A NEW FRAMEWORK FOR PREDICTING THE IMPACT OF TRAFFIC ON THE PERFORMANCE OF MOBILE AD-HOC NETWORK (MANET): USING REGRESSION AS DATA MINING APPROACH
Journal Title: International Journal of Software Engineering and Computer Systems - Year 2017, Vol 3, Issue 1
Abstract
With the rapid technological advances in wireless communication and the increasing of usage of portable computing devices, it is expected that mobile ad hoc networks are increasingly developed towards enhancing the flexibility, scalability and efficiency of communication technology. The wireless ad-hoc network is a collection of mobile nodes in which these nodes have the ability to connect each other without backbone infrastructure (i.e. infrastructure less). Although many studies have been done on the performance assessment of MANET routing protocols, there is a need for investigating the impact of traffic load on the performance of MANET in order to justify the use of some routing protocol in MANET. This study is one of the fewest that aims at proposing a new framework towards predicting and validating the results of future scenario using data mining techniques. The regression analysis is used as data mining method in the prediction of the future scenarios. Practically, two experiments with eight scenarios are conducted. The findings indicate that the network size and traffic loads are proportionally related to the throughput. However, the findings show that the network size is inversely related to the delay in case of medium FTP traffic, and proportionally related in case of high FTP traffic. The results also indicate that data mining approach specially regression is an effective approach towards the prediction of the future network behavior.
Authors and Affiliations
Kamal Moh’d Alhendawi
KNOWLEDGE MAPPING PROCESS MODEL FOR RISK MITIGATION IN SOFTWARE MANAGEMENT
As software organizations try to mitigate operational and technical risk that occurs when using software, there is need to develop a knowledge intensive system to assist team members in mitigating both operational and te...
FINGERPRINT WATERMARKING WITH TAMPER LOCALIZATION AND EXACT RECOVERY USING MULTI-LEVEL AUTHENTICATION
This paper presents the tamper localization and exact recovery using multi-level authentication in fingerprint watermarking. The proposed scheme will be detecting the tampered sector of fingerprint images when the waterm...
METAMODELLING APPROACH AND SOFTWARE TOOLS FOR PHYSICAL MODELLING AND SIMULATION
In computer science, metamodelling approach becomes more and more popular for the purpose of software systems development. In this paper, we discuss applicability of the metamodelling approach for development of software...
A SURVEY OF MEDICAL IMAGE PROCESSING TOOLS
A precise analysis of medical image is an important stage in the contouring phase throughout radiotherapy preparation. Medical images are mostly used as radiographic techniques in diagnosis, clinical studies and treatmen...
AN APPROACH TO INCREASE THE EFFECTIVENESS OF TLC VERIFICATION WITH RESPECT TO THE CONCURRENT STRUCTURE OF TLA+ SPECIFICATION
Modern approaches to distributed software systems engineering are tightly bounded with formal methods usage. The effective way of certain method application can leverage significant outcome, in terms of corresponding tim...