22 results on '"Rajesh Kumar Chakrawarti"'
Search Results
2. Intelligent Fog Computing Surveillance System for Crime and Vulnerability Identification and Tracing.
- Author
-
Romil Rawat, Rajesh Kumar Chakrawarti, Piyush Vyas, José Luis Arias-Gonzáles, Ranjana Sikarwar, and Ramakant Bhardwaj
- Published
- 2023
- Full Text
- View/download PDF
3. Machine translation model for effective translation of Hindi poetries into English.
- Author
-
Rajesh Kumar Chakrawarti, Jayshri Bansal, and Pratosh Bansal
- Published
- 2022
- Full Text
- View/download PDF
4. Autonomous Artificial Intelligence Systems for Fraud Detection and Forensics in Dark Web Environments.
- Author
-
Romil Rawat, Olukayode A. Oki, Rajesh Kumar Chakrawarti, Temitope Samson Adekunle, Jose Manappattukunnel Lukose, and Sunday Adeola Ajagbe
- Published
- 2023
- Full Text
- View/download PDF
5. Natural Language Processing for Software Engineering
- Author
-
Rajesh Kumar Chakrawarti, Ranjana Sikarwar, Sanjaya Kumar Sarangi, Samson Arun Raj Albert Raj, Shweta Gupta, K. Sakthidasan Sankaran, Romil Rawat, Rajesh Kumar Chakrawarti, Ranjana Sikarwar, Sanjaya Kumar Sarangi, Samson Arun Raj Albert Raj, Shweta Gupta, K. Sakthidasan Sankaran, and Romil Rawat
- Abstract
Discover how Natural Language Processing for Software Engineering can transform your understanding of agile development, equipping you with essential tools and insights to enhance software quality and responsiveness in today's rapidly changing technological landscape. Agile development enhances business responsiveness through continuous software delivery, emphasizing iterative methodologies that produce incremental, usable software. Working software is the main measure of progress, and ongoing customer collaboration is essential. Approaches like Scrum, eXtreme Programming (XP), and Crystal share these principles but differ in focus: Scrum reduces documentation, XP improves software quality and adaptability to changing requirements, and Crystal emphasizes people and interactions while retaining key artifacts. Modifying software systems designed with Object-Oriented Analysis and Design can be costly and time-consuming in rapidly changing environments requiring frequent updates. This book explores how natural language processing can enhance agile methodologies, particularly in requirements engineering. It introduces tools that help developers create, organize, and update documentation throughout the agile project process.
- Published
- 2025
6. Analysis of Hindi-English Poetry Translation through Machine Translation Systems
- Author
-
Jayshri Bansal, Pratosh Bansal, and Rajesh Kumar Chakrawarti
- Published
- 2021
- Full Text
- View/download PDF
7. Conversational Artificial Intelligence
- Author
-
Romil Rawat, Rajesh Kumar Chakrawarti, Sanjaya Kumar Sarangi, Anand Rajavat, Mary Sowjanya Alamanda, Kotagiri Srividya, K. Sakthidasan Sankaran, Romil Rawat, Rajesh Kumar Chakrawarti, Sanjaya Kumar Sarangi, Anand Rajavat, Mary Sowjanya Alamanda, Kotagiri Srividya, and K. Sakthidasan Sankaran
- Subjects
- Artificial intelligence
- Abstract
This book reviews present state-of-the-art research related to the security of cloud computing including developments in conversational AI applications. It is particularly suited for those that bridge the academic world and industry, allowing readers to understand the security concerns in advanced security solutions for conversational AI in the cloud platform domain by reviewing present and evolving security solutions, their limitations, and future research directions. Conversational AI combines natural language processing (NLP) with traditional software like chatbots, voice assistants, or an interactive voice recognition system to help customers through either a spoken or typed interface. Conversational chatbots that respond to questions promptly and accurately to help customers are a fascinating development since they make the customer service industry somewhat self-sufficient. A well-automated chatbot can decimate staffing needs, but creating one is a time-consuming process. Voice recognition technologies are becoming more critical as AI assistants like Alexa become more popular. Chatbots in the corporate world have advanced technical connections with clients thanks to improvements in artificial intelligence. However, these chatbots'increased access to sensitive information has raised serious security concerns. Threats are one-time events such as malware and DDOS (Distributed Denial of Service) assaults. Targeted strikes on companies are familiar and frequently lock workers out. User privacy violations are becoming more common, emphasizing the dangers of employing chatbots. Vulnerabilities are systemic problems that enable thieves to break in. Vulnerabilities allow threats to enter the system, hence they are inextricably linked. Malicious chatbots are widely used to spam and advertise in chat rooms by imitating human behavior and discussions, or to trick individuals into disclosing personal information like bank account details.
- Published
- 2024
8. Quantum Computing in Cybersecurity
- Author
-
Romil Rawat, Rajesh Kumar Chakrawarti, Sanjaya Kumar Sarangi, Jaideep Patel, Vivek Bhardwaj, Anjali Rawat, Hitesh Rawat, Romil Rawat, Rajesh Kumar Chakrawarti, Sanjaya Kumar Sarangi, Jaideep Patel, Vivek Bhardwaj, Anjali Rawat, and Hitesh Rawat
- Subjects
- Computer security
- Abstract
Machine learning, deep learning, probabilistic neural networks, blockchain, and other new technologies all demand extremely high processing speeds. A quantum computer is an example of such a system. Quantum computers may be accessed over the internet. This technology poses a significant risk, since quantum terrorists, or cyber criminals, coul be able to cause many problems, including bringing down the internet. The principles of quantum mechanics might be used by evil doers to destroy quantum information on a global scale, and an entire class of suspicious codes could destroy data or eavesdrop on communication. Quantum physics, however, safeguards against data eavesdropping. A significant amount of money is being invested in developing and testing a quantum version of the internet that will eliminate eavesdropping and make communication nearly impenetrable to cyber-attacks. The simultaneous activation of quantum terrorists (organized crime) can lead to significant danger by attackers introducing quantum information into the network, breaking the global quantum state, and preventing the system from returning to its starting state. Without signs of identifying information and real-time communication data, such vulnerabilities are very hard to discover. Terrorists'synchronized and coordinated acts have an impact on security by sparking a cyber assault in a fraction of a second. The encryption is used by cyber-criminal groups with the genuine, nefarious, and terrible motives of killing innocent people or stealing money. In the hands of criminals and codes, cryptography is a dangerous and formidable weapon. Small amounts of digital information are hidden in a code string that translates into an image on the screen, making it impossible for the human eye to identify a coded picture from its uncoded equivalents. To steal the cryptographic key necessary to read people's credit card data or banking information, cyber thieves employ installed encryption techniques, human mistakes, keyboard loggers, and computer malware. This new volume delves into the latest cutting-edge trends and the most up-to-date processes and applications for quantum computing to bolster cybersecurity. Whether for the veteran computer engineer working in the field, other computer scientists and professionals, or for the student, this is a one-stop-shop for quantum computing in cyber security and a must have for any library.
- Published
- 2023
9. Robotic Process Automation
- Author
-
Romil Rawat, Rajesh Kumar Chakrawarti, Sanjaya Kumar Sarangi, Rahul Choudhary, Anand Singh Gadwal, Vivek Bhardwaj, Romil Rawat, Rajesh Kumar Chakrawarti, Sanjaya Kumar Sarangi, Rahul Choudhary, Anand Singh Gadwal, and Vivek Bhardwaj
- Subjects
- Automation
- Abstract
ROBOTIC PROCESS AUTOMATION Presenting the latest technologies and practices in this ever-changing field, this groundbreaking new volume covers the theoretical challenges and practical solutions for using robotics across a variety of industries, encompassing many disciplines, including mathematics, computer science, electrical engineering, information technology, mechatronics, electronics, bioengineering, and command and software engineering. Robotics is the study of creating devices that can take the place of people and mimic their behaviors. Mechanical engineering, electrical engineering, information engineering, mechatronics, electronics, bioengineering, computer engineering, control engineering, software engineering, mathematics, and other subjects are all included in robotics. Robots can be employed in a variety of scenarios and for a variety of objectives, but many are now being used in hazardous areas (such as radioactive material inspection, bomb detection, and deactivation), manufacturing operations, or in conditions where humans are unable to live (e.g. in space, underwater, in high heat, and clean up and containment of hazardous materials and radiation). Walking, lifting, speaking, cognition, and any other human activity are all attempted by robots. Many of today's robots are influenced by nature, making bio-inspired robotics a growing area. Defusing explosives, seeking survivors in unstable ruins, and investigating mines and shipwrecks are just a few of the activities that robots are designed to undertake. This groundbreaking new volume presents a Robotic Process Automation (RPA) software technique that makes it simple to create, deploy, and manage software robots that mimic human movements while dealing with digital systems and software. Software robots can interpret what's on a screen, type the correct keystrokes, traverse systems, locate and extract data, and do a wide variety of predetermined operations, much like people. Software robots can do it quicker and more reliably than humans, without having to stand up and stretch or take a coffee break.
- Published
- 2023
10. Phrase-Based Statistical Machine Translation of Hindi Poetries into English
- Author
-
Jayshri Bansal, Pratosh Bansal, and Rajesh Kumar Chakrawarti
- Subjects
Hindi ,Phrase ,Machine translation ,Computer science ,business.industry ,WordNet ,02 engineering and technology ,computer.software_genre ,Translation (geometry) ,language.human_language ,Focus (linguistics) ,030507 speech-language pathology & audiology ,03 medical and health sciences ,0202 electrical engineering, electronic engineering, information engineering ,language ,Transliteration ,020201 artificial intelligence & image processing ,Artificial intelligence ,0305 other medical science ,business ,computer ,Natural language processing ,Meaning (linguistics) - Abstract
Statistical machine translation (SMT) is a variant of machine translation where the translations are handled with statistically defined rules. Numerous researchers have attempted to build the framework which can comprehend the different dialects to translate from one source language to another target language. However, the focus on the translation of poetry is less. Reliable and rapid transliteration of the poetry is very mandatory for the execution of the computer to translate the poem from one language to another. The existing approach has several issues such as time consumption, quality of the translation process, and matching of similar words. To overcome these issues, we propose a phrase-based statistical machine translation (PSMT) with special adherence to word sense disambiguation (WSD). Quality of the translation is increased by sensing the ambiguous words with WSD. The Hindi WordNet along with the Lesk algorithm identifies the ambiguous words and senses the exact meaning before the phrase extraction. Finally, the proposed method is compared with machine translation schemes such as rule-based machine translation and transfer-based machine translation. The experimental results suggest that the proposed method performed well with the inclusion of WSD in the PSMT technique.
- Published
- 2020
- Full Text
- View/download PDF
11. Approaches for Improving Hindi to English Machine Translation System
- Author
-
Pratosh Bansal and Rajesh Kumar Chakrawarti
- Subjects
Structure (mathematical logic) ,Hindi ,Multidisciplinary ,Machine translation ,business.industry ,Computer science ,Automatic translation ,Hindi literature ,02 engineering and technology ,computer.software_genre ,Machine translation software usability ,language.human_language ,Example-based machine translation ,020204 information systems ,0202 electrical engineering, electronic engineering, information engineering ,language ,Computer-assisted translation ,020201 artificial intelligence & image processing ,Artificial intelligence ,business ,computer ,Natural language processing ,Natural language ,Spoken language - Abstract
Objectives: To provide approaches for effective Hindi-to-English Machine Translation (MT) that can be helpful in inexpensive and ease implementation of and MT systems. Methods/Statistical Analysis: Structure of the Hindi and English languages have been studied thoroughly. The possible steps towards the Natural languages have also been studied. The methods, rules, approaches, tools, resources etc. related to MT have been discussed in detail. Findings: MT is an idea for automatic translation of a language. India is the country with full of diversity in culture and languages. More than 20 regional languages are spoken along with several dialects. Hindi is a widely spoken language in all the states of country. A lot of literature, poetries and valuable texts are available in Hindi which gives opportunities to retranslate into English. However, new generation is learning English rapidly and also showing keenness to learn it in simplified lucid manner. Several efforts have been made in this direction. A large number of approaches and solutions exist for MT still there is a huge scope. The paper addresses the challenges of MT and solution efforts made in this direction. This motivates researchers to implement new Hindi-to-English Machine translation systems. Application/Improvements: Efficient, inexpensive and ease translation for available Hindi literature, poetries and other valuable texts into English. Children can easily learn the culture through the poetries and literatures hence the Machine Translation of these will bring wonderful impact.
- Published
- 2017
- Full Text
- View/download PDF
12. Couplets Translation from English to Hindi Language
- Author
-
Anshuma Yadav, Rajesh Kumar Chakrawarti, and Pratosh Bansal
- Subjects
Hindi ,Poetry ,Machine translation ,Computer science ,Text segmentation ,Translation (geometry) ,computer.software_genre ,Linguistics ,language.human_language ,Task (project management) ,Rhythm ,language ,Couplet ,computer - Abstract
We are a part of that society which has different-different cultures, languages, rituals, etc. There are some sentences which we used to say someone at particular situation or to motivate someone which we called as couplets. A couplet is a pair of consecutive lines of rhythm in poetry. Couplet usually consists of two consecutive lines that poem has the same rhythm. Couplets are balanced in length and word segmentation, in a manner that matching words in the two consecutive sentences match each other by observing certain limitation on semantic, syntactic, and lexical connection. In this research, authors have tried to translate few couplets from English to Hindi language and this kind of task comes under the umbrella of natural language processing. In continuation of the same, authors have used a statistical machine translation (SMT) approach for producing good results (of English to Hindi translation of couplets).
- Published
- 2020
- Full Text
- View/download PDF
13. A Comparative Analysis of Web Usage Mining Techniques
- Author
-
Paridhi Nigam and Rajesh Kumar Chakrawarti
- Subjects
Set (abstract data type) ,ComputingMethodologies_PATTERNRECOGNITION ,Web mining ,Computer science ,InformationSystems_DATABASEMANAGEMENT ,Table (database) ,Data mining ,computer.software_genre ,computer ,Task (project management) - Abstract
Web usage mining is the application of data mining techniques and is used to extract the important data which are present in the web. Nowadays web log mining is a very popular and computationally expensive task. Preprocessing, pattern discovery, and pattern analysis are the major task of web usage mining. In this paper we are presenting an overview of existing algorithms used in pattern discovery phase for mining the frequent item set by designing comparative analysis table i.e. Apriori, K-Apriori, FP growth which are used in pattern discovery phase. General Terms Web usage mining, Frequent item set mining.
- Published
- 2016
- Full Text
- View/download PDF
14. A Novel Approach for Web Personalization
- Author
-
Monika Dhandi and Rajesh Kumar Chakrawarti
- Subjects
Web analytics ,Web standards ,Web server ,medicine.medical_specialty ,Web development ,Web 2.0 ,Computer science ,02 engineering and technology ,computer.software_genre ,Social Semantic Web ,Personalization ,World Wide Web ,Web page ,Web design ,0202 electrical engineering, electronic engineering, information engineering ,medicine ,Mashup ,Web navigation ,Data Web ,Multimedia ,business.industry ,020207 software engineering ,Static web page ,Hyperlink ,Web application security ,Web Accessibility Initiative ,Web mining ,020201 artificial intelligence & image processing ,The Internet ,Web mapping ,Web service ,business ,Web intelligence ,computer ,Web modeling - Abstract
present word web is huge storage of information and it will keep increasing with growing of internet technologies. But the human being capability to read, access and understand content does not increase with that tread. Hence it becomes complex to website owners to present proper information to the users. This led to provide personalized web services to users. One of the well-known approaches in providing web personalization is Web Usage Mining. In this paper, our motive of web usage mining is to discover users' access patterns of web pages automatically and quickly from the huge sever access log records, such as frequently visited hyperlinks, frequently accessed web pages and users grouping. Also, we proposed a new method for discovering users' access patterns and recommend it to the user.
- Published
- 2016
- Full Text
- View/download PDF
15. Implementation of Hindi to English Idiom Translation System
- Author
-
Himani Mishra, Rajesh Kumar Chakrawarti, and Pratosh Bansal
- Subjects
Hindi ,Machine translation ,business.industry ,Computer science ,Meaning (non-linguistic) ,computer.software_genre ,Literal and figurative language ,language.human_language ,Set (abstract data type) ,Identification (information) ,TheoryofComputation_LOGICSANDMEANINGSOFPROGRAMS ,language ,Artificial intelligence ,business ,Database connection ,computer ,Word (computer architecture) ,Natural language processing - Abstract
Idiom plays a significant role in a language literature (Sinha in A system for identification of idioms in Hindi. IEEE, 2014 [1]). It enhances the glory of the language which contains it. As idiom points to a figurative meaning (Anastasiou in Idiom treatment experiments in machine translation, 2010 [2]), i.e., the meaning different from the word set present in that idiom, it becomes difficult for the machines to translate them. This paper proposes an achievable implementation way of Hindi to English idiom translation using a hybrid approach which consists of interlingual-based approach combined with the transfer-based approach. This paper also provides details on system requirements, algorithm, database connection, and result analysis.
- Published
- 2018
- Full Text
- View/download PDF
16. Classification of Satellite Images on HDFS Using Deep Neural Networks
- Author
-
Anand Rajavat, Arushi Patni, Rajesh Kumar Chakrawarti, and Kunal Chandelkar
- Subjects
Contextual image classification ,Pixel ,Artificial neural network ,Computer science ,business.industry ,Big data ,ComputingMethodologies_IMAGEPROCESSINGANDCOMPUTERVISION ,Process (computing) ,computer.software_genre ,Digital image ,ComputingMethodologies_PATTERNRECOGNITION ,Categorization ,Data mining ,Face detection ,business ,computer - Abstract
Nowadays, the artificial intelligence plays an important role in technological aspects. AI uses big data for performing its job, therefore it is necessary to store, analyze, and control the big data. AI needs to perform works like face detection and image classification. The classification process categorizes small pixels that are present inside a digital image into several different classes. Generally for classification, multispectral data were used by obtaining the spectral pattern present between image data and the numerical basis for this categorization are pixels. We propose an open-source Hadoop image classification platform. The goal of this research is to make a product that will, in future, be used to make image classification and processing tool on extensive number of images which will empower scholars and scientists to create applications.
- Published
- 2018
- Full Text
- View/download PDF
17. A comprehensive study of web usage mining
- Author
-
Monika Dhandi and Rajesh Kumar Chakrawarti
- Subjects
medicine.medical_specialty ,Information retrieval ,Web development ,Computer science ,business.industry ,Static web page ,02 engineering and technology ,Web API ,World Wide Web ,Web mining ,020204 information systems ,Web page ,0202 electrical engineering, electronic engineering, information engineering ,medicine ,020201 artificial intelligence & image processing ,business ,Web intelligence ,Web modeling ,Data Web - Abstract
Web usage mining is a task of data mining of web data that extract knowledge about web users and how these users interacting with the web site. Our motive of web usage mining is to provide web intelligence by discovering users' access patterns of web pages, such as frequently visited hyperlinks, frequently accessed web pages, popular access sequence of web pages, and users grouping etc., automatically and quickly from the huge sever access log records. Through web usage mining, we can mine the server log data, registration information of users and other relative information left by user access. This data will provide base for analysis which helps the organization to make decisions and to personalize the web pages.
- Published
- 2016
- Full Text
- View/download PDF
18. Implementation of PDS system with improved security and transparency under cloud environment
- Author
-
Rajesh Kumar Chakrawarti and Shivangi Sengar
- Subjects
Information privacy ,Cloud computing security ,Database ,business.industry ,Computer science ,Data security ,Access control ,02 engineering and technology ,Information security ,Computer security model ,Computer security ,computer.software_genre ,Data access ,020204 information systems ,0202 electrical engineering, electronic engineering, information engineering ,Role-based access control ,020201 artificial intelligence & image processing ,business ,computer - Abstract
In large databases where continuous increase in the volume and detail of data captured by organizations [1] and accessed by different users and at different access levels, need to incorporate the security and transparency during the different kinds of information extraction according to role based access levels. Therefore in this paper an efficient data model for improving the privacy as well as transparency of a data model is proposed. The proposed data model is implemented on the different access levels and a cryptographic security is implemented during data access. Additionally a case study on the governmental organization for distribution of food and fertilizers are reported. The implementation of the proposed security and access control model is provided using JAVA technology. After implementation the performance of the system is evaluated and their performance is reported. The results show the model is efficient and able to prevent the data access for unauthorized access.
- Published
- 2016
- Full Text
- View/download PDF
19. A uniform approach for multilevel email security using image authentication, compression, OTP & cryptography
- Author
-
Apeksha Nemavarkar and Rajesh Kumar Chakrawarti
- Subjects
business.industry ,Computer science ,HTML email ,Internet privacy ,Email authentication ,Cryptography ,Computer security ,computer.software_genre ,Asset (computer security) ,Phishing ,Electronic mail ,Email encryption ,Key (cryptography) ,business ,computer - Abstract
Online email chronicles are an under-ensured yet greatly delicate data asset. Email documents can store year of individual and business email in a simple to-get to structure, one that is much less demanding to trade off than messages being transmitted on the wire. Most email files, be that as it may, are secured by reusable passwords that are frequently frail and can be effortlessly bargained. To secure such files, we propose novel multilevel email security building design. The proposed structural planning deals with three levels of security which are picture confirmation through example matching, pressure & cryptography in light of characteristic. At the starting levels our methodology is by all accounts at more elevated amount that the current ones. It is extraordinary that moderate mediums that course messages in the middle of sender and beneficiaries can be a genuine risk to security as these halfway can be effortlessly catch and messed with email messages numerous programming based arrangements has been proposed to tackle these issue, for example, it were created however these arrangements were sufficiently bad to give security and different assaults can meant to it and they can misuse the vulnerabilities of these administration [2]. It is vital to forestall such phishing assaults. One of the approaches to keep the watchword burglary is to abstain from utilizing passwords and to confirm a client without a content secret key. This work proposes a safe confirmation administration construction modelling ISA-CC (Image Sequence Authentication-Compression & Cryptography) that is picture based and wipes out the requirement for content passwords. [1]
- Published
- 2015
- Full Text
- View/download PDF
20. The architechtural framework for public cloud security
- Author
-
Rajesh Kumar Chakrawarti and Kajal Singhai
- Subjects
Authentication ,Cloud computing security ,business.industry ,Computer science ,Data_MISCELLANEOUS ,Client-side encryption ,Access control ,Cloud computing ,Encryption ,Computer security ,computer.software_genre ,Cloud testing ,Server ,Virtual firewall ,business ,computer ,Computer network - Abstract
In cloud computing, at storage level, security provided to cloud by access control and data encryption key, and at network level installing virtual firewall and cloud service provider provides its internal storage for storing client's data using ips/ids to protect against attacks. Storing data in encrypted format is a common method of data privacy protection which causes a risk for the unauthorized disclosure of the user data. In this paper, discuss the introduction of cloud computing, framework for public cloud security, cloud service providers, authentication mechanism and attributes. There all different mechanism is explained for providing privacy in public cloud services on basis of the desired and proposed architecture.
- Published
- 2014
- Full Text
- View/download PDF
21. Impact of IEEE 802.11e EDCA on AODV Routing Protocol in Mobile Ad-hoc Networks
- Author
-
Madhulika and Rajesh Kumar Chakrawarti
- Subjects
Routing protocol ,Dynamic Source Routing ,Optimized Link State Routing Protocol ,Adaptive quality of service multi-hop routing ,Link-state routing protocol ,Computer science ,business.industry ,ComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS ,Wireless Routing Protocol ,Destination-Sequenced Distance Vector routing ,Ad hoc wireless distribution service ,business ,Computer network - Abstract
With Easy and fast deployment of Mobile Ad-hoc Networks (MANETs), the capability of MANET to support real time services with constricted quality of service requirements has come ahead. The IEEE 802.11e Enhanced Distributed Channel Access (EDCA) mechanism concede prioritized medium access for applications with high QoS requirements by assigning different priorities to its four access categories. In this paper we expose results relative to the interaction of AODV routing protocol for MANETs and the IEEE 802.11e EDCA mechanism. The performance is evaluated under real time audio traffic through simulation using OPNET modeler 14.0. The performance of protocol is measured in terms of various quality of service measures including hops per route, route discovery time, delay and throughput are calculated and graphs has been plotted. Simulation results show that very substantial improvements in terms of AODV performance parameters and minimum delay are achieved due to increased routing responsiveness.
- Published
- 2012
- Full Text
- View/download PDF
22. Simulation-based Performance Evaluation of Queuing Mechanisms for AODV Routing Protocol in Manet
- Author
-
Madhulika and Rajesh Kumar Chakrawarti
- Subjects
business.industry ,Computer science ,Quality of service ,Distributed computing ,ComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS ,Fair queuing ,Mobile ad hoc network ,Scheduling (computing) ,Differentiated services ,Queuing delay ,Class-based queueing ,Maximum throughput scheduling ,business ,Computer network - Abstract
There has been a significant growth in the use of mobile ad hoc network to support network applications. Real time applications are more exposed to delays and as such proper queuing and traffic management at the packet level must be considered to provide the required quality of service to the end user. Queuing mechanisms have been a subject of demanding discussion and research in the network field for scheduling packets from different traffic flows for processing at a network node (Gateway). Various queue scheduling mechanisms have been designed to improve the quality of service for networked multimedia applications. In this paper, we estimate the performance of four queuing mechanisms (FIFO, PQ, DWRR and MDRR) that are widely deployed for differentiated services using a hypothetical network topology. In this paper we carry out simulation using OPNET and compare their relative performance based on AODV routing protocol. The performance metrics used are throughput and queuing delay.
- Published
- 2012
- Full Text
- View/download PDF
Catalog
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.