SlideShare ist ein Scribd-Unternehmen logo
1 von 28
Synergy Between  MANET And Biological Swarm Systems Arunabh Mishra Sikkim Manipal Institute Of Technology
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Swarm Intelligence ,[object Object],[object Object]
Biological Swarm Systems ,[object Object],[object Object],[object Object],[object Object]
1.  Nest building in termite or honeybee societies   Biological Swarm Systems
2. Foraging in ant colonies   Biological Swarm Systems
3. Fish Schooling   Biological Swarm Systems
4. Bird Flocking in V formation  Biological Swarm Systems
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],What is common in these behaviours?
Example : Ant System ,[object Object],[object Object],[object Object],[object Object]
Example: A bee hive ,[object Object],[object Object],[object Object]
Mobile Ad Hoc Network(MANET ) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Existing routing protocols   ,[object Object],[object Object],[object Object],[object Object]
Routing protocols ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Problem with traditional routing ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
What is a swarm based routing? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Swarm based communication network model  ,[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Network Modelling TX B RX C D E A
Routing table for a  node ‘E’ PREVIOUS  NODES BIT ERROR RATE (Ht) PACKET DELAY (H σ ) Y=  Ht* H σ   B C D 0.4 0.2 0.3 0.55 0.30 0.40 0.22 0.06 0.12
THREE INTERMEDIATE NODES  TWO INTERMEDIATE NODE  B A TX RX B C A TX RX
Node dependent path calculation NUMBER  OF  INTERMEDIATE  NODES NODES IN PATH POSSIBLE  PATHS 1 2 3 1 2 1,2,3 1 2 3,6,2
Advantages Of Swarm based routing ,[object Object],[object Object],[object Object],[object Object]
LIMITATIONS ,[object Object],[object Object],[object Object],[object Object]
CONCLUSION ,[object Object],[object Object],[object Object],[object Object]
Dumb parts, properly connected into a swarm, yield smart results. Kevin Kelly
Thank You

Weitere ähnliche Inhalte

Was ist angesagt?

Issues in optimizing the performance of wireless sensor networks
Issues in optimizing the performance of wireless sensor networksIssues in optimizing the performance of wireless sensor networks
Issues in optimizing the performance of wireless sensor networkseSAT Publishing House
 
Routing protocolsin Wireless sensor network
Routing protocolsin Wireless sensor network Routing protocolsin Wireless sensor network
Routing protocolsin Wireless sensor network dilip pareek
 
Routing protocol on wireless sensor network
Routing protocol on wireless sensor networkRouting protocol on wireless sensor network
Routing protocol on wireless sensor networkshashankcsnits
 
Qos aware routing protocol for wsn
Qos aware routing protocol for wsnQos aware routing protocol for wsn
Qos aware routing protocol for wsnKamal Patel
 
Basic Architecture of Wireless Sensor Network
Basic Architecture of Wireless Sensor NetworkBasic Architecture of Wireless Sensor Network
Basic Architecture of Wireless Sensor NetworkKarthik
 
International journal of computer science and innovation vol 2015-n1-paper5
International journal of computer science and innovation  vol 2015-n1-paper5International journal of computer science and innovation  vol 2015-n1-paper5
International journal of computer science and innovation vol 2015-n1-paper5sophiabelthome
 
Attacks in MANET
Attacks in MANETAttacks in MANET
Attacks in MANETSunita Sahu
 
TIME SYNCHRONIZATION IN WIRELESS SENSOR NETWORKS: A SURVEY
 TIME SYNCHRONIZATION IN WIRELESS SENSOR NETWORKS: A SURVEY TIME SYNCHRONIZATION IN WIRELESS SENSOR NETWORKS: A SURVEY
TIME SYNCHRONIZATION IN WIRELESS SENSOR NETWORKS: A SURVEYijujournal
 
Survey paper on Detecting Blackhole Attack by different Approaches and its Co...
Survey paper on Detecting Blackhole Attack by different Approaches and its Co...Survey paper on Detecting Blackhole Attack by different Approaches and its Co...
Survey paper on Detecting Blackhole Attack by different Approaches and its Co...IJARIIE JOURNAL
 
PERUSAL OF INTRUSION DETECTION AND PREVENTION SYSTEM ON A MANET WITH BLACK HO...
PERUSAL OF INTRUSION DETECTION AND PREVENTION SYSTEM ON A MANET WITH BLACK HO...PERUSAL OF INTRUSION DETECTION AND PREVENTION SYSTEM ON A MANET WITH BLACK HO...
PERUSAL OF INTRUSION DETECTION AND PREVENTION SYSTEM ON A MANET WITH BLACK HO...ijsptm
 
Wireless Sensor Networks LEACH & EDEEC
Wireless Sensor Networks LEACH & EDEECWireless Sensor Networks LEACH & EDEEC
Wireless Sensor Networks LEACH & EDEECYogesh Fulara
 
Multiagent based multipath routing in wireless sensor networks
Multiagent based multipath routing in wireless sensor networksMultiagent based multipath routing in wireless sensor networks
Multiagent based multipath routing in wireless sensor networksijwmn
 
Analyzing the Impact of Eaves on Energy Consumption of AODV Routing Protocol ...
Analyzing the Impact of Eaves on Energy Consumption of AODV Routing Protocol ...Analyzing the Impact of Eaves on Energy Consumption of AODV Routing Protocol ...
Analyzing the Impact of Eaves on Energy Consumption of AODV Routing Protocol ...ijwmn
 
Various Security Attacks in mobile ad hoc networks
Various Security Attacks in mobile ad hoc networksVarious Security Attacks in mobile ad hoc networks
Various Security Attacks in mobile ad hoc networksKishan Patel
 
DATA TRANSMISSION IN WIRELESS SENSOR NETWORKS FOR EFFECTIVE AND SECURE COMMUN...
DATA TRANSMISSION IN WIRELESS SENSOR NETWORKS FOR EFFECTIVE AND SECURE COMMUN...DATA TRANSMISSION IN WIRELESS SENSOR NETWORKS FOR EFFECTIVE AND SECURE COMMUN...
DATA TRANSMISSION IN WIRELESS SENSOR NETWORKS FOR EFFECTIVE AND SECURE COMMUN...IJEEE
 

Was ist angesagt? (19)

Manet
ManetManet
Manet
 
Routing Protocols in WSN
Routing Protocols in WSNRouting Protocols in WSN
Routing Protocols in WSN
 
Issues in optimizing the performance of wireless sensor networks
Issues in optimizing the performance of wireless sensor networksIssues in optimizing the performance of wireless sensor networks
Issues in optimizing the performance of wireless sensor networks
 
Routing protocolsin Wireless sensor network
Routing protocolsin Wireless sensor network Routing protocolsin Wireless sensor network
Routing protocolsin Wireless sensor network
 
Routing protocol on wireless sensor network
Routing protocol on wireless sensor networkRouting protocol on wireless sensor network
Routing protocol on wireless sensor network
 
Qos aware routing protocol for wsn
Qos aware routing protocol for wsnQos aware routing protocol for wsn
Qos aware routing protocol for wsn
 
Basic Architecture of Wireless Sensor Network
Basic Architecture of Wireless Sensor NetworkBasic Architecture of Wireless Sensor Network
Basic Architecture of Wireless Sensor Network
 
International journal of computer science and innovation vol 2015-n1-paper5
International journal of computer science and innovation  vol 2015-n1-paper5International journal of computer science and innovation  vol 2015-n1-paper5
International journal of computer science and innovation vol 2015-n1-paper5
 
Attacks in MANET
Attacks in MANETAttacks in MANET
Attacks in MANET
 
Thesis on Mobile Ad-hoc Network (MANET)
Thesis on Mobile Ad-hoc Network (MANET) Thesis on Mobile Ad-hoc Network (MANET)
Thesis on Mobile Ad-hoc Network (MANET)
 
TIME SYNCHRONIZATION IN WIRELESS SENSOR NETWORKS: A SURVEY
 TIME SYNCHRONIZATION IN WIRELESS SENSOR NETWORKS: A SURVEY TIME SYNCHRONIZATION IN WIRELESS SENSOR NETWORKS: A SURVEY
TIME SYNCHRONIZATION IN WIRELESS SENSOR NETWORKS: A SURVEY
 
Survey paper on Detecting Blackhole Attack by different Approaches and its Co...
Survey paper on Detecting Blackhole Attack by different Approaches and its Co...Survey paper on Detecting Blackhole Attack by different Approaches and its Co...
Survey paper on Detecting Blackhole Attack by different Approaches and its Co...
 
PERUSAL OF INTRUSION DETECTION AND PREVENTION SYSTEM ON A MANET WITH BLACK HO...
PERUSAL OF INTRUSION DETECTION AND PREVENTION SYSTEM ON A MANET WITH BLACK HO...PERUSAL OF INTRUSION DETECTION AND PREVENTION SYSTEM ON A MANET WITH BLACK HO...
PERUSAL OF INTRUSION DETECTION AND PREVENTION SYSTEM ON A MANET WITH BLACK HO...
 
Wireless Sensor Networks LEACH & EDEEC
Wireless Sensor Networks LEACH & EDEECWireless Sensor Networks LEACH & EDEEC
Wireless Sensor Networks LEACH & EDEEC
 
Multiagent based multipath routing in wireless sensor networks
Multiagent based multipath routing in wireless sensor networksMultiagent based multipath routing in wireless sensor networks
Multiagent based multipath routing in wireless sensor networks
 
Analyzing the Impact of Eaves on Energy Consumption of AODV Routing Protocol ...
Analyzing the Impact of Eaves on Energy Consumption of AODV Routing Protocol ...Analyzing the Impact of Eaves on Energy Consumption of AODV Routing Protocol ...
Analyzing the Impact of Eaves on Energy Consumption of AODV Routing Protocol ...
 
Various Security Attacks in mobile ad hoc networks
Various Security Attacks in mobile ad hoc networksVarious Security Attacks in mobile ad hoc networks
Various Security Attacks in mobile ad hoc networks
 
DATA TRANSMISSION IN WIRELESS SENSOR NETWORKS FOR EFFECTIVE AND SECURE COMMUN...
DATA TRANSMISSION IN WIRELESS SENSOR NETWORKS FOR EFFECTIVE AND SECURE COMMUN...DATA TRANSMISSION IN WIRELESS SENSOR NETWORKS FOR EFFECTIVE AND SECURE COMMUN...
DATA TRANSMISSION IN WIRELESS SENSOR NETWORKS FOR EFFECTIVE AND SECURE COMMUN...
 
WSN presentation
WSN presentationWSN presentation
WSN presentation
 

Ähnlich wie Synergy between manet and biological swarm systems

Optimal Data Collection from a Network using Probability Collectives (Swarm B...
Optimal Data Collection from a Network using Probability Collectives (Swarm B...Optimal Data Collection from a Network using Probability Collectives (Swarm B...
Optimal Data Collection from a Network using Probability Collectives (Swarm B...IJRES Journal
 
STUDY AND PERFORMANCE EVALUATION OF ANTHOCNET AND BEEHOCNET NATURE INSPIRED M...
STUDY AND PERFORMANCE EVALUATION OF ANTHOCNET AND BEEHOCNET NATURE INSPIRED M...STUDY AND PERFORMANCE EVALUATION OF ANTHOCNET AND BEEHOCNET NATURE INSPIRED M...
STUDY AND PERFORMANCE EVALUATION OF ANTHOCNET AND BEEHOCNET NATURE INSPIRED M...IAEME Publication
 
A NALYSIS OF ANTHOCNET AND AODV P ERFORMANCE USING NS2
A NALYSIS OF  ANTHOCNET  AND  AODV P ERFORMANCE USING  NS2 A NALYSIS OF  ANTHOCNET  AND  AODV P ERFORMANCE USING  NS2
A NALYSIS OF ANTHOCNET AND AODV P ERFORMANCE USING NS2 IJCI JOURNAL
 
Various Metaheuristic algorithms For Securing VANET
Various Metaheuristic algorithms For Securing VANETVarious Metaheuristic algorithms For Securing VANET
Various Metaheuristic algorithms For Securing VANETKishan Patel
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)IJERD Editor
 
Ai presentation
Ai presentationAi presentation
Ai presentationvini89
 
PERFORMANCE ANALYSIS OF ANTHOCNET ROUTING PROTOCOL FOR HYBRID AD HOC NETWORK
PERFORMANCE ANALYSIS OF ANTHOCNET ROUTING PROTOCOL FOR HYBRID AD HOC NETWORKPERFORMANCE ANALYSIS OF ANTHOCNET ROUTING PROTOCOL FOR HYBRID AD HOC NETWORK
PERFORMANCE ANALYSIS OF ANTHOCNET ROUTING PROTOCOL FOR HYBRID AD HOC NETWORKKhushbooGupta145
 
ANTHOCNET HYBRID ROUTING ALGORITHM FOR MANET USING SWARM TECHNOLOGY
ANTHOCNET HYBRID ROUTING ALGORITHM FOR MANET  USING SWARM TECHNOLOGYANTHOCNET HYBRID ROUTING ALGORITHM FOR MANET  USING SWARM TECHNOLOGY
ANTHOCNET HYBRID ROUTING ALGORITHM FOR MANET USING SWARM TECHNOLOGYSrinivas Vasamsetti
 
An Energy-Efficient Min-Max Optimization with RSA Security in Wireless Sensor...
An Energy-Efficient Min-Max Optimization with RSA Security in Wireless Sensor...An Energy-Efficient Min-Max Optimization with RSA Security in Wireless Sensor...
An Energy-Efficient Min-Max Optimization with RSA Security in Wireless Sensor...IJMTST Journal
 

Ähnlich wie Synergy between manet and biological swarm systems (20)

Seminar
SeminarSeminar
Seminar
 
Optimal Data Collection from a Network using Probability Collectives (Swarm B...
Optimal Data Collection from a Network using Probability Collectives (Swarm B...Optimal Data Collection from a Network using Probability Collectives (Swarm B...
Optimal Data Collection from a Network using Probability Collectives (Swarm B...
 
N017318992
N017318992N017318992
N017318992
 
STUDY AND PERFORMANCE EVALUATION OF ANTHOCNET AND BEEHOCNET NATURE INSPIRED M...
STUDY AND PERFORMANCE EVALUATION OF ANTHOCNET AND BEEHOCNET NATURE INSPIRED M...STUDY AND PERFORMANCE EVALUATION OF ANTHOCNET AND BEEHOCNET NATURE INSPIRED M...
STUDY AND PERFORMANCE EVALUATION OF ANTHOCNET AND BEEHOCNET NATURE INSPIRED M...
 
102 104
102 104102 104
102 104
 
A NALYSIS OF ANTHOCNET AND AODV P ERFORMANCE USING NS2
A NALYSIS OF  ANTHOCNET  AND  AODV P ERFORMANCE USING  NS2 A NALYSIS OF  ANTHOCNET  AND  AODV P ERFORMANCE USING  NS2
A NALYSIS OF ANTHOCNET AND AODV P ERFORMANCE USING NS2
 
F0943236
F0943236F0943236
F0943236
 
13 48-1-pb
13 48-1-pb13 48-1-pb
13 48-1-pb
 
E0942531
E0942531E0942531
E0942531
 
Various Metaheuristic algorithms For Securing VANET
Various Metaheuristic algorithms For Securing VANETVarious Metaheuristic algorithms For Securing VANET
Various Metaheuristic algorithms For Securing VANET
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
 
Ai presentation
Ai presentationAi presentation
Ai presentation
 
I010525057
I010525057I010525057
I010525057
 
PERFORMANCE ANALYSIS OF ANTHOCNET ROUTING PROTOCOL FOR HYBRID AD HOC NETWORK
PERFORMANCE ANALYSIS OF ANTHOCNET ROUTING PROTOCOL FOR HYBRID AD HOC NETWORKPERFORMANCE ANALYSIS OF ANTHOCNET ROUTING PROTOCOL FOR HYBRID AD HOC NETWORK
PERFORMANCE ANALYSIS OF ANTHOCNET ROUTING PROTOCOL FOR HYBRID AD HOC NETWORK
 
Ant
AntAnt
Ant
 
Secure and Efficient Transmission Using Jammer and Relay Networks
Secure and Efficient Transmission Using Jammer and Relay NetworksSecure and Efficient Transmission Using Jammer and Relay Networks
Secure and Efficient Transmission Using Jammer and Relay Networks
 
ANTHOCNET HYBRID ROUTING ALGORITHM FOR MANET USING SWARM TECHNOLOGY
ANTHOCNET HYBRID ROUTING ALGORITHM FOR MANET  USING SWARM TECHNOLOGYANTHOCNET HYBRID ROUTING ALGORITHM FOR MANET  USING SWARM TECHNOLOGY
ANTHOCNET HYBRID ROUTING ALGORITHM FOR MANET USING SWARM TECHNOLOGY
 
Secure routing Adhoc Networks
Secure routing Adhoc NetworksSecure routing Adhoc Networks
Secure routing Adhoc Networks
 
An Energy-Efficient Min-Max Optimization with RSA Security in Wireless Sensor...
An Energy-Efficient Min-Max Optimization with RSA Security in Wireless Sensor...An Energy-Efficient Min-Max Optimization with RSA Security in Wireless Sensor...
An Energy-Efficient Min-Max Optimization with RSA Security in Wireless Sensor...
 
3. WIRELESS_PROTOCOLS.pptx
3. WIRELESS_PROTOCOLS.pptx3. WIRELESS_PROTOCOLS.pptx
3. WIRELESS_PROTOCOLS.pptx
 

Mehr von Arunabh Mishra

Credex : Credit Score for Web 3.0
Credex : Credit Score for Web 3.0Credex : Credit Score for Web 3.0
Credex : Credit Score for Web 3.0Arunabh Mishra
 
Connect me proximity based mobile marketing
Connect me   proximity based mobile marketing Connect me   proximity based mobile marketing
Connect me proximity based mobile marketing Arunabh Mishra
 
9 ways to enhance your focus
9 ways to enhance your focus9 ways to enhance your focus
9 ways to enhance your focusArunabh Mishra
 
Proxibity - proximity based payments
Proxibity - proximity based payments Proxibity - proximity based payments
Proxibity - proximity based payments Arunabh Mishra
 
Fluxcharge - wireless chargers for mobile robotics
Fluxcharge - wireless chargers for mobile roboticsFluxcharge - wireless chargers for mobile robotics
Fluxcharge - wireless chargers for mobile roboticsArunabh Mishra
 
Gammagraphics Case Study
Gammagraphics Case StudyGammagraphics Case Study
Gammagraphics Case StudyArunabh Mishra
 
IEEE 802.11s - Wireless Mesh Network
IEEE 802.11s - Wireless Mesh NetworkIEEE 802.11s - Wireless Mesh Network
IEEE 802.11s - Wireless Mesh NetworkArunabh Mishra
 

Mehr von Arunabh Mishra (10)

Credex : Credit Score for Web 3.0
Credex : Credit Score for Web 3.0Credex : Credit Score for Web 3.0
Credex : Credit Score for Web 3.0
 
Connect me proximity based mobile marketing
Connect me   proximity based mobile marketing Connect me   proximity based mobile marketing
Connect me proximity based mobile marketing
 
Coffee 101
Coffee 101Coffee 101
Coffee 101
 
9 ways to enhance your focus
9 ways to enhance your focus9 ways to enhance your focus
9 ways to enhance your focus
 
What is ai ?
What is ai ?What is ai ?
What is ai ?
 
Proxibity - proximity based payments
Proxibity - proximity based payments Proxibity - proximity based payments
Proxibity - proximity based payments
 
Fluxcharge - wireless chargers for mobile robotics
Fluxcharge - wireless chargers for mobile roboticsFluxcharge - wireless chargers for mobile robotics
Fluxcharge - wireless chargers for mobile robotics
 
I beacons 101
I beacons 101I beacons 101
I beacons 101
 
Gammagraphics Case Study
Gammagraphics Case StudyGammagraphics Case Study
Gammagraphics Case Study
 
IEEE 802.11s - Wireless Mesh Network
IEEE 802.11s - Wireless Mesh NetworkIEEE 802.11s - Wireless Mesh Network
IEEE 802.11s - Wireless Mesh Network
 

Kürzlich hochgeladen

Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...Wes McKinney
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesThousandEyes
 
Manual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance AuditManual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance AuditSkynet Technologies
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityIES VE
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Alkin Tezuysal
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rick Flair
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentPim van der Noll
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfIngrid Airi González
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterMydbops
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersNicole Novielli
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfNeo4j
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality AssuranceInflectra
 

Kürzlich hochgeladen (20)

Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
 
Manual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance AuditManual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance Audit
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a reality
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdf
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL Router
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software Developers
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdf
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
 

Synergy between manet and biological swarm systems