SlideShare uma empresa Scribd logo
1 de 27
Impromptu Idea in Respect
of Robotics
Communication
By Harshit Srivastava
A Historic Idea
• In star wars “The phantom of menace” we learned
one thing,
• The bad robots had centralized failure, and whole
army was useless when main controlling computer
was destroyed.
Solution
• So, for controlling of future robot a distributed
communication approach should be followed.
• The distributed approach requires a complex
management system, but gives robustness.
• But, the environment is unpredictable and can be
unplanned so, a cooperative mechanism is needed.
• One feature of store command and use it when
needed( Can be used for high latency)
• Prioritization.
• The next key thing is “Prediction.”
Note:
• Still, I believe the centralized and distributed
communication if can be combined where the
centralized system can be changed dynamically.
• Then, probability of failure will decrease
enormously.
Lets say!
RSU== Virtual Cloud RSU== Virtual Cloud
RSU== Virtual Cloud RSU== Virtual Cloud
Broadcast
*Safety message are priority, so they should be broadcasted
Lets say!(A more predictable)
RSU== Virtual Cloud RSU== Virtual Cloud
RSU== Virtual Cloud RSU== Virtual Cloud
Broadcast
*Safety message are priority, so they should be broadcasted
• So, in previous slide an approach towards creating a
temporary centralized network through distributed
system.
• Now, the problems are,
• How to determine super node(centralized node)
• If previous super node has failed how to create new or
find new super node.
Now we again look into the model
RSU== Virtual Cloud RSU== Virtual Cloud
RSU== Virtual Cloud RSU== Virtual Cloud
Broadcast
*Safety message are priority, so they should be broadcasted
Greedy Node
Greedy Node
Greedy Node
Greedy Node
• So, we can go through network science and say that if
the greedy node is present in a network the graph will
grow as scale free network.
• This scale free network has a can be said small-world
network. This network where the average shortest path
length between its nodes is very small compared to the
total number of nodes in the network.
• Average shortest path length which grows
proportionally to the logarithm of the number of nodes
of the network.
𝐿(𝑁) ∝ log(𝑁)
Prediction Approach
• So, for prediction approach two methods I think we can look into
• Through Jaccard Coefficient where the set of similarities is measured to
predict node.
• Another, method is through Hidden Markov Model(Markov process and
Markov chain).
• Since, for HMM state at discrete moment of timein basically
unknown, only physical event is observed, where the observation is
a probabilistic function of hidden state and can be characterized as,
• N, number of states in the model. The individual states can be denoted as
𝑠 = (𝑠1, 𝑠2 , 𝑠3 … . . , 𝑠 𝑁 )
• M, the number of distinct observation symbols. The individual symbols can
be denoted as O= {𝑜1, 𝑜2 , 𝑜3 … , 𝑜 𝑀 }
• The state transition probability matrix 𝐴 𝑁𝑋𝑀 = {𝑎𝑖𝑗}(1 ≤ 𝑗 ≤ 𝑁)
• The observation symbol probability matrix
𝐵 𝑁𝑋𝑀 = 𝑏𝑗𝑘 𝑤ℎ𝑒𝑟𝑒 𝑏𝑗𝑘 = 𝑃 𝑂 𝑘 𝑎𝑡 𝑡 𝑆𝑡 = 𝑠𝑗 , 𝑡 = 1,2. .
• The initial state distribution vector 𝜋 = {𝜋𝑖} where:
𝜋𝑖 = 𝑃 𝑆1 𝑠𝑖 , 1 ≤ 𝑖 ≤ 𝑁
• Where 𝑆𝑡 denotes the state space at 𝑡 time.
References
• Shahzad A.Malik,Madad Ali Shah, Shahid A.Khan,M.Jahanzeb, Umar Farooq and Adnan,
Performance Evaluation of IEEE 802.11p MAC Protocol for VANETs; Khan. Australian
Journal of Basic and Applied Sciences, 4(8): 4089-4098, 2010.
• Mir, Zeeshan Hameed, and Fethi Filali. "LTE and IEEE 802.11 p for vehicular networking: a
performance evaluation." EURASIP Journal on Wireless Communications and
Networking 2014.1 (2014): 1-15.
• Robert Gallager, “Stochastic Process and its application”
• Zhigang Wang, Lichuan LIU, “Protocols and applications of Ad-hoc robot wireless
communication networks: Overview”, International Journal of Intelligent Control and
Systems.
Thank you
• Let’ say we have any one of finite or countable
infinite states(𝑠1, 𝑠2, 𝑠3 … 𝑠 𝑛) and 𝜏 denote set of
states and is a state space of system for time=1,2,..T
• 𝑆𝑡 denotes the state space at 𝑡 time. Then first
order Markov chain prob. of the system 𝑆𝑡 at time 𝑡
and depends only on the previous state of 𝑡 − 1 as,
• Type equation here.
Drones Drones
Controlling Nodes
Controlling Nodes
Introduction through VANETS
• A vehicular Ad-Hoc Network (VANET) is a technology that
uses moving vehicles as nodes in a network to create a
mobile network.
• VANET turns every participating vehicle into a wireless
router or node, and in turn create a network with a wide
range.
Goal: Provide Road Safety
Challenges in V2V:
1.Relative speed
2.Anonymity
3.Changes in position
Case Study: As More vehicles and range increase in VANET
lead to reduce access prob. by 35%.[1]
Ideas that were floated
Future
Research
Scope
Vehicula
r Cloud
Mac
Layer
Protocol
Mobility
Model
Image
Processing
Fault
ToleranceVehicular
Cloud
Mac
Layer
Protocol
Mobility
Model
Routing
Algorithm
Design
So what we can choose?
• We can easily analyse that information hopping should be fast, so if
node is lost then next super node should be found for information
hopping, and that node should depend on prediction.
• So, what we can do, for prediction in network, Jaccard Coefficient for
predicting next super node.(jaccard algo can also be sued to refine data
and predicting the best node)
𝑠𝑐𝑜𝑟𝑒 𝑥, 𝑦 =
𝑠𝑒𝑡 𝑥 ∩ 𝑠𝑒𝑡 𝑦
𝑠𝑒𝑡 𝑥 ∪ 𝑠𝑒𝑡 𝑦
Or , 𝑠𝑐𝑜𝑟𝑒 𝑥, 𝑦 = 𝑙=1
∞
𝛽 𝑙
|𝑝𝑎𝑡ℎ𝑠 𝑥,𝑦
𝑙
|
• In which similarity of nodes are found.
• If we look this network in new aspect, we should try to model it as a
scale free network.
• Now, if there is a network and nodes, lets take a look in respect of
network science.
• In this the connectivity can easily be defined according to scale free
property.
• So, there should be a feature that can store
protocol commands and can restore when needed.
Is scale free relevant?
• Since we know, A small-world network is a network
where the average shortest path length between its
nodes is very small compared to the total number
of nodes in the network.
• Average shortest path length which grows
proportionally to the logarithm of the number of
nodes of the network.
𝐿(𝑁) ∝ log(𝑁)
Scale free has a special property, in which structure
of network remains same regardless of scale of
observation.
A(v,a) B(v’,a) C(v’’,a)
Now after t time B changes acceleration
• Since last slide shows the network connection of
different vehicles.
• To comprehend that, we have data grabber
nodes(cloud), super node.
• The problem here lies, if super node is dropped or
changed, which one to choose to hop information.
• Many, algorithms can be tried like short path and link
state, but all requires destination node and they
determine first path before sending the data.
• So, what we can choose?
• We know scale free have fault tolerant behaviour,
like if failure occurs in random and vast majority of
nodes have small degree, then most probably hub
will be safe.
• Another property of clustering coefficient which
decreases as node degree increases
What can this give?
• Can help us to define fast routing protocols in
which node changes quickly.
• This allows a vehicle to determine whether it is the
vehicle with the higher number of neighbours in
the network.
• Then this node vehicle can be utilized for
information hoping.
Future Delivery System.
• Last year Amazon has tested their drones to deliver
parcels.
• But, still, drone delivery system is at preliminary stage,
as still I believe proper ground is not prepared for there
control.
• For, me the main problem is like how to control these
drones when to deliver good for larger distance.
• So, I think this vehicular communication can indirectly
solve this in respect of virtual cloud control, in
delivering command with low latency.
One Future communication
• Brain to machine communication
• Brain machine interface can be said as neural
interface with computer.
• Brain machine communication can be used as
command , control and communicate with the
integrated systems
Lte for Vehicular Communication
Issues
• Coverage and mobility: This will rely only on nodes
organised by network infrastructure.
• Centralized architecture: It can not natively support
V2V, but require passing through infrastructure
nodes that should intercept and distribute.
• Channel and transport modes have problem.

Mais conteúdo relacionado

Mais procurados

Implementation of Spanning Tree Protocol using ns-3
Implementation of Spanning Tree Protocol using ns-3Implementation of Spanning Tree Protocol using ns-3
Implementation of Spanning Tree Protocol using ns-3Naishil Shah
 
Analysis of Cluster Based Anycast Routing Protocol for Wireless Sensor Network
Analysis of Cluster Based Anycast Routing Protocol for Wireless Sensor NetworkAnalysis of Cluster Based Anycast Routing Protocol for Wireless Sensor Network
Analysis of Cluster Based Anycast Routing Protocol for Wireless Sensor NetworkIJMER
 
Energy Efficient Power Failure Diagonisis For Wireless Network Using Random G...
Energy Efficient Power Failure Diagonisis For Wireless Network Using Random G...Energy Efficient Power Failure Diagonisis For Wireless Network Using Random G...
Energy Efficient Power Failure Diagonisis For Wireless Network Using Random G...idescitation
 
International Refereed Journal of Engineering and Science (IRJES)
International Refereed Journal of Engineering and Science (IRJES)International Refereed Journal of Engineering and Science (IRJES)
International Refereed Journal of Engineering and Science (IRJES)irjes
 
3D routing algorithm for sensor network in e-health
3D routing algorithm for sensor network in e-health3D routing algorithm for sensor network in e-health
3D routing algorithm for sensor network in e-healthVakhtang Mosidze
 
The Quality of the New Generator Sequence Improvent to Spread the Color Syste...
The Quality of the New Generator Sequence Improvent to Spread the Color Syste...The Quality of the New Generator Sequence Improvent to Spread the Color Syste...
The Quality of the New Generator Sequence Improvent to Spread the Color Syste...TELKOMNIKA JOURNAL
 
Redundant Actor Based Multi-Hole Healing System for Mobile Sensor Networks
Redundant Actor Based Multi-Hole Healing System for Mobile Sensor NetworksRedundant Actor Based Multi-Hole Healing System for Mobile Sensor Networks
Redundant Actor Based Multi-Hole Healing System for Mobile Sensor NetworksEditor IJCATR
 
Distributed Approach for Clock Synchronization in Wireless Sensor Network
Distributed Approach for Clock Synchronization in Wireless Sensor NetworkDistributed Approach for Clock Synchronization in Wireless Sensor Network
Distributed Approach for Clock Synchronization in Wireless Sensor NetworkEditor IJMTER
 
Performance security tradeoff in Robotic Mobile Wireless Ad hoc Networks
Performance security tradeoff in Robotic Mobile Wireless Ad hoc Networks Performance security tradeoff in Robotic Mobile Wireless Ad hoc Networks
Performance security tradeoff in Robotic Mobile Wireless Ad hoc Networks Muhammad Jawad Ikram
 
Hierarchical Temporal Memory for Real-time Anomaly Detection
Hierarchical Temporal Memory for Real-time Anomaly DetectionHierarchical Temporal Memory for Real-time Anomaly Detection
Hierarchical Temporal Memory for Real-time Anomaly DetectionIhor Bobak
 
Distribution of maximal clique size under
Distribution of maximal clique size underDistribution of maximal clique size under
Distribution of maximal clique size underijfcstjournal
 
Intrusion detection in heterogeneous network by multipath routing based toler...
Intrusion detection in heterogeneous network by multipath routing based toler...Intrusion detection in heterogeneous network by multipath routing based toler...
Intrusion detection in heterogeneous network by multipath routing based toler...eSAT Publishing House
 
Intrusion detection in heterogeneous network by multipath routing based toler...
Intrusion detection in heterogeneous network by multipath routing based toler...Intrusion detection in heterogeneous network by multipath routing based toler...
Intrusion detection in heterogeneous network by multipath routing based toler...eSAT Journals
 
A Survey of Convolutional Neural Networks
A Survey of Convolutional Neural NetworksA Survey of Convolutional Neural Networks
A Survey of Convolutional Neural NetworksRimzim Thube
 
Secure Data Collection in Wireless Sensor Networks using Randomized Dispersiv...
Secure Data Collection in Wireless Sensor Networks using Randomized Dispersiv...Secure Data Collection in Wireless Sensor Networks using Randomized Dispersiv...
Secure Data Collection in Wireless Sensor Networks using Randomized Dispersiv...IRJET Journal
 

Mais procurados (19)

Implementation of Spanning Tree Protocol using ns-3
Implementation of Spanning Tree Protocol using ns-3Implementation of Spanning Tree Protocol using ns-3
Implementation of Spanning Tree Protocol using ns-3
 
31
3131
31
 
Analysis of Cluster Based Anycast Routing Protocol for Wireless Sensor Network
Analysis of Cluster Based Anycast Routing Protocol for Wireless Sensor NetworkAnalysis of Cluster Based Anycast Routing Protocol for Wireless Sensor Network
Analysis of Cluster Based Anycast Routing Protocol for Wireless Sensor Network
 
Energy Efficient Power Failure Diagonisis For Wireless Network Using Random G...
Energy Efficient Power Failure Diagonisis For Wireless Network Using Random G...Energy Efficient Power Failure Diagonisis For Wireless Network Using Random G...
Energy Efficient Power Failure Diagonisis For Wireless Network Using Random G...
 
Routing
RoutingRouting
Routing
 
International Refereed Journal of Engineering and Science (IRJES)
International Refereed Journal of Engineering and Science (IRJES)International Refereed Journal of Engineering and Science (IRJES)
International Refereed Journal of Engineering and Science (IRJES)
 
3D routing algorithm for sensor network in e-health
3D routing algorithm for sensor network in e-health3D routing algorithm for sensor network in e-health
3D routing algorithm for sensor network in e-health
 
The Quality of the New Generator Sequence Improvent to Spread the Color Syste...
The Quality of the New Generator Sequence Improvent to Spread the Color Syste...The Quality of the New Generator Sequence Improvent to Spread the Color Syste...
The Quality of the New Generator Sequence Improvent to Spread the Color Syste...
 
Redundant Actor Based Multi-Hole Healing System for Mobile Sensor Networks
Redundant Actor Based Multi-Hole Healing System for Mobile Sensor NetworksRedundant Actor Based Multi-Hole Healing System for Mobile Sensor Networks
Redundant Actor Based Multi-Hole Healing System for Mobile Sensor Networks
 
Entanglement Distribution
Entanglement DistributionEntanglement Distribution
Entanglement Distribution
 
Distributed Approach for Clock Synchronization in Wireless Sensor Network
Distributed Approach for Clock Synchronization in Wireless Sensor NetworkDistributed Approach for Clock Synchronization in Wireless Sensor Network
Distributed Approach for Clock Synchronization in Wireless Sensor Network
 
Performance security tradeoff in Robotic Mobile Wireless Ad hoc Networks
Performance security tradeoff in Robotic Mobile Wireless Ad hoc Networks Performance security tradeoff in Robotic Mobile Wireless Ad hoc Networks
Performance security tradeoff in Robotic Mobile Wireless Ad hoc Networks
 
Hierarchical Temporal Memory for Real-time Anomaly Detection
Hierarchical Temporal Memory for Real-time Anomaly DetectionHierarchical Temporal Memory for Real-time Anomaly Detection
Hierarchical Temporal Memory for Real-time Anomaly Detection
 
Distribution of maximal clique size under
Distribution of maximal clique size underDistribution of maximal clique size under
Distribution of maximal clique size under
 
Intrusion detection in heterogeneous network by multipath routing based toler...
Intrusion detection in heterogeneous network by multipath routing based toler...Intrusion detection in heterogeneous network by multipath routing based toler...
Intrusion detection in heterogeneous network by multipath routing based toler...
 
Intrusion detection in heterogeneous network by multipath routing based toler...
Intrusion detection in heterogeneous network by multipath routing based toler...Intrusion detection in heterogeneous network by multipath routing based toler...
Intrusion detection in heterogeneous network by multipath routing based toler...
 
Resource management
Resource managementResource management
Resource management
 
A Survey of Convolutional Neural Networks
A Survey of Convolutional Neural NetworksA Survey of Convolutional Neural Networks
A Survey of Convolutional Neural Networks
 
Secure Data Collection in Wireless Sensor Networks using Randomized Dispersiv...
Secure Data Collection in Wireless Sensor Networks using Randomized Dispersiv...Secure Data Collection in Wireless Sensor Networks using Randomized Dispersiv...
Secure Data Collection in Wireless Sensor Networks using Randomized Dispersiv...
 

Destaque

Destaque (6)

Introduction to intel galileo board gen2
Introduction to intel galileo board gen2Introduction to intel galileo board gen2
Introduction to intel galileo board gen2
 
Baseband processor final rev
Baseband processor final revBaseband processor final rev
Baseband processor final rev
 
Stepper Motor
Stepper MotorStepper Motor
Stepper Motor
 
Synchronous motor drive
Synchronous motor driveSynchronous motor drive
Synchronous motor drive
 
Stepper motor
Stepper motorStepper motor
Stepper motor
 
Communication ppt
Communication pptCommunication ppt
Communication ppt
 

Semelhante a Impromptu ideas in respect of v2 v and other

Ballpark Figure Algorithms for Data Broadcast in Wireless Networks
Ballpark Figure Algorithms for Data Broadcast in Wireless NetworksBallpark Figure Algorithms for Data Broadcast in Wireless Networks
Ballpark Figure Algorithms for Data Broadcast in Wireless NetworksEditor IJCATR
 
Efficient algorithms for neighbor discovery in wireless networks
Efficient algorithms for neighbor discovery in wireless networksEfficient algorithms for neighbor discovery in wireless networks
Efficient algorithms for neighbor discovery in wireless networksJPINFOTECH JAYAPRAKASH
 
An efficient vertical handoff mechanism for future mobile network
An efficient vertical handoff mechanism for  future mobile networkAn efficient vertical handoff mechanism for  future mobile network
An efficient vertical handoff mechanism for future mobile networkBasil John
 
Congestion Control in Wireless Sensor Networks Using Genetic Algorithm
Congestion Control in Wireless Sensor Networks Using Genetic AlgorithmCongestion Control in Wireless Sensor Networks Using Genetic Algorithm
Congestion Control in Wireless Sensor Networks Using Genetic AlgorithmEditor IJCATR
 
Unit 5-Performance and Trafficmanagement.pptx
Unit 5-Performance and Trafficmanagement.pptxUnit 5-Performance and Trafficmanagement.pptx
Unit 5-Performance and Trafficmanagement.pptxABYTHOMAS46
 
A framework for routing performance analysis in delay tolerant networks with ...
A framework for routing performance analysis in delay tolerant networks with ...A framework for routing performance analysis in delay tolerant networks with ...
A framework for routing performance analysis in delay tolerant networks with ...JPINFOTECH JAYAPRAKASH
 
Efficient algorithms for neighbor discovery in wireless networks
Efficient algorithms for neighbor discovery in wireless networksEfficient algorithms for neighbor discovery in wireless networks
Efficient algorithms for neighbor discovery in wireless networksJPINFOTECH JAYAPRAKASH
 
performanceandtrafficmanagement-160328180107.pdf
performanceandtrafficmanagement-160328180107.pdfperformanceandtrafficmanagement-160328180107.pdf
performanceandtrafficmanagement-160328180107.pdfABYTHOMAS46
 
JPD1428 Multicast Capacity in MANET with Infrastructure Support
JPD1428  Multicast Capacity in MANET with Infrastructure SupportJPD1428  Multicast Capacity in MANET with Infrastructure Support
JPD1428 Multicast Capacity in MANET with Infrastructure Supportchennaijp
 
From Simulation to Online Gaming: the need for adaptive solutions
From Simulation to Online Gaming: the need for adaptive solutions From Simulation to Online Gaming: the need for adaptive solutions
From Simulation to Online Gaming: the need for adaptive solutions Gabriele D'Angelo
 
Computer Networks Lecture Notes
Computer Networks Lecture NotesComputer Networks Lecture Notes
Computer Networks Lecture NotesFellowBuddy.com
 
Transfer reliability and congestion control strategies in opportunistic netwo...
Transfer reliability and congestion control strategies in opportunistic netwo...Transfer reliability and congestion control strategies in opportunistic netwo...
Transfer reliability and congestion control strategies in opportunistic netwo...revathiyadavb
 
Producer consumer-problems
Producer consumer-problemsProducer consumer-problems
Producer consumer-problemsRichard Ashworth
 
Network layer new
Network layer newNetwork layer new
Network layer newreshmadayma
 
Analysis and reactive measures on the blackhole attack
Analysis and reactive measures on the blackhole attackAnalysis and reactive measures on the blackhole attack
Analysis and reactive measures on the blackhole attackJyotiVERMA176
 

Semelhante a Impromptu ideas in respect of v2 v and other (20)

Ballpark Figure Algorithms for Data Broadcast in Wireless Networks
Ballpark Figure Algorithms for Data Broadcast in Wireless NetworksBallpark Figure Algorithms for Data Broadcast in Wireless Networks
Ballpark Figure Algorithms for Data Broadcast in Wireless Networks
 
Efficient algorithms for neighbor discovery in wireless networks
Efficient algorithms for neighbor discovery in wireless networksEfficient algorithms for neighbor discovery in wireless networks
Efficient algorithms for neighbor discovery in wireless networks
 
An efficient vertical handoff mechanism for future mobile network
An efficient vertical handoff mechanism for  future mobile networkAn efficient vertical handoff mechanism for  future mobile network
An efficient vertical handoff mechanism for future mobile network
 
Congestion Control in Wireless Sensor Networks Using Genetic Algorithm
Congestion Control in Wireless Sensor Networks Using Genetic AlgorithmCongestion Control in Wireless Sensor Networks Using Genetic Algorithm
Congestion Control in Wireless Sensor Networks Using Genetic Algorithm
 
Unit 5-Performance and Trafficmanagement.pptx
Unit 5-Performance and Trafficmanagement.pptxUnit 5-Performance and Trafficmanagement.pptx
Unit 5-Performance and Trafficmanagement.pptx
 
Design and Development of Intelligent Navigation Control Systems for Autonomo...
Design and Development of Intelligent Navigation Control Systems for Autonomo...Design and Development of Intelligent Navigation Control Systems for Autonomo...
Design and Development of Intelligent Navigation Control Systems for Autonomo...
 
Aa04404164169
Aa04404164169Aa04404164169
Aa04404164169
 
A framework for routing performance analysis in delay tolerant networks with ...
A framework for routing performance analysis in delay tolerant networks with ...A framework for routing performance analysis in delay tolerant networks with ...
A framework for routing performance analysis in delay tolerant networks with ...
 
Network Layer
Network LayerNetwork Layer
Network Layer
 
Efficient algorithms for neighbor discovery in wireless networks
Efficient algorithms for neighbor discovery in wireless networksEfficient algorithms for neighbor discovery in wireless networks
Efficient algorithms for neighbor discovery in wireless networks
 
performanceandtrafficmanagement-160328180107.pdf
performanceandtrafficmanagement-160328180107.pdfperformanceandtrafficmanagement-160328180107.pdf
performanceandtrafficmanagement-160328180107.pdf
 
Performance and traffic management for WSNs
Performance and traffic management for WSNsPerformance and traffic management for WSNs
Performance and traffic management for WSNs
 
JPD1428 Multicast Capacity in MANET with Infrastructure Support
JPD1428  Multicast Capacity in MANET with Infrastructure SupportJPD1428  Multicast Capacity in MANET with Infrastructure Support
JPD1428 Multicast Capacity in MANET with Infrastructure Support
 
From Simulation to Online Gaming: the need for adaptive solutions
From Simulation to Online Gaming: the need for adaptive solutions From Simulation to Online Gaming: the need for adaptive solutions
From Simulation to Online Gaming: the need for adaptive solutions
 
Deep learning
Deep learningDeep learning
Deep learning
 
Computer Networks Lecture Notes
Computer Networks Lecture NotesComputer Networks Lecture Notes
Computer Networks Lecture Notes
 
Transfer reliability and congestion control strategies in opportunistic netwo...
Transfer reliability and congestion control strategies in opportunistic netwo...Transfer reliability and congestion control strategies in opportunistic netwo...
Transfer reliability and congestion control strategies in opportunistic netwo...
 
Producer consumer-problems
Producer consumer-problemsProducer consumer-problems
Producer consumer-problems
 
Network layer new
Network layer newNetwork layer new
Network layer new
 
Analysis and reactive measures on the blackhole attack
Analysis and reactive measures on the blackhole attackAnalysis and reactive measures on the blackhole attack
Analysis and reactive measures on the blackhole attack
 

Mais de Harshit Srivastava

Prediction approach in predicting next user choice
Prediction approach in predicting next user choicePrediction approach in predicting next user choice
Prediction approach in predicting next user choiceHarshit Srivastava
 
Scale free network Visualiuzation
Scale free network VisualiuzationScale free network Visualiuzation
Scale free network VisualiuzationHarshit Srivastava
 
Emic Effects on controlling automobile safety
Emic Effects on controlling automobile safety Emic Effects on controlling automobile safety
Emic Effects on controlling automobile safety Harshit Srivastava
 
Emic effects in radio frequency instruments
Emic effects in radio frequency instrumentsEmic effects in radio frequency instruments
Emic effects in radio frequency instrumentsHarshit Srivastava
 
Anti collision technology of crashless cars
Anti collision technology of crashless carsAnti collision technology of crashless cars
Anti collision technology of crashless carsHarshit Srivastava
 
Areva "Manufacturing of transformer, uses & it’s accessories"
Areva "Manufacturing of transformer, uses & it’s accessories"Areva "Manufacturing of transformer, uses & it’s accessories"
Areva "Manufacturing of transformer, uses & it’s accessories"Harshit Srivastava
 
Operating Systems As a Product
Operating Systems As a ProductOperating Systems As a Product
Operating Systems As a ProductHarshit Srivastava
 
Sora- A High Performance Baseband DSP Processor
Sora- A High Performance Baseband DSP ProcessorSora- A High Performance Baseband DSP Processor
Sora- A High Performance Baseband DSP ProcessorHarshit Srivastava
 

Mais de Harshit Srivastava (20)

Prediction approach in predicting next user choice
Prediction approach in predicting next user choicePrediction approach in predicting next user choice
Prediction approach in predicting next user choice
 
Introduction to equalization
Introduction to equalizationIntroduction to equalization
Introduction to equalization
 
Scale free network Visualiuzation
Scale free network VisualiuzationScale free network Visualiuzation
Scale free network Visualiuzation
 
TCP/ IP
TCP/ IP TCP/ IP
TCP/ IP
 
Emic Effects on controlling automobile safety
Emic Effects on controlling automobile safety Emic Effects on controlling automobile safety
Emic Effects on controlling automobile safety
 
Emic effects in radio frequency instruments
Emic effects in radio frequency instrumentsEmic effects in radio frequency instruments
Emic effects in radio frequency instruments
 
Vacuum circuit breaker
Vacuum circuit breakerVacuum circuit breaker
Vacuum circuit breaker
 
Rocket
RocketRocket
Rocket
 
Roboticsin army
Roboticsin armyRoboticsin army
Roboticsin army
 
Quark particles
Quark particlesQuark particles
Quark particles
 
Power system contingencies
Power system  contingenciesPower system  contingencies
Power system contingencies
 
Power plant technology
Power plant technologyPower plant technology
Power plant technology
 
Optical tweezers
Optical tweezersOptical tweezers
Optical tweezers
 
Nuclear technology
Nuclear technologyNuclear technology
Nuclear technology
 
E waste management in india
E  waste management in indiaE  waste management in india
E waste management in india
 
Carbon nanotubes
Carbon  nanotubesCarbon  nanotubes
Carbon nanotubes
 
Anti collision technology of crashless cars
Anti collision technology of crashless carsAnti collision technology of crashless cars
Anti collision technology of crashless cars
 
Areva "Manufacturing of transformer, uses & it’s accessories"
Areva "Manufacturing of transformer, uses & it’s accessories"Areva "Manufacturing of transformer, uses & it’s accessories"
Areva "Manufacturing of transformer, uses & it’s accessories"
 
Operating Systems As a Product
Operating Systems As a ProductOperating Systems As a Product
Operating Systems As a Product
 
Sora- A High Performance Baseband DSP Processor
Sora- A High Performance Baseband DSP ProcessorSora- A High Performance Baseband DSP Processor
Sora- A High Performance Baseband DSP Processor
 

Último

chapter 5.pptx: drainage and irrigation engineering
chapter 5.pptx: drainage and irrigation engineeringchapter 5.pptx: drainage and irrigation engineering
chapter 5.pptx: drainage and irrigation engineeringmulugeta48
 
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Bookingdharasingh5698
 
Unleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leapUnleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leapRishantSharmaFr
 
University management System project report..pdf
University management System project report..pdfUniversity management System project report..pdf
University management System project report..pdfKamal Acharya
 
UNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its PerformanceUNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its Performancesivaprakash250
 
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Bookingdharasingh5698
 
data_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdfdata_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdfJiananWang21
 
Work-Permit-Receiver-in-Saudi-Aramco.pptx
Work-Permit-Receiver-in-Saudi-Aramco.pptxWork-Permit-Receiver-in-Saudi-Aramco.pptx
Work-Permit-Receiver-in-Saudi-Aramco.pptxJuliansyahHarahap1
 
Bhosari ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready For ...
Bhosari ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready For ...Bhosari ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready For ...
Bhosari ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready For ...tanu pandey
 
Thermal Engineering Unit - I & II . ppt
Thermal Engineering  Unit - I & II . pptThermal Engineering  Unit - I & II . ppt
Thermal Engineering Unit - I & II . pptDineshKumar4165
 
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXssuser89054b
 
Design For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the startDesign For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the startQuintin Balsdon
 
COST-EFFETIVE and Energy Efficient BUILDINGS ptx
COST-EFFETIVE  and Energy Efficient BUILDINGS ptxCOST-EFFETIVE  and Energy Efficient BUILDINGS ptx
COST-EFFETIVE and Energy Efficient BUILDINGS ptxJIT KUMAR GUPTA
 
Introduction to Serverless with AWS Lambda
Introduction to Serverless with AWS LambdaIntroduction to Serverless with AWS Lambda
Introduction to Serverless with AWS LambdaOmar Fathy
 
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...Arindam Chakraborty, Ph.D., P.E. (CA, TX)
 
Thermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - VThermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - VDineshKumar4165
 
Unit 1 - Soil Classification and Compaction.pdf
Unit 1 - Soil Classification and Compaction.pdfUnit 1 - Soil Classification and Compaction.pdf
Unit 1 - Soil Classification and Compaction.pdfRagavanV2
 
A Study of Urban Area Plan for Pabna Municipality
A Study of Urban Area Plan for Pabna MunicipalityA Study of Urban Area Plan for Pabna Municipality
A Study of Urban Area Plan for Pabna MunicipalityMorshed Ahmed Rahath
 

Último (20)

chapter 5.pptx: drainage and irrigation engineering
chapter 5.pptx: drainage and irrigation engineeringchapter 5.pptx: drainage and irrigation engineering
chapter 5.pptx: drainage and irrigation engineering
 
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
 
Unleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leapUnleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leap
 
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak HamilCara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
 
University management System project report..pdf
University management System project report..pdfUniversity management System project report..pdf
University management System project report..pdf
 
UNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its PerformanceUNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its Performance
 
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
 
data_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdfdata_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdf
 
Water Industry Process Automation & Control Monthly - April 2024
Water Industry Process Automation & Control Monthly - April 2024Water Industry Process Automation & Control Monthly - April 2024
Water Industry Process Automation & Control Monthly - April 2024
 
Work-Permit-Receiver-in-Saudi-Aramco.pptx
Work-Permit-Receiver-in-Saudi-Aramco.pptxWork-Permit-Receiver-in-Saudi-Aramco.pptx
Work-Permit-Receiver-in-Saudi-Aramco.pptx
 
Bhosari ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready For ...
Bhosari ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready For ...Bhosari ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready For ...
Bhosari ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready For ...
 
Thermal Engineering Unit - I & II . ppt
Thermal Engineering  Unit - I & II . pptThermal Engineering  Unit - I & II . ppt
Thermal Engineering Unit - I & II . ppt
 
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
 
Design For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the startDesign For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the start
 
COST-EFFETIVE and Energy Efficient BUILDINGS ptx
COST-EFFETIVE  and Energy Efficient BUILDINGS ptxCOST-EFFETIVE  and Energy Efficient BUILDINGS ptx
COST-EFFETIVE and Energy Efficient BUILDINGS ptx
 
Introduction to Serverless with AWS Lambda
Introduction to Serverless with AWS LambdaIntroduction to Serverless with AWS Lambda
Introduction to Serverless with AWS Lambda
 
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
 
Thermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - VThermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - V
 
Unit 1 - Soil Classification and Compaction.pdf
Unit 1 - Soil Classification and Compaction.pdfUnit 1 - Soil Classification and Compaction.pdf
Unit 1 - Soil Classification and Compaction.pdf
 
A Study of Urban Area Plan for Pabna Municipality
A Study of Urban Area Plan for Pabna MunicipalityA Study of Urban Area Plan for Pabna Municipality
A Study of Urban Area Plan for Pabna Municipality
 

Impromptu ideas in respect of v2 v and other

  • 1. Impromptu Idea in Respect of Robotics Communication By Harshit Srivastava
  • 2. A Historic Idea • In star wars “The phantom of menace” we learned one thing, • The bad robots had centralized failure, and whole army was useless when main controlling computer was destroyed.
  • 3. Solution • So, for controlling of future robot a distributed communication approach should be followed. • The distributed approach requires a complex management system, but gives robustness. • But, the environment is unpredictable and can be unplanned so, a cooperative mechanism is needed. • One feature of store command and use it when needed( Can be used for high latency) • Prioritization. • The next key thing is “Prediction.”
  • 4. Note: • Still, I believe the centralized and distributed communication if can be combined where the centralized system can be changed dynamically. • Then, probability of failure will decrease enormously.
  • 5. Lets say! RSU== Virtual Cloud RSU== Virtual Cloud RSU== Virtual Cloud RSU== Virtual Cloud Broadcast *Safety message are priority, so they should be broadcasted
  • 6. Lets say!(A more predictable) RSU== Virtual Cloud RSU== Virtual Cloud RSU== Virtual Cloud RSU== Virtual Cloud Broadcast *Safety message are priority, so they should be broadcasted
  • 7. • So, in previous slide an approach towards creating a temporary centralized network through distributed system. • Now, the problems are, • How to determine super node(centralized node) • If previous super node has failed how to create new or find new super node.
  • 8. Now we again look into the model RSU== Virtual Cloud RSU== Virtual Cloud RSU== Virtual Cloud RSU== Virtual Cloud Broadcast *Safety message are priority, so they should be broadcasted Greedy Node Greedy Node Greedy Node Greedy Node
  • 9. • So, we can go through network science and say that if the greedy node is present in a network the graph will grow as scale free network. • This scale free network has a can be said small-world network. This network where the average shortest path length between its nodes is very small compared to the total number of nodes in the network. • Average shortest path length which grows proportionally to the logarithm of the number of nodes of the network. 𝐿(𝑁) ∝ log(𝑁)
  • 10. Prediction Approach • So, for prediction approach two methods I think we can look into • Through Jaccard Coefficient where the set of similarities is measured to predict node. • Another, method is through Hidden Markov Model(Markov process and Markov chain). • Since, for HMM state at discrete moment of timein basically unknown, only physical event is observed, where the observation is a probabilistic function of hidden state and can be characterized as, • N, number of states in the model. The individual states can be denoted as 𝑠 = (𝑠1, 𝑠2 , 𝑠3 … . . , 𝑠 𝑁 ) • M, the number of distinct observation symbols. The individual symbols can be denoted as O= {𝑜1, 𝑜2 , 𝑜3 … , 𝑜 𝑀 } • The state transition probability matrix 𝐴 𝑁𝑋𝑀 = {𝑎𝑖𝑗}(1 ≤ 𝑗 ≤ 𝑁) • The observation symbol probability matrix 𝐵 𝑁𝑋𝑀 = 𝑏𝑗𝑘 𝑤ℎ𝑒𝑟𝑒 𝑏𝑗𝑘 = 𝑃 𝑂 𝑘 𝑎𝑡 𝑡 𝑆𝑡 = 𝑠𝑗 , 𝑡 = 1,2. . • The initial state distribution vector 𝜋 = {𝜋𝑖} where: 𝜋𝑖 = 𝑃 𝑆1 𝑠𝑖 , 1 ≤ 𝑖 ≤ 𝑁 • Where 𝑆𝑡 denotes the state space at 𝑡 time.
  • 11. References • Shahzad A.Malik,Madad Ali Shah, Shahid A.Khan,M.Jahanzeb, Umar Farooq and Adnan, Performance Evaluation of IEEE 802.11p MAC Protocol for VANETs; Khan. Australian Journal of Basic and Applied Sciences, 4(8): 4089-4098, 2010. • Mir, Zeeshan Hameed, and Fethi Filali. "LTE and IEEE 802.11 p for vehicular networking: a performance evaluation." EURASIP Journal on Wireless Communications and Networking 2014.1 (2014): 1-15. • Robert Gallager, “Stochastic Process and its application” • Zhigang Wang, Lichuan LIU, “Protocols and applications of Ad-hoc robot wireless communication networks: Overview”, International Journal of Intelligent Control and Systems.
  • 13. • Let’ say we have any one of finite or countable infinite states(𝑠1, 𝑠2, 𝑠3 … 𝑠 𝑛) and 𝜏 denote set of states and is a state space of system for time=1,2,..T • 𝑆𝑡 denotes the state space at 𝑡 time. Then first order Markov chain prob. of the system 𝑆𝑡 at time 𝑡 and depends only on the previous state of 𝑡 − 1 as, • Type equation here.
  • 15. Introduction through VANETS • A vehicular Ad-Hoc Network (VANET) is a technology that uses moving vehicles as nodes in a network to create a mobile network. • VANET turns every participating vehicle into a wireless router or node, and in turn create a network with a wide range. Goal: Provide Road Safety Challenges in V2V: 1.Relative speed 2.Anonymity 3.Changes in position Case Study: As More vehicles and range increase in VANET lead to reduce access prob. by 35%.[1]
  • 16. Ideas that were floated Future Research Scope Vehicula r Cloud Mac Layer Protocol Mobility Model Image Processing Fault ToleranceVehicular Cloud Mac Layer Protocol Mobility Model Routing Algorithm Design
  • 17. So what we can choose? • We can easily analyse that information hopping should be fast, so if node is lost then next super node should be found for information hopping, and that node should depend on prediction. • So, what we can do, for prediction in network, Jaccard Coefficient for predicting next super node.(jaccard algo can also be sued to refine data and predicting the best node) 𝑠𝑐𝑜𝑟𝑒 𝑥, 𝑦 = 𝑠𝑒𝑡 𝑥 ∩ 𝑠𝑒𝑡 𝑦 𝑠𝑒𝑡 𝑥 ∪ 𝑠𝑒𝑡 𝑦 Or , 𝑠𝑐𝑜𝑟𝑒 𝑥, 𝑦 = 𝑙=1 ∞ 𝛽 𝑙 |𝑝𝑎𝑡ℎ𝑠 𝑥,𝑦 𝑙 | • In which similarity of nodes are found. • If we look this network in new aspect, we should try to model it as a scale free network. • Now, if there is a network and nodes, lets take a look in respect of network science. • In this the connectivity can easily be defined according to scale free property.
  • 18. • So, there should be a feature that can store protocol commands and can restore when needed.
  • 19. Is scale free relevant? • Since we know, A small-world network is a network where the average shortest path length between its nodes is very small compared to the total number of nodes in the network. • Average shortest path length which grows proportionally to the logarithm of the number of nodes of the network. 𝐿(𝑁) ∝ log(𝑁) Scale free has a special property, in which structure of network remains same regardless of scale of observation.
  • 20. A(v,a) B(v’,a) C(v’’,a) Now after t time B changes acceleration
  • 21. • Since last slide shows the network connection of different vehicles. • To comprehend that, we have data grabber nodes(cloud), super node. • The problem here lies, if super node is dropped or changed, which one to choose to hop information. • Many, algorithms can be tried like short path and link state, but all requires destination node and they determine first path before sending the data. • So, what we can choose?
  • 22. • We know scale free have fault tolerant behaviour, like if failure occurs in random and vast majority of nodes have small degree, then most probably hub will be safe. • Another property of clustering coefficient which decreases as node degree increases
  • 23. What can this give? • Can help us to define fast routing protocols in which node changes quickly. • This allows a vehicle to determine whether it is the vehicle with the higher number of neighbours in the network. • Then this node vehicle can be utilized for information hoping.
  • 24. Future Delivery System. • Last year Amazon has tested their drones to deliver parcels. • But, still, drone delivery system is at preliminary stage, as still I believe proper ground is not prepared for there control. • For, me the main problem is like how to control these drones when to deliver good for larger distance. • So, I think this vehicular communication can indirectly solve this in respect of virtual cloud control, in delivering command with low latency.
  • 25. One Future communication • Brain to machine communication • Brain machine interface can be said as neural interface with computer. • Brain machine communication can be used as command , control and communicate with the integrated systems
  • 26. Lte for Vehicular Communication
  • 27. Issues • Coverage and mobility: This will rely only on nodes organised by network infrastructure. • Centralized architecture: It can not natively support V2V, but require passing through infrastructure nodes that should intercept and distribute. • Channel and transport modes have problem.

Notas do Editor

  1. Given present state past history does not affect conditional prob. of events defined in the future and markov chain are discrete parameter of markov process whse state space is finite or infinite.