SlideShare una empresa de Scribd logo
1 de 9
Descargar para leer sin conexión
International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print),
INTERNATIONAL JOURNAL OF COMPUTER ENGINEERING &
ISSN 0976 - 6375(Online), Volume 5, Issue 2, February (2014), pp. 108-116 © IAEME

TECHNOLOGY (IJCET)

ISSN 0976 – 6367(Print)
ISSN 0976 – 6375(Online)
Volume 5, Issue 2, February (2014), pp. 108-116
© IAEME: www.iaeme.com/ijcet.asp
Journal Impact Factor (2014): 4.4012 (Calculated by GISI)
www.jifactor.com

IJCET
©IAEME

MODELING OF DSDV ROUTING PROTOCOL FOR AD HOC NETWORKS
USING EVENT-B
Arun Kumar Singh1,

Vinod Kumar singh2

1

2

Electronics Engineering Department, IET, UPTU, Lucknow, India
Professor, Electronics Engineering Department, IET, UPTU, Lucknow, India

ABSTRACT
Ad hoc networks are dynamic networks of mobile nodes with wireless network interfaces
forming an instant network without fixed topology. Destination-sequenced distance vector (DSDV)
is a proactive routing protocol, which continuously maintains the topological information and
whenever communication is needed such route information is available immediately. DSDV is a
modification of the conventional Bellman-Ford routing algorithm to make it suitable for ad hoc
networks. For any routing algorithm route discovery is an important task. In Ad hoc networks,
broadcasting is the basic mechanism by which route discovery and propagation of routing is done.
Therefore, routing algorithms must be robust and free from erratic behaviors. Hence formal
specifications are needed to ensure correctness of routing protocols that are used Ad hoc networks.
Formal methods are mathematical techniques which are used to develop software model.
Event-B is formal technique that enables user to express the problem at abstract level and then add
more details in refinement step to obtain concrete specification. The Event-B model generates proof
obligations. For ensuring correctness of the system we need to discharge all proof obligations. With
this backdrop, the paper focuses on formalizing protocols for routing in Ad hoc networks by using
destination-sequenced distance vector routing. The model ensures bi-directional links and loop free
routes in routing packets.
Keywords: Formal Methods, Formal Specification, Event-B, DSDV, Ad hoc Networks.
1. INTRODUCTION
Ad hoc networks differ significantly from conventional networks in the dynamic topology of
interconnections and automatic administration for setting up the network. The topology of the Ad
hoc can be arbitrary at any time. With the change of the topology of an Ad hoc network, the nodes
in the network have to update their routing information automatically and instantly [1].
108
International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print),
ISSN 0976 - 6375(Online), Volume 5, Issue 2, February (2014), pp. 108-116 © IAEME

Traditionally, the network routing protocols could be divided into proactive protocols and
reactive protocols. Proactive protocols continuously learn the topology of the network by exchanging
topological information among the network nodes. Thus, when there is a need for a route to a
destination, such route information is available immediately. One of the early protocols that have
been proposed for routing in ad hoc networks is proactive Distance Vector protocols based on the
Distributed Bellman-Ford (DBF) algorithm [2].Destination sequenced distance vector routing
(DSDV) is adapted from the conventional Routing Information Protocol (RIP) to ad hoc networks
routing. It adds a new attribute, sequence number, to each route table entry of the conventional RIP.
Using the newly added sequence number, the mobile nodes can distinguish stale route information
from the new and thus prevent the formation of routing loops.[1]
Numerous formal methods have been applied to the analysis of network protocols. It includes
model checking [3, 4], theorem proving [5], and development by refinement [6, 7]. With reference to
routing protocols, probably the most detailed study [8], has applied an interactive theorem prover
(HOL) together with a model checker (SPIN) to verify different properties of distance vector routing
protocols. In the study [8], case studies have been carried out to analyze the Routing Information
Protocol (RIP) standard and the Ad-Hoc On-Demand Distance Vector (AODV) protocol. The work
regarding formal modeling of topology discovery in changing environment can be found in [13]. In
this case study we have developed the formal model of Destination Sequenced Distance Vector
routing protocol using Event-B.
The rest of the paper is organized as follows: Section 2 presents our modeling approach and
the introduction to Event-B, Section 3 discusses the formal model of DSDV in Event-B and the last
section 4 concludes the paper.
2. FORMAL MODELING USING EVENT-B
A development in Event-B [9] is a set of formal models. A model contains the complete
mathematical development of a Discrete Transition System. Event-B has a semantics based on
transition systems and simulation between such systems, described in [10]. Event-B models are
organized in terms of the two basic constructs: contexts and machines. Contexts specify the static
part of a model whereas machines specify the dynamic part. Within the Event B framework,
asynchronous systems may be developed and structured using abstract systems [10]. Abstraction can
be viewed as a process of simplifying our understanding of a system, by identifying the key features
of the system to be modeled, by focusing on intended purpose of the system and ignoring details of
how that purpose is achieved.
Event-B supports refinement to augment the functionality being modeled, or introducing
details about the dynamic properties of a model. In refinement steps we refine one model M1 to
another model M2, model M2 to model M3 and so on, till the desired functionality is achieved. The
states of the abstract machine are related to the states of the concrete machine by gluing invariants J
(v, w), where v and w are the variables of the abstract machine and concrete machine respectively.
With abstraction, we can postpone treatment of some system features to later refinement steps.
Event-B provides a notion of consistency of a refinement by generating the proof obligations and
providing an environment to discharging the proof obligations while failing proof can help us to
identify inconsistencies in a refinement step. Refinement and abstraction allow us to manage the
complex system in the design process by first describing the abstract problem, introducing solutions
or details in refinement steps to obtain more concrete specifications and verifying that proposed
solutions are valid.

109
International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print),
ISSN 0976 - 6375(Online), Volume 5, Issue 2, February (2014), pp. 108-116 © IAEME

2.1 MACHINES AND CONTEXTS
Machines specify behavioral properties of Event-B models. It may contain variables,
invariants, theorems, events and variants of a model. Variables v defines the state of a machine. They
are constrained by invariants I (v). Possible state changes are described by events while Contexts
may contain carrier sets, constants, axioms, and theorems. Carrier sets are similar to types [9].
Axioms constrain carrier sets and constants, whereas theorems express properties derivable from
axioms.
Machines and contexts have various relationships: a machine can be “refined” by another
one, and a context can be “extended” by another one (no cycles are allowed in both these
relationships). Moreover, a machine can “see” one or several contexts [10].
A model can only contain contexts, or only machines, or both. In the first case, the model
represents a pure mathematical structure. In the third case, the machines of the model are
parameterized by the contexts. Finally, the second case represents a machine which is not
parameterized.
Machines contain the variables, invariants, theorems, and events of a model, whereas
contexts contain carrier sets, constants, axioms, and theorems of a model:
Machines and contexts have various relationships: a machine can be “refined” by another one, and a
context can be “extended” by another one (no cycles are allowed in both these relationships).
Moreover, a machine can “see” one or several contexts.
A model can only contain contexts, or only machines, or both. In the first case, the model
represents a pure mathematical structure. In the third case, the machines of the model are
parameterized by the contexts. Finally, the second case represents a machine which is not
parameterized.
2.2 EVENTS
A machine event represents a transition. Each event is made of guard G (v) and action S (v).
The guards together denote the necessary condition for the event to be enabled, whereas the actions
together represent the way the variables of the corresponding machine are modified. An event can be
represented by the term -when G (v) then S (v) end.
Events can have no guards, they can be also simple and guarded (keyword where) or
parameterized and guarded (keywords any and where). When an event lies in a machine which
refines another one then the event may specify (if any) the abstract event(s) it refines (keyword
refines). When a refining event refines an abstract event which is parameterized, one may provide
some witnesses (keyword with). The status of the event can be normal, convergent or anticipated. A
“convergent” event must be a new event in a refined machine (one that does not appear in the
abstraction). All convergent events in a machine are concerned with the variant section of that
machine. An “anticipated” event is a new event which is not “convergent” yet but should become
“convergent” in a subsequent refinement.
A machine event represents a transition. It is essentially made of guards and actions. The
guards together denote the necessary condition for the event to be enabled, whereas the actions
together represent the way the variables of the corresponding machine are modified. Events can have
no guards, they can be also simple and guarded (keyword where) or parameterized and guarded
(keywords any and where). When an event lies in a machine which refines another one then the event
may specify (if any) the abstract event(s) it refines (keyword refines). When a refining event refines
an abstract event which is parameterized, one may provide some witnesses (keyword with).

110
International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print),
ISSN 0976 - 6375(Online), Volume 5, Issue 2, February (2014), pp. 108-116 © IAEME

3. FORMAL DEVELOPMENT OF DSDV USING EVENT- B
3.1 INFORMAL DESCRIPTION OF DSDV PROTOCOL
Destination Sequenced Distance Vector is proactive routing protocol having new attribute of
sequence number to make it more suitable for Ad hoc networks. The DSDV routing protocol [11]
provides a single path to a destination, which is selected using the distance vector shortest path
routing algorithm. The routing table gives the best distance to each destination and which route to get
there by periodic updating of information with all its neighbors.
Routing denotes the selection of paths through a network for sending data from a source to a
destination. A path may require the data message to travel over multiple nodes, each node being an
intermediate router. In routing protocols each host works as a router and constructs a graph
representing the network topology. In this graph, vertices and edges represent routing nodes and
direct connection between nodes, respectively. To specify the correct desired properties of protocol
at abstract level and in carrying out the development and proofs in subsequent refinement models, is
a challenging problem [12, 13, 14].
The next section 3.2 describes the formal development of Distance vector protocol.
3.2 FORMAL DEVELOPMENT
In this paper, we have presented the formal development of Destination Sequenced Distance
Vector routing protocol using Event B. The abstract model (Fig.1) specifies the environmental
assumptions and system requirements for basic communication
Machine RoutingM

Sees RoutingC

Variables sent, got, lost, A Links
Invariants
inv1:

sent ⊆ MSG

inv2: got ⊆ MSG

inv3:

lost ⊆ MSG

inv4: ALinks∈(NODE↔NODE)

inv5:

got ∪ lost ⊆ sent

inv6: got ∩ lost = ∅
Fig 1: Abstract Machine

protocol [12] of data packet sending, losing and receiving as well as changes in network topology by
using events: ADD_LINK, DEL_LINK, SEND, RECEIVE and LOSING. In the context of machine
NODE and MSG are defined as a carrier set which represent the set of nodes and the messages
respectively. For the given network it is assumed that there are only finite numbers of directed nodes.
The variables sent, got and lost are defined as a subset of MSG (Fig.1). The variable ALinks which is
defined as: ALinks ∈ NODE↔NODE represents the set of active links.

111
International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print),
ISSN 0976 - 6375(Online), Volume 5, Issue 2, February (2014), pp. 108-116 © IAEME

Variables:
sent,got,lost,ALinks,Chstore,dseq,nexthop,dseqm,nexthopm,nodemetric,neighbour,
nodemetricm,intmednode
Invariants :
inv1 :
inv2 :
inv3 :
inv4 :
inv5 :
inv6 :
inv7 :
inv8 :
inv9 :
inv10 :
inv11 :
inv12 :
inv13 :
inv14 :

chstore∈ NODE ↔MSG
∀i·i ∈ NODE ∧ i ∈ dom(chstore)⇒(got ∪ lost) ∩ chstore[{i}] = ∅
ran(chstore) ∪ (got ∪ lost) = sent
∀i·i ∈ NODE ⇒chstore[{i}] ⊆ sent
∀m·m ∈ MSG ∧m ∉ sent⇒(m ∉ got ∧m ∉ lost ∧ (∀i·i ∈ NODE ⇒i↦m ∉
chstore))
∀m, i, j·i↦ m ∈ chstore ∧ j↦ m ∈ chstore⇒i = j
dseq ∈ NODE→(NODE→ℕ)
nexthop ∈ NODE→(NODE→NODE)
dseqm ∈ MSG→(NODE→ℕ)
nexthopm ∈ MSG→(NODE→NODE)
nodemetric ∈ NODE→(NODE→ℕ)
neighbour∈NODE↔NODE
nodemetricm ∈MSG→(NODE→ℕ)
intmednode⊆ NODE

Initialisation :
act1:
sent≔∅
act2:
got≔∅
act3:
lost≔∅
act4:
ALinks≔∅
act5:
chstore≔∅
act6:
dseq≔NODE×{NODE×{dsq}}
act7:
nexthop≔NODE×{NODE×{n0}}
act8:
dseqm≔MSG×{NODE×{0}}
act9:
nexthopm≔MSG×{NODE×{n0}}
act10:
nodemetric≔linkvalue0
act11:
neighbour≔neighbour0
act12:
nodemetricm≔MSG×{NODE×{0}}
act13:
intmednode ≔∅

Fig 2. Variables, Invarients and Initialisation of DSDV machine
For DSDV machine, the variables, invariants and there initialization is given in Fig2 which
also includes variables of basic communication protocol [12, 15]. Every site maintain the
information about sequence number of destination site. The variable dseq represents sequence
number of destination site. It is represented as dseq ∈ NODE→ (NODE→ℕ). A mapping
{sm({tmn1}) } ∈ dseq indicates that routing table of site s has entry that n1 is the sequence number of
destination site t. The variable nexthop give the information about next hop entry of a node to reach a
destination. A mapping {n1m({n2mn3}) } ∈ nexthop represents that to reach a destination node n2,
n3 is nexthop for the node n1.The variable nodemetric contains the information about the total hop
count from a particular node. The site sends the routing information through the messages. Any site
updates its routing information after receiving the message. The variable dseqm contain the sequence
number of nodes. It maps each message to sequence number function. The sequence number function
maps each node to natural number. The length of sequence number function is number of nodes
112
International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print),
ISSN 0976 - 6375(Online), Volume 5, Issue 2, February (2014), pp. 108-116 © IAEME

present in the system. Therefore, dseqm(m) contains sequence number of each node. Similarly,
variable nexthopm contains nexthop entry of a destination node in a message. A mapping
{m1m({n1mn2}) } ∈ nexthopm indicates that message m1 has the information that for the destination
node n1, node n2 is next hop .The hope count information in a broadcast message is maintained by
nodemetricm. The neighbour of a node is represented through the variable neighbour. It is
represented as: neighbour∈NODE↔NODE. Any node has several neighbour node therefore it is
declared as relation.
Refines Send
Send
Any s,t, datamsg Where
grd1 : s∈NODE
grd3 : s≠t
grd5 : datamsg ∉ sent
grd7 : target(datamsg) = t
Then
act1 : sent ≔ sent ∪ {datamsg}
act3 : dseqm(datamsg)≔dseq(s)
End

grd2 :
grd4 :
grd6 :
grd8 :

t∈NODE
datamsg ∈ MSG
source(datamsg) = s
s↦datamsg ∉chstore

act2 :
act4 :

chstore ≔ chstore ∪ {s↦ datamsg}
nodemetricm(datamsg)≔nodemetric(s)

Fig 3. Send Event
Send Event:
This event models the sending of messages from one node to other node. The message datamsg has
not been sent is insured through guard grd5. The site s and site t is source and destination site is
specified through guard grd6 and guard grd7 respectively. The guard grd8 is written as:
s↦datamsg ∉ chstore It ensures that message datamsg is not present in the channel. The message
contains all the routing information of sending node. The action act1 add the datamsg message in the
sent variable. The action act2 add the message datamsg in to the channel. The action act3 assigns the
sequence number to message datamsg. The sequence number of sender site s is assigned to message
datamsg. The action act4 asigns the nodemetric value to message datamsg.
Forward
Any datamsg, x, y, t Where
grd1 :
t∈NODE
grd3 :

x↦ y ∈ ALinks

grd5 :

target(datamsg) = t

grd7 :
Then
act1 :

grd2
:
grd4
:
grd6
:
grd8 :

x↦ datamsg ∈ chstore
chstore ≔ (chstore ∖
{x↦datamsg})∪ {y↦datamsg}

act2 :

datamsg ∈ sent ∖ (got ∪ lost)
y∈neighbour[{x}]
x ≠ target(datamsg)
y↦datamsg ∉chstore
intmednode≔{x}

End
Fig 4: Forward Event
Forward Event:
This event forward the routing update messages from one node to other node. The message
datamsg has been sent but not received and lost is ensured through guard grd2. The guard grd3
ensures that node x and y are connected. The guard grd4 ensures that y is a neighbour of node x. The
113
International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print),
ISSN 0976 - 6375(Online), Volume 5, Issue 2, February (2014), pp. 108-116 © IAEME

target of message datamsg is t is ensured through guard grd5. The guard grd6 specifies that x is not
target of message datamsg. The guard grd7 specifies that update message datamsg is currently
located at site x. The guard grd8 specifies that message datamsg is not present at site y. The action
act1 indicates passing of message datamsg from node x to node y. The action act2 maintains the
information about sender of message datamsg.
Initiate_Routing_Table
Any n, tempnodemetric, n2,nr,v,
tempnodemetric1

Where

grd1:

tempnodemetric1∈ NODE→(NODE grd2:
→ℕ )

tempnodemetric∈ NODE→(NODE
→ℕ )

grd3:

n∈NODE

grd4:

nr∈neighbour[{n}]

grd5:

n2∈NODE

grd6:

n2≠n

grd7:

n2≠nr

grd8:

v=linkvalue0(n)(nr)

grd9:

tempnodemetric(n)=nodemetric(n)+ grd10
:
{n↦0}

tempnodemetric1(n)=tempnodemet
ric(n)+{nr↦v}

Then
act1:

nodemetric(n)≔tempnodemetric1(n)+{n2↦infinite}

End
Fig5: Initiate Routing Table Event
Initiate Routing Table Event:
Every node maintains entry of metric count value. This value gives total distance to
destination node from a given node. This event assigns the matric value for a particular node. This
event assigns a value to the node matric of node n for neighbour node nr. The value represents
distance to the neighbour node. It also assigns infinite value for those node n2 which are not in
neighbour of node n. The guard grd4 specifies that node nr is neighbour of node n. The node n2 is a
node which is not neighbour of node n is specified through guard grd7. The value v indicate the link
value between node n and neighbour nr. The grd guard9 specifies that nodematric value from node n
to itself is zero. The guard grd10 specifies that distance of neighbour node is v. The action act1
assigns infinite value to those node which are not in neighbour.
Initiate_Routing_Table2
Any tempnexthop, nr, n

Where

grd1:

tempnexthop∈ NODE→(NODE→NODE)

grd3:

grd2: nr∈neighbour[{n}]

tempnexthop(n)=nexthop(n)+{n↦n}

Then
act1:

nexthop≔nexthop+(λdest•dest∈NODE∧ dest≠n ∧
nr↦dest∈path(ALinks)∣tempnexthop(n)+{dest↦nr})

End
Fig6: Initiate RoutingTable2 Event
114
International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print),
ISSN 0976 - 6375(Online), Volume 5, Issue 2, February (2014), pp. 108-116 © IAEME

Initiate_Routing_Table2:
This event makes the next hop entry for each destination node. The guard grd2 ensures that node nr
is neighbour of node n. The guard grd3 specifies that nexthop entry of a node n for the destination
node n will be same i.e., node n. The action act1 is wriiten as:
nexthop≔nexthop+(λdest·dest∈NODE∧ dest≠n ∧ nr↦dest∈path(ALinks)∣tempnexthop(n)+{dest↦nr
})
It represents that for every node dest, if there is a path from neighbour node nr then nr will be next
hop of the node n for the destination node dest.
Routing_Table_Update
Where
grd1 :

v∈ℕ

grd2 :

p∈NODE

grd3 :

y∈NODE

grd4 :

intmednode={y}

grd5 :

s∈NODE

grd6 :

source(datamsg)= s

grd7 :

x ↦ y∈ALinks

grd8 :

x ≠ source(datamsg)

grd9 :

x↦ datamsg ∈ chstore

grd10 :

p∈dom(dseqm(datamsg)

grd11 :

∃k·(k∈NODE⇒dseq(x)(k)< dseqm(datamsg)(k))

grd12 :

dseq(x)(p)< dseqm(datamsg)(p)

grd13 :

v=(nodemetric(x)(y)+nodemetricm(datamsg)(p))

Then
act1 :

dseq(x)≔dseq(x)+({k∣k∈NODE∧ dseq(x)(k)<
dseqm(datamsg)(k)} dseqm(datamsg))

act3:

act2: nexthop(x)≔nexthop(x)+{p↦y}

nodemetric(x)≔nodemetric(x)+{p↦v}

◁

End

Fig7: Routing_Table_Update Event

4. CONCLUSION
This paper presents formal modeling of Destination Sequenced Distance Vector routing
protocol. We have used Event-B as a formal method for writing specifications. Event-B generates
proof obligations which need to be discharged for ensuring correctness of the system. Rodin
platform has been used for discharging proof obligations. Total, sixty five (65) proof obligations
have been generated by the system through consistency checking. Out of 65, sixty two (62)
obligations have been discharged automatically, while remaining three (03) requires interaction
with the prover. The model presented in the current paper provides a valuable insight in protocol
implementation which may be further applied to other routing protocols for ad hoc networks.
ACKNOWLEDGEMENTS
The authors acknowledge the valuable suggestions of Er. Raghuraj Suryavanshi and Prof.
Girish Chandra, Department of Computer Science and Engineering, IET, UPTU, Lucknow.
115
International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print),
ISSN 0976 - 6375(Online), Volume 5, Issue 2, February (2014), pp. 108-116 © IAEME

REFERENCES
1.
2.
3.
4.
5.

6.
7.

8.
9.
10.
11.

12.

13.

14.
15.

Guoyou He: Destination-Sequenced Distance Vector (DSDV) protocol. Technical report,
Helsinki University of Technology, Finland.
Tanenbaum Andrew S.: Computer Networks, Prentice Hall, Inc., 1996, ISBN 7-302-02410-3.
Christel Baier and Joost-Pieter Katoen: Principles of Model Checking. The MIT Press, 2008.
Gerhard J. Holzmann: The Spin Model Checker: Primer and Reference Manual. Addison–
Wesley, 2003.
Marco Devillers, David Griffioen, Judi Romijn, and Frits Vaandrager: Verification of a leader
election protocol: Formal methods applied to ieee 1394. Form. Methods Syst. Des.,
16(3):307–320, 2000.
Abrial, J.R., J.R., Cansell, D.,M´ery, D.:A Mechanically Proved and Incremental Development
of IEEE 1394 Tree Identify Protocol. Formal Asp. Comput. 14(3), 215–227, 2003.
A Udaya Shankar and Simon S Lam: A stepwise refinement heuristic for protocol
construction.ACM Transactions on Programming Languages and Systems, 14(3):417–461,
1992.
Karthikeyan Bhargavan, Davor Obradovic, and Carl A. Gunter: Formal verification of
standards for distance vector routing protocols. J. ACM, 49(4):538–576, 2002.
Abrial, J.R.:Modeling in Event-B: System and Software Design. Cambridge University Press,
2010.
Abrial, J.R.: Extending B without Changing it (for developing distributed systems). Proc. of
the 1st Conf. on the B method, H. Habrias (editor), France, pages 169–190, 1996.
Perkins Charles E., Bhagwat Pravin: Highly Dynamic Destination-Sequenced Distance-Vector
Routing (DSDV) for Mobile Computers, London England UK, ACM SIGCOMM’94, 1994,
pp. 234–244.
Dominique M´ery and Neeraj Kumar Singh:Analysis of DSR Protocol in Event-B 13th
International Symposium on Stabilization, Safety, and Security of Distributed Systems (2011)
401-415.
Hoang, T.S., Kuruma, H., Basin, D.A., Abrial, J.R.: Developing Topology Discovery
in Event-B. In: Leuschel, M., Wehrheim, H. (eds.) IFM 2009. LNCS, vol. 5423,
pp. 1–19.Springer, Heidelberg (2009)
Butler, M.: Incremental Design of Distributed Systems with Event-B, Marktoberdorf Summer
School 2008 Lecture Notes (2008), http://eprints.ecs.soton.ac.uk/16910
Singh, A.K and Singh, V.K.: Formal Modeling of Distance Vector Routing Protocol using
Event-B in Advance in Electronic and Electric Engineering ISSN 2231-1297, Volume 3,
Number 1 (2013), pp. 91-98.

116

Más contenido relacionado

La actualidad más candente

IRJET- Facial Gesture Recognition using Surface EMG and Multiclass Support Ve...
IRJET- Facial Gesture Recognition using Surface EMG and Multiclass Support Ve...IRJET- Facial Gesture Recognition using Surface EMG and Multiclass Support Ve...
IRJET- Facial Gesture Recognition using Surface EMG and Multiclass Support Ve...IRJET Journal
 
Deep segmentation of the liver and the hepatic tumors from abdomen tomography...
Deep segmentation of the liver and the hepatic tumors from abdomen tomography...Deep segmentation of the liver and the hepatic tumors from abdomen tomography...
Deep segmentation of the liver and the hepatic tumors from abdomen tomography...IJECEIAES
 
A Comparison Of Smart Routings In Mobile Ad Hoc Networks(MANETs)
A Comparison Of Smart Routings In Mobile Ad Hoc  Networks(MANETs) A Comparison Of Smart Routings In Mobile Ad Hoc  Networks(MANETs)
A Comparison Of Smart Routings In Mobile Ad Hoc Networks(MANETs) IJMER
 
Optimal neural network models for wind speed prediction
Optimal neural network models for wind speed predictionOptimal neural network models for wind speed prediction
Optimal neural network models for wind speed predictionIAEME Publication
 
A novel scheme for reliable multipath routing
A novel scheme for reliable multipath routingA novel scheme for reliable multipath routing
A novel scheme for reliable multipath routingeSAT Publishing House
 
A novel scheme for reliable multipath routing through node independent direct...
A novel scheme for reliable multipath routing through node independent direct...A novel scheme for reliable multipath routing through node independent direct...
A novel scheme for reliable multipath routing through node independent direct...eSAT Journals
 
A Performance Analysis of CLMS and Augmented CLMS Algorithms for Smart Antennas
A Performance Analysis of CLMS and Augmented CLMS Algorithms for Smart Antennas A Performance Analysis of CLMS and Augmented CLMS Algorithms for Smart Antennas
A Performance Analysis of CLMS and Augmented CLMS Algorithms for Smart Antennas cscpconf
 
A Weighted Duality based Formulation of MIMO Systems
A Weighted Duality based Formulation of MIMO SystemsA Weighted Duality based Formulation of MIMO Systems
A Weighted Duality based Formulation of MIMO SystemsIJERA Editor
 
1.meena tushir finalpaper-1-12
1.meena tushir finalpaper-1-121.meena tushir finalpaper-1-12
1.meena tushir finalpaper-1-12Alexander Decker
 
DSR Routing Decisions for Mobile Ad Hoc Networks using Fuzzy Inference System
DSR Routing Decisions for Mobile Ad Hoc Networks using Fuzzy Inference SystemDSR Routing Decisions for Mobile Ad Hoc Networks using Fuzzy Inference System
DSR Routing Decisions for Mobile Ad Hoc Networks using Fuzzy Inference Systemcscpconf
 
Identification of isomorphism and detection of distinct mechanism of kinemati...
Identification of isomorphism and detection of distinct mechanism of kinemati...Identification of isomorphism and detection of distinct mechanism of kinemati...
Identification of isomorphism and detection of distinct mechanism of kinemati...eSAT Journals
 
Identification of isomorphism and detection of distinct mechanism of kinemati...
Identification of isomorphism and detection of distinct mechanism of kinemati...Identification of isomorphism and detection of distinct mechanism of kinemati...
Identification of isomorphism and detection of distinct mechanism of kinemati...eSAT Publishing House
 
Neural wavelet based hybrid model for short-term load forecasting
Neural wavelet based hybrid model for short-term load forecastingNeural wavelet based hybrid model for short-term load forecasting
Neural wavelet based hybrid model for short-term load forecastingAlexander Decker
 
2010 - Stapelberg, Krzesinski - Network Re-engineering using Successive Survi...
2010 - Stapelberg, Krzesinski - Network Re-engineering using Successive Survi...2010 - Stapelberg, Krzesinski - Network Re-engineering using Successive Survi...
2010 - Stapelberg, Krzesinski - Network Re-engineering using Successive Survi...Dieter Stapelberg
 

La actualidad más candente (16)

IRJET- Facial Gesture Recognition using Surface EMG and Multiclass Support Ve...
IRJET- Facial Gesture Recognition using Surface EMG and Multiclass Support Ve...IRJET- Facial Gesture Recognition using Surface EMG and Multiclass Support Ve...
IRJET- Facial Gesture Recognition using Surface EMG and Multiclass Support Ve...
 
Deep segmentation of the liver and the hepatic tumors from abdomen tomography...
Deep segmentation of the liver and the hepatic tumors from abdomen tomography...Deep segmentation of the liver and the hepatic tumors from abdomen tomography...
Deep segmentation of the liver and the hepatic tumors from abdomen tomography...
 
A Comparison Of Smart Routings In Mobile Ad Hoc Networks(MANETs)
A Comparison Of Smart Routings In Mobile Ad Hoc  Networks(MANETs) A Comparison Of Smart Routings In Mobile Ad Hoc  Networks(MANETs)
A Comparison Of Smart Routings In Mobile Ad Hoc Networks(MANETs)
 
A280108
A280108A280108
A280108
 
Optimal neural network models for wind speed prediction
Optimal neural network models for wind speed predictionOptimal neural network models for wind speed prediction
Optimal neural network models for wind speed prediction
 
A novel scheme for reliable multipath routing
A novel scheme for reliable multipath routingA novel scheme for reliable multipath routing
A novel scheme for reliable multipath routing
 
A novel scheme for reliable multipath routing through node independent direct...
A novel scheme for reliable multipath routing through node independent direct...A novel scheme for reliable multipath routing through node independent direct...
A novel scheme for reliable multipath routing through node independent direct...
 
A Performance Analysis of CLMS and Augmented CLMS Algorithms for Smart Antennas
A Performance Analysis of CLMS and Augmented CLMS Algorithms for Smart Antennas A Performance Analysis of CLMS and Augmented CLMS Algorithms for Smart Antennas
A Performance Analysis of CLMS and Augmented CLMS Algorithms for Smart Antennas
 
A Weighted Duality based Formulation of MIMO Systems
A Weighted Duality based Formulation of MIMO SystemsA Weighted Duality based Formulation of MIMO Systems
A Weighted Duality based Formulation of MIMO Systems
 
1.meena tushir finalpaper-1-12
1.meena tushir finalpaper-1-121.meena tushir finalpaper-1-12
1.meena tushir finalpaper-1-12
 
Iv3515241527
Iv3515241527Iv3515241527
Iv3515241527
 
DSR Routing Decisions for Mobile Ad Hoc Networks using Fuzzy Inference System
DSR Routing Decisions for Mobile Ad Hoc Networks using Fuzzy Inference SystemDSR Routing Decisions for Mobile Ad Hoc Networks using Fuzzy Inference System
DSR Routing Decisions for Mobile Ad Hoc Networks using Fuzzy Inference System
 
Identification of isomorphism and detection of distinct mechanism of kinemati...
Identification of isomorphism and detection of distinct mechanism of kinemati...Identification of isomorphism and detection of distinct mechanism of kinemati...
Identification of isomorphism and detection of distinct mechanism of kinemati...
 
Identification of isomorphism and detection of distinct mechanism of kinemati...
Identification of isomorphism and detection of distinct mechanism of kinemati...Identification of isomorphism and detection of distinct mechanism of kinemati...
Identification of isomorphism and detection of distinct mechanism of kinemati...
 
Neural wavelet based hybrid model for short-term load forecasting
Neural wavelet based hybrid model for short-term load forecastingNeural wavelet based hybrid model for short-term load forecasting
Neural wavelet based hybrid model for short-term load forecasting
 
2010 - Stapelberg, Krzesinski - Network Re-engineering using Successive Survi...
2010 - Stapelberg, Krzesinski - Network Re-engineering using Successive Survi...2010 - Stapelberg, Krzesinski - Network Re-engineering using Successive Survi...
2010 - Stapelberg, Krzesinski - Network Re-engineering using Successive Survi...
 

Destacado

SM Ciudadanía 3° - Unidad 05 - Derechos humanos, definición
SM Ciudadanía 3° - Unidad 05 - Derechos humanos, definiciónSM Ciudadanía 3° - Unidad 05 - Derechos humanos, definición
SM Ciudadanía 3° - Unidad 05 - Derechos humanos, definiciónEbiolibros S.A.C.
 
derechos en colombia
derechos en colombiaderechos en colombia
derechos en colombiaboterobot
 
Teorías del Conexionismo
Teorías del ConexionismoTeorías del Conexionismo
Teorías del Conexionismodracula28021984
 
La teoria del aprendizaje de thorndike
La teoria del aprendizaje de thorndikeLa teoria del aprendizaje de thorndike
La teoria del aprendizaje de thorndikeDyana Nube
 
Power Point sobre Derechos Humanos
Power Point sobre Derechos HumanosPower Point sobre Derechos Humanos
Power Point sobre Derechos HumanosVeronicaNDabini
 
Derechos humanos
Derechos  humanosDerechos  humanos
Derechos humanosLILI
 
Derechos humanos diapositivas
Derechos humanos diapositivasDerechos humanos diapositivas
Derechos humanos diapositivaskevinhugo
 
Los derechos humanos... diapositivas
Los derechos humanos... diapositivasLos derechos humanos... diapositivas
Los derechos humanos... diapositivasisamarmolinamolina
 
Tipos de derechos humanos
Tipos de derechos humanosTipos de derechos humanos
Tipos de derechos humanosalejandrotic
 

Destacado (11)

SM Ciudadanía 3° - Unidad 05 - Derechos humanos, definición
SM Ciudadanía 3° - Unidad 05 - Derechos humanos, definiciónSM Ciudadanía 3° - Unidad 05 - Derechos humanos, definición
SM Ciudadanía 3° - Unidad 05 - Derechos humanos, definición
 
derechos en colombia
derechos en colombiaderechos en colombia
derechos en colombia
 
Edward Thorndike
Edward ThorndikeEdward Thorndike
Edward Thorndike
 
Teorías del Conexionismo
Teorías del ConexionismoTeorías del Conexionismo
Teorías del Conexionismo
 
Edward lee thorndike
Edward lee thorndikeEdward lee thorndike
Edward lee thorndike
 
La teoria del aprendizaje de thorndike
La teoria del aprendizaje de thorndikeLa teoria del aprendizaje de thorndike
La teoria del aprendizaje de thorndike
 
Power Point sobre Derechos Humanos
Power Point sobre Derechos HumanosPower Point sobre Derechos Humanos
Power Point sobre Derechos Humanos
 
Derechos humanos
Derechos  humanosDerechos  humanos
Derechos humanos
 
Derechos humanos diapositivas
Derechos humanos diapositivasDerechos humanos diapositivas
Derechos humanos diapositivas
 
Los derechos humanos... diapositivas
Los derechos humanos... diapositivasLos derechos humanos... diapositivas
Los derechos humanos... diapositivas
 
Tipos de derechos humanos
Tipos de derechos humanosTipos de derechos humanos
Tipos de derechos humanos
 

Similar a 50120140502012

IRJET- Efficient and Secure Communication In Vehicular AD HOC Network
IRJET-	 Efficient and Secure Communication In Vehicular AD HOC NetworkIRJET-	 Efficient and Secure Communication In Vehicular AD HOC Network
IRJET- Efficient and Secure Communication In Vehicular AD HOC NetworkIRJET Journal
 
Comparative Analysis of Mobility Models Using Routing Protocol for Vehicular ...
Comparative Analysis of Mobility Models Using Routing Protocol for Vehicular ...Comparative Analysis of Mobility Models Using Routing Protocol for Vehicular ...
Comparative Analysis of Mobility Models Using Routing Protocol for Vehicular ...IRJET Journal
 
A Survey on the Common Network Traffic Sources Models
A Survey on the Common Network Traffic Sources ModelsA Survey on the Common Network Traffic Sources Models
A Survey on the Common Network Traffic Sources ModelsCSCJournals
 
Designing a Routing Protocol for Ubiquitous Networks Using ECA Scheme
Designing a Routing Protocol for Ubiquitous Networks Using ECA SchemeDesigning a Routing Protocol for Ubiquitous Networks Using ECA Scheme
Designing a Routing Protocol for Ubiquitous Networks Using ECA Schemecsandit
 
Designing a Routing Protocol for Ubiquitous Networks Using ECA Scheme
Designing a Routing Protocol for Ubiquitous Networks Using ECA SchemeDesigning a Routing Protocol for Ubiquitous Networks Using ECA Scheme
Designing a Routing Protocol for Ubiquitous Networks Using ECA Schemecsandit
 
Performance evaluation of aodv and olsr in vanet under realistic mobility
Performance evaluation of aodv and olsr in vanet under realistic mobilityPerformance evaluation of aodv and olsr in vanet under realistic mobility
Performance evaluation of aodv and olsr in vanet under realistic mobilityIAEME Publication
 
IRJET- Design and Implementation of Performance Evaluation of Routing Protoco...
IRJET- Design and Implementation of Performance Evaluation of Routing Protoco...IRJET- Design and Implementation of Performance Evaluation of Routing Protoco...
IRJET- Design and Implementation of Performance Evaluation of Routing Protoco...IRJET Journal
 
Modeling of distributed mutual exclusion system using event b
Modeling of distributed mutual exclusion system using event bModeling of distributed mutual exclusion system using event b
Modeling of distributed mutual exclusion system using event bcsandit
 
MODELING OF DISTRIBUTED MUTUAL EXCLUSION SYSTEM USING EVENT-B
MODELING OF DISTRIBUTED MUTUAL EXCLUSION SYSTEM USING EVENT-B MODELING OF DISTRIBUTED MUTUAL EXCLUSION SYSTEM USING EVENT-B
MODELING OF DISTRIBUTED MUTUAL EXCLUSION SYSTEM USING EVENT-B cscpconf
 
Simulation Based Analysis of Bee Swarm Inspired Hybrid Routing Protocol Param...
Simulation Based Analysis of Bee Swarm Inspired Hybrid Routing Protocol Param...Simulation Based Analysis of Bee Swarm Inspired Hybrid Routing Protocol Param...
Simulation Based Analysis of Bee Swarm Inspired Hybrid Routing Protocol Param...Editor IJCATR
 
A detailed study of routing protocols for mobile ad hoc networks using
A detailed study of routing protocols for mobile ad hoc networks usingA detailed study of routing protocols for mobile ad hoc networks using
A detailed study of routing protocols for mobile ad hoc networks usingIAEME Publication
 
A detailed study of routing protocols for mobile ad hoc networks using
A detailed study of routing protocols for mobile ad hoc networks usingA detailed study of routing protocols for mobile ad hoc networks using
A detailed study of routing protocols for mobile ad hoc networks usingIAEME Publication
 
Just in-time code offloading for wearable computing
Just in-time code offloading for wearable computingJust in-time code offloading for wearable computing
Just in-time code offloading for wearable computingredpel dot com
 
Just in-time code offloading for wearable computing
Just in-time code offloading for wearable computingJust in-time code offloading for wearable computing
Just in-time code offloading for wearable computingredpel dot com
 
Analysis and implementation of local modular supervisory control for
Analysis and implementation of local modular supervisory control forAnalysis and implementation of local modular supervisory control for
Analysis and implementation of local modular supervisory control forIAEME Publication
 
Volume 2-issue-6-2195-2199
Volume 2-issue-6-2195-2199Volume 2-issue-6-2195-2199
Volume 2-issue-6-2195-2199Editor IJARCET
 
Volume 2-issue-6-2195-2199
Volume 2-issue-6-2195-2199Volume 2-issue-6-2195-2199
Volume 2-issue-6-2195-2199Editor IJARCET
 

Similar a 50120140502012 (20)

Ijcet 06 09_004
Ijcet 06 09_004Ijcet 06 09_004
Ijcet 06 09_004
 
IRJET- Efficient and Secure Communication In Vehicular AD HOC Network
IRJET-	 Efficient and Secure Communication In Vehicular AD HOC NetworkIRJET-	 Efficient and Secure Communication In Vehicular AD HOC Network
IRJET- Efficient and Secure Communication In Vehicular AD HOC Network
 
Comparative Analysis of Mobility Models Using Routing Protocol for Vehicular ...
Comparative Analysis of Mobility Models Using Routing Protocol for Vehicular ...Comparative Analysis of Mobility Models Using Routing Protocol for Vehicular ...
Comparative Analysis of Mobility Models Using Routing Protocol for Vehicular ...
 
A Survey on the Common Network Traffic Sources Models
A Survey on the Common Network Traffic Sources ModelsA Survey on the Common Network Traffic Sources Models
A Survey on the Common Network Traffic Sources Models
 
Designing a Routing Protocol for Ubiquitous Networks Using ECA Scheme
Designing a Routing Protocol for Ubiquitous Networks Using ECA SchemeDesigning a Routing Protocol for Ubiquitous Networks Using ECA Scheme
Designing a Routing Protocol for Ubiquitous Networks Using ECA Scheme
 
Designing a Routing Protocol for Ubiquitous Networks Using ECA Scheme
Designing a Routing Protocol for Ubiquitous Networks Using ECA SchemeDesigning a Routing Protocol for Ubiquitous Networks Using ECA Scheme
Designing a Routing Protocol for Ubiquitous Networks Using ECA Scheme
 
Performance evaluation of aodv and olsr in vanet under realistic mobility
Performance evaluation of aodv and olsr in vanet under realistic mobilityPerformance evaluation of aodv and olsr in vanet under realistic mobility
Performance evaluation of aodv and olsr in vanet under realistic mobility
 
50120130404054
5012013040405450120130404054
50120130404054
 
IRJET- Design and Implementation of Performance Evaluation of Routing Protoco...
IRJET- Design and Implementation of Performance Evaluation of Routing Protoco...IRJET- Design and Implementation of Performance Evaluation of Routing Protoco...
IRJET- Design and Implementation of Performance Evaluation of Routing Protoco...
 
Modeling of distributed mutual exclusion system using event b
Modeling of distributed mutual exclusion system using event bModeling of distributed mutual exclusion system using event b
Modeling of distributed mutual exclusion system using event b
 
MODELING OF DISTRIBUTED MUTUAL EXCLUSION SYSTEM USING EVENT-B
MODELING OF DISTRIBUTED MUTUAL EXCLUSION SYSTEM USING EVENT-B MODELING OF DISTRIBUTED MUTUAL EXCLUSION SYSTEM USING EVENT-B
MODELING OF DISTRIBUTED MUTUAL EXCLUSION SYSTEM USING EVENT-B
 
Simulation Based Analysis of Bee Swarm Inspired Hybrid Routing Protocol Param...
Simulation Based Analysis of Bee Swarm Inspired Hybrid Routing Protocol Param...Simulation Based Analysis of Bee Swarm Inspired Hybrid Routing Protocol Param...
Simulation Based Analysis of Bee Swarm Inspired Hybrid Routing Protocol Param...
 
A detailed study of routing protocols for mobile ad hoc networks using
A detailed study of routing protocols for mobile ad hoc networks usingA detailed study of routing protocols for mobile ad hoc networks using
A detailed study of routing protocols for mobile ad hoc networks using
 
A detailed study of routing protocols for mobile ad hoc networks using
A detailed study of routing protocols for mobile ad hoc networks usingA detailed study of routing protocols for mobile ad hoc networks using
A detailed study of routing protocols for mobile ad hoc networks using
 
Just in-time code offloading for wearable computing
Just in-time code offloading for wearable computingJust in-time code offloading for wearable computing
Just in-time code offloading for wearable computing
 
Just in-time code offloading for wearable computing
Just in-time code offloading for wearable computingJust in-time code offloading for wearable computing
Just in-time code offloading for wearable computing
 
Analysis and implementation of local modular supervisory control for
Analysis and implementation of local modular supervisory control forAnalysis and implementation of local modular supervisory control for
Analysis and implementation of local modular supervisory control for
 
2 sima singh-6-13
2 sima singh-6-132 sima singh-6-13
2 sima singh-6-13
 
Volume 2-issue-6-2195-2199
Volume 2-issue-6-2195-2199Volume 2-issue-6-2195-2199
Volume 2-issue-6-2195-2199
 
Volume 2-issue-6-2195-2199
Volume 2-issue-6-2195-2199Volume 2-issue-6-2195-2199
Volume 2-issue-6-2195-2199
 

Más de IAEME Publication

IAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME_Publication_Call_for_Paper_September_2022.pdfIAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME_Publication_Call_for_Paper_September_2022.pdfIAEME Publication
 
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...IAEME Publication
 
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURSA STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURSIAEME Publication
 
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURSBROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURSIAEME Publication
 
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONSDETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONSIAEME Publication
 
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONSANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONSIAEME Publication
 
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINOVOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINOIAEME Publication
 
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...IAEME Publication
 
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMYVISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMYIAEME Publication
 
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...IAEME Publication
 
GANDHI ON NON-VIOLENT POLICE
GANDHI ON NON-VIOLENT POLICEGANDHI ON NON-VIOLENT POLICE
GANDHI ON NON-VIOLENT POLICEIAEME Publication
 
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...IAEME Publication
 
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...IAEME Publication
 
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...IAEME Publication
 
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...IAEME Publication
 
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...IAEME Publication
 
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...IAEME Publication
 
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...IAEME Publication
 
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...IAEME Publication
 
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENTA MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENTIAEME Publication
 

Más de IAEME Publication (20)

IAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME_Publication_Call_for_Paper_September_2022.pdfIAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME_Publication_Call_for_Paper_September_2022.pdf
 
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
 
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURSA STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
 
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURSBROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
 
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONSDETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
 
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONSANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
 
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINOVOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
 
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
 
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMYVISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
 
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
 
GANDHI ON NON-VIOLENT POLICE
GANDHI ON NON-VIOLENT POLICEGANDHI ON NON-VIOLENT POLICE
GANDHI ON NON-VIOLENT POLICE
 
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
 
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
 
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
 
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
 
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
 
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
 
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
 
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
 
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENTA MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
 

Último

Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Mark Goldstein
 
Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)Kaya Weers
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesKari Kakkonen
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfIngrid Airi González
 
Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...itnewsafrica
 
Generative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptxGenerative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptxfnnc6jmgwh
 
QCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architecturesQCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architecturesBernd Ruecker
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesThousandEyes
 
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...itnewsafrica
 
Infrared simulation and processing on Nvidia platforms
Infrared simulation and processing on Nvidia platformsInfrared simulation and processing on Nvidia platforms
Infrared simulation and processing on Nvidia platformsYoss Cohen
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsNathaniel Shimoni
 
Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...
Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...
Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...BookNet Canada
 
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security ObservabilityGlenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security Observabilityitnewsafrica
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersNicole Novielli
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfNeo4j
 
Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024TopCSSGallery
 
JET Technology Labs White Paper for Virtualized Security and Encryption Techn...
JET Technology Labs White Paper for Virtualized Security and Encryption Techn...JET Technology Labs White Paper for Virtualized Security and Encryption Techn...
JET Technology Labs White Paper for Virtualized Security and Encryption Techn...amber724300
 
Irene Moetsana-Moeng: Stakeholders in Cybersecurity: Collaborative Defence fo...
Irene Moetsana-Moeng: Stakeholders in Cybersecurity: Collaborative Defence fo...Irene Moetsana-Moeng: Stakeholders in Cybersecurity: Collaborative Defence fo...
Irene Moetsana-Moeng: Stakeholders in Cybersecurity: Collaborative Defence fo...itnewsafrica
 
Landscape Catalogue 2024 Australia-1.pdf
Landscape Catalogue 2024 Australia-1.pdfLandscape Catalogue 2024 Australia-1.pdf
Landscape Catalogue 2024 Australia-1.pdfAarwolf Industries LLC
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Farhan Tariq
 

Último (20)

Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
 
Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examples
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdf
 
Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...
 
Generative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptxGenerative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptx
 
QCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architecturesQCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architectures
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
 
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
 
Infrared simulation and processing on Nvidia platforms
Infrared simulation and processing on Nvidia platformsInfrared simulation and processing on Nvidia platforms
Infrared simulation and processing on Nvidia platforms
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directions
 
Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...
Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...
Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...
 
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security ObservabilityGlenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software Developers
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdf
 
Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024
 
JET Technology Labs White Paper for Virtualized Security and Encryption Techn...
JET Technology Labs White Paper for Virtualized Security and Encryption Techn...JET Technology Labs White Paper for Virtualized Security and Encryption Techn...
JET Technology Labs White Paper for Virtualized Security and Encryption Techn...
 
Irene Moetsana-Moeng: Stakeholders in Cybersecurity: Collaborative Defence fo...
Irene Moetsana-Moeng: Stakeholders in Cybersecurity: Collaborative Defence fo...Irene Moetsana-Moeng: Stakeholders in Cybersecurity: Collaborative Defence fo...
Irene Moetsana-Moeng: Stakeholders in Cybersecurity: Collaborative Defence fo...
 
Landscape Catalogue 2024 Australia-1.pdf
Landscape Catalogue 2024 Australia-1.pdfLandscape Catalogue 2024 Australia-1.pdf
Landscape Catalogue 2024 Australia-1.pdf
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...
 

50120140502012

  • 1. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print), INTERNATIONAL JOURNAL OF COMPUTER ENGINEERING & ISSN 0976 - 6375(Online), Volume 5, Issue 2, February (2014), pp. 108-116 © IAEME TECHNOLOGY (IJCET) ISSN 0976 – 6367(Print) ISSN 0976 – 6375(Online) Volume 5, Issue 2, February (2014), pp. 108-116 © IAEME: www.iaeme.com/ijcet.asp Journal Impact Factor (2014): 4.4012 (Calculated by GISI) www.jifactor.com IJCET ©IAEME MODELING OF DSDV ROUTING PROTOCOL FOR AD HOC NETWORKS USING EVENT-B Arun Kumar Singh1, Vinod Kumar singh2 1 2 Electronics Engineering Department, IET, UPTU, Lucknow, India Professor, Electronics Engineering Department, IET, UPTU, Lucknow, India ABSTRACT Ad hoc networks are dynamic networks of mobile nodes with wireless network interfaces forming an instant network without fixed topology. Destination-sequenced distance vector (DSDV) is a proactive routing protocol, which continuously maintains the topological information and whenever communication is needed such route information is available immediately. DSDV is a modification of the conventional Bellman-Ford routing algorithm to make it suitable for ad hoc networks. For any routing algorithm route discovery is an important task. In Ad hoc networks, broadcasting is the basic mechanism by which route discovery and propagation of routing is done. Therefore, routing algorithms must be robust and free from erratic behaviors. Hence formal specifications are needed to ensure correctness of routing protocols that are used Ad hoc networks. Formal methods are mathematical techniques which are used to develop software model. Event-B is formal technique that enables user to express the problem at abstract level and then add more details in refinement step to obtain concrete specification. The Event-B model generates proof obligations. For ensuring correctness of the system we need to discharge all proof obligations. With this backdrop, the paper focuses on formalizing protocols for routing in Ad hoc networks by using destination-sequenced distance vector routing. The model ensures bi-directional links and loop free routes in routing packets. Keywords: Formal Methods, Formal Specification, Event-B, DSDV, Ad hoc Networks. 1. INTRODUCTION Ad hoc networks differ significantly from conventional networks in the dynamic topology of interconnections and automatic administration for setting up the network. The topology of the Ad hoc can be arbitrary at any time. With the change of the topology of an Ad hoc network, the nodes in the network have to update their routing information automatically and instantly [1]. 108
  • 2. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print), ISSN 0976 - 6375(Online), Volume 5, Issue 2, February (2014), pp. 108-116 © IAEME Traditionally, the network routing protocols could be divided into proactive protocols and reactive protocols. Proactive protocols continuously learn the topology of the network by exchanging topological information among the network nodes. Thus, when there is a need for a route to a destination, such route information is available immediately. One of the early protocols that have been proposed for routing in ad hoc networks is proactive Distance Vector protocols based on the Distributed Bellman-Ford (DBF) algorithm [2].Destination sequenced distance vector routing (DSDV) is adapted from the conventional Routing Information Protocol (RIP) to ad hoc networks routing. It adds a new attribute, sequence number, to each route table entry of the conventional RIP. Using the newly added sequence number, the mobile nodes can distinguish stale route information from the new and thus prevent the formation of routing loops.[1] Numerous formal methods have been applied to the analysis of network protocols. It includes model checking [3, 4], theorem proving [5], and development by refinement [6, 7]. With reference to routing protocols, probably the most detailed study [8], has applied an interactive theorem prover (HOL) together with a model checker (SPIN) to verify different properties of distance vector routing protocols. In the study [8], case studies have been carried out to analyze the Routing Information Protocol (RIP) standard and the Ad-Hoc On-Demand Distance Vector (AODV) protocol. The work regarding formal modeling of topology discovery in changing environment can be found in [13]. In this case study we have developed the formal model of Destination Sequenced Distance Vector routing protocol using Event-B. The rest of the paper is organized as follows: Section 2 presents our modeling approach and the introduction to Event-B, Section 3 discusses the formal model of DSDV in Event-B and the last section 4 concludes the paper. 2. FORMAL MODELING USING EVENT-B A development in Event-B [9] is a set of formal models. A model contains the complete mathematical development of a Discrete Transition System. Event-B has a semantics based on transition systems and simulation between such systems, described in [10]. Event-B models are organized in terms of the two basic constructs: contexts and machines. Contexts specify the static part of a model whereas machines specify the dynamic part. Within the Event B framework, asynchronous systems may be developed and structured using abstract systems [10]. Abstraction can be viewed as a process of simplifying our understanding of a system, by identifying the key features of the system to be modeled, by focusing on intended purpose of the system and ignoring details of how that purpose is achieved. Event-B supports refinement to augment the functionality being modeled, or introducing details about the dynamic properties of a model. In refinement steps we refine one model M1 to another model M2, model M2 to model M3 and so on, till the desired functionality is achieved. The states of the abstract machine are related to the states of the concrete machine by gluing invariants J (v, w), where v and w are the variables of the abstract machine and concrete machine respectively. With abstraction, we can postpone treatment of some system features to later refinement steps. Event-B provides a notion of consistency of a refinement by generating the proof obligations and providing an environment to discharging the proof obligations while failing proof can help us to identify inconsistencies in a refinement step. Refinement and abstraction allow us to manage the complex system in the design process by first describing the abstract problem, introducing solutions or details in refinement steps to obtain more concrete specifications and verifying that proposed solutions are valid. 109
  • 3. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print), ISSN 0976 - 6375(Online), Volume 5, Issue 2, February (2014), pp. 108-116 © IAEME 2.1 MACHINES AND CONTEXTS Machines specify behavioral properties of Event-B models. It may contain variables, invariants, theorems, events and variants of a model. Variables v defines the state of a machine. They are constrained by invariants I (v). Possible state changes are described by events while Contexts may contain carrier sets, constants, axioms, and theorems. Carrier sets are similar to types [9]. Axioms constrain carrier sets and constants, whereas theorems express properties derivable from axioms. Machines and contexts have various relationships: a machine can be “refined” by another one, and a context can be “extended” by another one (no cycles are allowed in both these relationships). Moreover, a machine can “see” one or several contexts [10]. A model can only contain contexts, or only machines, or both. In the first case, the model represents a pure mathematical structure. In the third case, the machines of the model are parameterized by the contexts. Finally, the second case represents a machine which is not parameterized. Machines contain the variables, invariants, theorems, and events of a model, whereas contexts contain carrier sets, constants, axioms, and theorems of a model: Machines and contexts have various relationships: a machine can be “refined” by another one, and a context can be “extended” by another one (no cycles are allowed in both these relationships). Moreover, a machine can “see” one or several contexts. A model can only contain contexts, or only machines, or both. In the first case, the model represents a pure mathematical structure. In the third case, the machines of the model are parameterized by the contexts. Finally, the second case represents a machine which is not parameterized. 2.2 EVENTS A machine event represents a transition. Each event is made of guard G (v) and action S (v). The guards together denote the necessary condition for the event to be enabled, whereas the actions together represent the way the variables of the corresponding machine are modified. An event can be represented by the term -when G (v) then S (v) end. Events can have no guards, they can be also simple and guarded (keyword where) or parameterized and guarded (keywords any and where). When an event lies in a machine which refines another one then the event may specify (if any) the abstract event(s) it refines (keyword refines). When a refining event refines an abstract event which is parameterized, one may provide some witnesses (keyword with). The status of the event can be normal, convergent or anticipated. A “convergent” event must be a new event in a refined machine (one that does not appear in the abstraction). All convergent events in a machine are concerned with the variant section of that machine. An “anticipated” event is a new event which is not “convergent” yet but should become “convergent” in a subsequent refinement. A machine event represents a transition. It is essentially made of guards and actions. The guards together denote the necessary condition for the event to be enabled, whereas the actions together represent the way the variables of the corresponding machine are modified. Events can have no guards, they can be also simple and guarded (keyword where) or parameterized and guarded (keywords any and where). When an event lies in a machine which refines another one then the event may specify (if any) the abstract event(s) it refines (keyword refines). When a refining event refines an abstract event which is parameterized, one may provide some witnesses (keyword with). 110
  • 4. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print), ISSN 0976 - 6375(Online), Volume 5, Issue 2, February (2014), pp. 108-116 © IAEME 3. FORMAL DEVELOPMENT OF DSDV USING EVENT- B 3.1 INFORMAL DESCRIPTION OF DSDV PROTOCOL Destination Sequenced Distance Vector is proactive routing protocol having new attribute of sequence number to make it more suitable for Ad hoc networks. The DSDV routing protocol [11] provides a single path to a destination, which is selected using the distance vector shortest path routing algorithm. The routing table gives the best distance to each destination and which route to get there by periodic updating of information with all its neighbors. Routing denotes the selection of paths through a network for sending data from a source to a destination. A path may require the data message to travel over multiple nodes, each node being an intermediate router. In routing protocols each host works as a router and constructs a graph representing the network topology. In this graph, vertices and edges represent routing nodes and direct connection between nodes, respectively. To specify the correct desired properties of protocol at abstract level and in carrying out the development and proofs in subsequent refinement models, is a challenging problem [12, 13, 14]. The next section 3.2 describes the formal development of Distance vector protocol. 3.2 FORMAL DEVELOPMENT In this paper, we have presented the formal development of Destination Sequenced Distance Vector routing protocol using Event B. The abstract model (Fig.1) specifies the environmental assumptions and system requirements for basic communication Machine RoutingM Sees RoutingC Variables sent, got, lost, A Links Invariants inv1: sent ⊆ MSG inv2: got ⊆ MSG inv3: lost ⊆ MSG inv4: ALinks∈(NODE↔NODE) inv5: got ∪ lost ⊆ sent inv6: got ∩ lost = ∅ Fig 1: Abstract Machine protocol [12] of data packet sending, losing and receiving as well as changes in network topology by using events: ADD_LINK, DEL_LINK, SEND, RECEIVE and LOSING. In the context of machine NODE and MSG are defined as a carrier set which represent the set of nodes and the messages respectively. For the given network it is assumed that there are only finite numbers of directed nodes. The variables sent, got and lost are defined as a subset of MSG (Fig.1). The variable ALinks which is defined as: ALinks ∈ NODE↔NODE represents the set of active links. 111
  • 5. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print), ISSN 0976 - 6375(Online), Volume 5, Issue 2, February (2014), pp. 108-116 © IAEME Variables: sent,got,lost,ALinks,Chstore,dseq,nexthop,dseqm,nexthopm,nodemetric,neighbour, nodemetricm,intmednode Invariants : inv1 : inv2 : inv3 : inv4 : inv5 : inv6 : inv7 : inv8 : inv9 : inv10 : inv11 : inv12 : inv13 : inv14 : chstore∈ NODE ↔MSG ∀i·i ∈ NODE ∧ i ∈ dom(chstore)⇒(got ∪ lost) ∩ chstore[{i}] = ∅ ran(chstore) ∪ (got ∪ lost) = sent ∀i·i ∈ NODE ⇒chstore[{i}] ⊆ sent ∀m·m ∈ MSG ∧m ∉ sent⇒(m ∉ got ∧m ∉ lost ∧ (∀i·i ∈ NODE ⇒i↦m ∉ chstore)) ∀m, i, j·i↦ m ∈ chstore ∧ j↦ m ∈ chstore⇒i = j dseq ∈ NODE→(NODE→ℕ) nexthop ∈ NODE→(NODE→NODE) dseqm ∈ MSG→(NODE→ℕ) nexthopm ∈ MSG→(NODE→NODE) nodemetric ∈ NODE→(NODE→ℕ) neighbour∈NODE↔NODE nodemetricm ∈MSG→(NODE→ℕ) intmednode⊆ NODE Initialisation : act1: sent≔∅ act2: got≔∅ act3: lost≔∅ act4: ALinks≔∅ act5: chstore≔∅ act6: dseq≔NODE×{NODE×{dsq}} act7: nexthop≔NODE×{NODE×{n0}} act8: dseqm≔MSG×{NODE×{0}} act9: nexthopm≔MSG×{NODE×{n0}} act10: nodemetric≔linkvalue0 act11: neighbour≔neighbour0 act12: nodemetricm≔MSG×{NODE×{0}} act13: intmednode ≔∅ Fig 2. Variables, Invarients and Initialisation of DSDV machine For DSDV machine, the variables, invariants and there initialization is given in Fig2 which also includes variables of basic communication protocol [12, 15]. Every site maintain the information about sequence number of destination site. The variable dseq represents sequence number of destination site. It is represented as dseq ∈ NODE→ (NODE→ℕ). A mapping {sm({tmn1}) } ∈ dseq indicates that routing table of site s has entry that n1 is the sequence number of destination site t. The variable nexthop give the information about next hop entry of a node to reach a destination. A mapping {n1m({n2mn3}) } ∈ nexthop represents that to reach a destination node n2, n3 is nexthop for the node n1.The variable nodemetric contains the information about the total hop count from a particular node. The site sends the routing information through the messages. Any site updates its routing information after receiving the message. The variable dseqm contain the sequence number of nodes. It maps each message to sequence number function. The sequence number function maps each node to natural number. The length of sequence number function is number of nodes 112
  • 6. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print), ISSN 0976 - 6375(Online), Volume 5, Issue 2, February (2014), pp. 108-116 © IAEME present in the system. Therefore, dseqm(m) contains sequence number of each node. Similarly, variable nexthopm contains nexthop entry of a destination node in a message. A mapping {m1m({n1mn2}) } ∈ nexthopm indicates that message m1 has the information that for the destination node n1, node n2 is next hop .The hope count information in a broadcast message is maintained by nodemetricm. The neighbour of a node is represented through the variable neighbour. It is represented as: neighbour∈NODE↔NODE. Any node has several neighbour node therefore it is declared as relation. Refines Send Send Any s,t, datamsg Where grd1 : s∈NODE grd3 : s≠t grd5 : datamsg ∉ sent grd7 : target(datamsg) = t Then act1 : sent ≔ sent ∪ {datamsg} act3 : dseqm(datamsg)≔dseq(s) End grd2 : grd4 : grd6 : grd8 : t∈NODE datamsg ∈ MSG source(datamsg) = s s↦datamsg ∉chstore act2 : act4 : chstore ≔ chstore ∪ {s↦ datamsg} nodemetricm(datamsg)≔nodemetric(s) Fig 3. Send Event Send Event: This event models the sending of messages from one node to other node. The message datamsg has not been sent is insured through guard grd5. The site s and site t is source and destination site is specified through guard grd6 and guard grd7 respectively. The guard grd8 is written as: s↦datamsg ∉ chstore It ensures that message datamsg is not present in the channel. The message contains all the routing information of sending node. The action act1 add the datamsg message in the sent variable. The action act2 add the message datamsg in to the channel. The action act3 assigns the sequence number to message datamsg. The sequence number of sender site s is assigned to message datamsg. The action act4 asigns the nodemetric value to message datamsg. Forward Any datamsg, x, y, t Where grd1 : t∈NODE grd3 : x↦ y ∈ ALinks grd5 : target(datamsg) = t grd7 : Then act1 : grd2 : grd4 : grd6 : grd8 : x↦ datamsg ∈ chstore chstore ≔ (chstore ∖ {x↦datamsg})∪ {y↦datamsg} act2 : datamsg ∈ sent ∖ (got ∪ lost) y∈neighbour[{x}] x ≠ target(datamsg) y↦datamsg ∉chstore intmednode≔{x} End Fig 4: Forward Event Forward Event: This event forward the routing update messages from one node to other node. The message datamsg has been sent but not received and lost is ensured through guard grd2. The guard grd3 ensures that node x and y are connected. The guard grd4 ensures that y is a neighbour of node x. The 113
  • 7. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print), ISSN 0976 - 6375(Online), Volume 5, Issue 2, February (2014), pp. 108-116 © IAEME target of message datamsg is t is ensured through guard grd5. The guard grd6 specifies that x is not target of message datamsg. The guard grd7 specifies that update message datamsg is currently located at site x. The guard grd8 specifies that message datamsg is not present at site y. The action act1 indicates passing of message datamsg from node x to node y. The action act2 maintains the information about sender of message datamsg. Initiate_Routing_Table Any n, tempnodemetric, n2,nr,v, tempnodemetric1 Where grd1: tempnodemetric1∈ NODE→(NODE grd2: →ℕ ) tempnodemetric∈ NODE→(NODE →ℕ ) grd3: n∈NODE grd4: nr∈neighbour[{n}] grd5: n2∈NODE grd6: n2≠n grd7: n2≠nr grd8: v=linkvalue0(n)(nr) grd9: tempnodemetric(n)=nodemetric(n)+ grd10 : {n↦0} tempnodemetric1(n)=tempnodemet ric(n)+{nr↦v} Then act1: nodemetric(n)≔tempnodemetric1(n)+{n2↦infinite} End Fig5: Initiate Routing Table Event Initiate Routing Table Event: Every node maintains entry of metric count value. This value gives total distance to destination node from a given node. This event assigns the matric value for a particular node. This event assigns a value to the node matric of node n for neighbour node nr. The value represents distance to the neighbour node. It also assigns infinite value for those node n2 which are not in neighbour of node n. The guard grd4 specifies that node nr is neighbour of node n. The node n2 is a node which is not neighbour of node n is specified through guard grd7. The value v indicate the link value between node n and neighbour nr. The grd guard9 specifies that nodematric value from node n to itself is zero. The guard grd10 specifies that distance of neighbour node is v. The action act1 assigns infinite value to those node which are not in neighbour. Initiate_Routing_Table2 Any tempnexthop, nr, n Where grd1: tempnexthop∈ NODE→(NODE→NODE) grd3: grd2: nr∈neighbour[{n}] tempnexthop(n)=nexthop(n)+{n↦n} Then act1: nexthop≔nexthop+(λdest•dest∈NODE∧ dest≠n ∧ nr↦dest∈path(ALinks)∣tempnexthop(n)+{dest↦nr}) End Fig6: Initiate RoutingTable2 Event 114
  • 8. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print), ISSN 0976 - 6375(Online), Volume 5, Issue 2, February (2014), pp. 108-116 © IAEME Initiate_Routing_Table2: This event makes the next hop entry for each destination node. The guard grd2 ensures that node nr is neighbour of node n. The guard grd3 specifies that nexthop entry of a node n for the destination node n will be same i.e., node n. The action act1 is wriiten as: nexthop≔nexthop+(λdest·dest∈NODE∧ dest≠n ∧ nr↦dest∈path(ALinks)∣tempnexthop(n)+{dest↦nr }) It represents that for every node dest, if there is a path from neighbour node nr then nr will be next hop of the node n for the destination node dest. Routing_Table_Update Where grd1 : v∈ℕ grd2 : p∈NODE grd3 : y∈NODE grd4 : intmednode={y} grd5 : s∈NODE grd6 : source(datamsg)= s grd7 : x ↦ y∈ALinks grd8 : x ≠ source(datamsg) grd9 : x↦ datamsg ∈ chstore grd10 : p∈dom(dseqm(datamsg) grd11 : ∃k·(k∈NODE⇒dseq(x)(k)< dseqm(datamsg)(k)) grd12 : dseq(x)(p)< dseqm(datamsg)(p) grd13 : v=(nodemetric(x)(y)+nodemetricm(datamsg)(p)) Then act1 : dseq(x)≔dseq(x)+({k∣k∈NODE∧ dseq(x)(k)< dseqm(datamsg)(k)} dseqm(datamsg)) act3: act2: nexthop(x)≔nexthop(x)+{p↦y} nodemetric(x)≔nodemetric(x)+{p↦v} ◁ End Fig7: Routing_Table_Update Event 4. CONCLUSION This paper presents formal modeling of Destination Sequenced Distance Vector routing protocol. We have used Event-B as a formal method for writing specifications. Event-B generates proof obligations which need to be discharged for ensuring correctness of the system. Rodin platform has been used for discharging proof obligations. Total, sixty five (65) proof obligations have been generated by the system through consistency checking. Out of 65, sixty two (62) obligations have been discharged automatically, while remaining three (03) requires interaction with the prover. The model presented in the current paper provides a valuable insight in protocol implementation which may be further applied to other routing protocols for ad hoc networks. ACKNOWLEDGEMENTS The authors acknowledge the valuable suggestions of Er. Raghuraj Suryavanshi and Prof. Girish Chandra, Department of Computer Science and Engineering, IET, UPTU, Lucknow. 115
  • 9. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print), ISSN 0976 - 6375(Online), Volume 5, Issue 2, February (2014), pp. 108-116 © IAEME REFERENCES 1. 2. 3. 4. 5. 6. 7. 8. 9. 10. 11. 12. 13. 14. 15. Guoyou He: Destination-Sequenced Distance Vector (DSDV) protocol. Technical report, Helsinki University of Technology, Finland. Tanenbaum Andrew S.: Computer Networks, Prentice Hall, Inc., 1996, ISBN 7-302-02410-3. Christel Baier and Joost-Pieter Katoen: Principles of Model Checking. The MIT Press, 2008. Gerhard J. Holzmann: The Spin Model Checker: Primer and Reference Manual. Addison– Wesley, 2003. Marco Devillers, David Griffioen, Judi Romijn, and Frits Vaandrager: Verification of a leader election protocol: Formal methods applied to ieee 1394. Form. Methods Syst. Des., 16(3):307–320, 2000. Abrial, J.R., J.R., Cansell, D.,M´ery, D.:A Mechanically Proved and Incremental Development of IEEE 1394 Tree Identify Protocol. Formal Asp. Comput. 14(3), 215–227, 2003. A Udaya Shankar and Simon S Lam: A stepwise refinement heuristic for protocol construction.ACM Transactions on Programming Languages and Systems, 14(3):417–461, 1992. Karthikeyan Bhargavan, Davor Obradovic, and Carl A. Gunter: Formal verification of standards for distance vector routing protocols. J. ACM, 49(4):538–576, 2002. Abrial, J.R.:Modeling in Event-B: System and Software Design. Cambridge University Press, 2010. Abrial, J.R.: Extending B without Changing it (for developing distributed systems). Proc. of the 1st Conf. on the B method, H. Habrias (editor), France, pages 169–190, 1996. Perkins Charles E., Bhagwat Pravin: Highly Dynamic Destination-Sequenced Distance-Vector Routing (DSDV) for Mobile Computers, London England UK, ACM SIGCOMM’94, 1994, pp. 234–244. Dominique M´ery and Neeraj Kumar Singh:Analysis of DSR Protocol in Event-B 13th International Symposium on Stabilization, Safety, and Security of Distributed Systems (2011) 401-415. Hoang, T.S., Kuruma, H., Basin, D.A., Abrial, J.R.: Developing Topology Discovery in Event-B. In: Leuschel, M., Wehrheim, H. (eds.) IFM 2009. LNCS, vol. 5423, pp. 1–19.Springer, Heidelberg (2009) Butler, M.: Incremental Design of Distributed Systems with Event-B, Marktoberdorf Summer School 2008 Lecture Notes (2008), http://eprints.ecs.soton.ac.uk/16910 Singh, A.K and Singh, V.K.: Formal Modeling of Distance Vector Routing Protocol using Event-B in Advance in Electronic and Electric Engineering ISSN 2231-1297, Volume 3, Number 1 (2013), pp. 91-98. 116