is still existing. The thought
was that the best security solutions could be found in open standards
based technologies that can be delivered by Virtual Private
Networking (VPN) being used for long time without addressing any
security holes for the past few years. This work, addresses this issue
and presents a simulated wireless LAN of IEEE802.11g protocol, and
analyzes impact of integrating Virtual Private Network technology to
secure the flow of traffic between the client and the server within the
LAN, using OPNET WLAN utility. Two Wireless LAN scenarios
have been introduced and simulated. These are based on normal
extension to a wired network and VPN over extension to a wired
network. The results of the two scenarios are compared and indicate
the impact of improving performance, measured by response time
and load, of Virtual Private Network over wireless LAN.
Abstract: A mobile Ad-hoc network consists of wireless nodes
communicating without the need for a centralized administration. A
user can move anytime in an ad hoc scenario and, as a result, such a
network needs to have routing protocols which can adopt
dynamically changing topology. To accomplish this, a number of ad
hoc routing protocols have been proposed and implemented, which
include DSR, OLSR and AODV. This paper presents a study on the
QoS parameters for MANET application traffics in large-scale
scenarios with 50 and 120 nodes. The application traffics analyzed in
this study is File Transfer Protocol (FTP). In large scale networks
(120 nodes) OLSR shows better performance and in smaller scale
networks (50 nodes)AODV shows less packet drop rate and OLSR
shows better throughput.
Abstract: Radio wave propagation on the road surface is a major
problem on wireless sensor network for traffic monitoring. In this
paper, we compare receiving signal strength on two scenarios 1) an
empty road and 2) a road with a vehicle. We investigate the effect of
antenna polarization and antenna height to the receiving signal
strength. The transmitting antenna is installed on the road surface.
The receiving signal is measured 360 degrees around the transmitting
antenna with the radius of 2.5 meters. Measurement results show the
receiving signal fluctuation around the transmitting antenna in both
scenarios. Receiving signal with vertical polarization antenna results
in higher signal strength than horizontal polarization antenna. The
optimum antenna elevation is 1 meter for both horizon and vertical
polarizations with the vehicle on the road. In the empty road, the
receiving signal level is unvarying with the elevation when the
elevation is greater than 1.5 meters.