22 research outputs found

    A Hybrid Model to Extend Vehicular Intercommunication V2V through D2D Architecture

    Full text link
    In the recent years, many solutions for Vehicle to Vehicle (V2V) communication were proposed to overcome failure problems (also known as dead ends). This paper proposes a novel framework for V2V failure recovery using Device-to-Device (D2D) communications. Based on the unified Intelligent Transportation Systems (ITS) architecture, LTE-based D2D mechanisms can improve V2V dead ends failure recovery delays. This new paradigm of hybrid V2V-D2D communications overcomes the limitations of traditional V2V routing techniques. According to NS2 simulation results, the proposed hybrid model decreases the end to end delay (E2E) of messages delivery. A complete comparison of different D2D use cases (best & worst scenarios) is presented to show the enhancements brought by our solution compared to traditional V2V techniques.Comment: 6 page

    Assisting V2V failure recovery using Device-to-Device Communications

    Full text link
    This paper aims to propose a new solution for failure recovery (dead-ends) in Vehicle to Vehicle (V2V) communications through LTE-assisted Device-to-Device communications (D2D). Based on the enhanced networking capabilities offered by Intelligent Transportation Systems (ITS) architecture, our solution can efficiently assist V2V communications in failure recovery situations. We also derive an analytical model to evaluate generic V2V routing recovery failures. Moreover, the proposed hybrid model is simulated and compared to the generic model under different constrains of worst and best cases of D2D discovery and communication. According to our comparison and simulation results, the hybrid model decreases the delay for alarm message propagation to the destination (typically the Traffic Control Center TCC) through the Road Side Unit (RSU)Comment: 3 page

    Scalable and Cost Efficient Algorithms for Virtual CDN Migration

    Full text link
    Virtual Content Delivery Network (vCDN) migration is necessary to optimize the use of resources and improve the performance of the overall SDN/NFV-based CDN function in terms of network operator cost reduction and high streaming quality. It requires intelligent and enticed joint SDN/NFV migration algorithms due to the evident huge amount of traffic to be delivered to end customers of the network. In this paper, two approaches for finding the optimal and near optimal path placement(s) and vCDN migration(s) are proposed (OPAC and HPAC). Moreover, several scenarios are considered to quantify the OPAC and HPAC behaviors and to compare their efficiency in terms of migration cost, migration time, vCDN replication number, and other cost factors. Then, they are implemented and evaluated under different network scales. Finally, the proposed algorithms are integrated in an SDN/NFV framework. Index Terms: vCDN; SDN/NFV Optimization; Migration Algorithms; Scalability Algorithms.Comment: 9 pages, 11 figures, 4 tableaux, conference Local Computer Networks (LCN), class

    Fixed gonadotropin-releasing hormone antagonist protocol versus gonadotropin-releasing hormone agonist long protocol in patients with polycystic ovary syndrome treated for intracytoplasmic sperm injection cycles

    Get PDF
    Background: Women with polycystic ovary syndrome (PCOS) are at risk of developing ovarian hyperstimulation syndrome (OHSS) during ovarian stimulation. Use of GnRH antagonist in the general sub fertile population is associated with lower incidence of (OHSS) than agonists and similar probability of live birth but it is unclear. Our Objective was to compare the fixed GnRH antagonist and GnRH agonist long protocols in patients with PCOS undergoing IVF.Methods: In this randomized controlled trial (RCT), 200 patients with PCOS were randomly allocated in two groups: long GnRH (n = 100) and fixed GnRH antagonist protocol (n = 100).           Results: There is significant difference was observed in chemical pregnancy rate (46.0% versus 31.0%), and clinical pregnancy rate (43.0% versus 29.0%) in agonist and antagonist protocols, respectively. Duration of stimulation was significantly higher in agonist group (13.58 versus 12.381 days), respectively.  Total number of ampoules of gonadotrophin is comparable in both groups (t=1.914, p=0.057).Conclusions: The use of GnRH antagonists is more advantageous than GnRH agonists in relation to shorter duration of stimulation thus allowing a reduction in the treatment time that makes COS less costly and better patient compliance. In this study GnRH agonist shows higher pregnancy rate than antagonist, so larger studies needed to clarify their roles

    Algorithmes d'optimisation de service vidéo

    No full text
    The aim of this thesis is to provide optimization algorithms for accessing video services either in unmanaged or managed ways. We study recent statistics about unmanaged video services like YouTube and propose suitable optimization techniques that could enhance files accessing and reduce their access costs. Moreover, this cost analysis plays an important role in decision making about video files caching and hosting periods on the servers. Under managed video services called IPTV, we conducted experiments for an open-IPTV collaborative architecture between different operators. This model is analyzed in terms of CAPEX and OPEX costs inside the domestic sphere. Moreover, we introduced a dynamic way for optimizing the Minimum Spanning Tree (MST) for multicast IPTV service. In nomadic access, the static trees could be unable to provide the service in an efficient manner as the utilization of bandwidth increases towards the streaming points (roots of topologies). Finally, we study reliable security measures in video streaming based on hash chain methodology and propose a new algorithm. Then, we conduct comparisons between different ways used in achieving reliability of hash chains based on generic classificationsL'objectif de cette thèse est de fournir des algorithmes d'optimisation pour l'accès aux services vidéo qu’ils soient non-gérés (Internet TV) ou gérés (IPTV). Nous étudions des statistiques récentes concernant les services vidéo non-gérés comme YouTube et nous proposons des techniques d'optimisation appropriées qui pourraient améliorer l'accès aux fichiers vidéos et réduire le coût de cet accès. En outre, l’analyse des coûts joue un rôle important dans les décisions qui concernent la mise en cache des fichiers vidéos et celles liées au choix des périodes temporelles d'hébergement de ces fichiers sur les serveurs. En ce qui concerne les services vidéo gérés appelés IPTV, nous avons mené des expériences sur une architecture ouverte IPTV-collaboration entre différents opérateurs. Ce modèle est analysé selon un critère de coût d’investissement et d'exploitation à l'intérieur de la sphère domestique. En outre, nous avons introduit une solution d’optimisation dynamique de l'arbre « minimum spanning tree » (MST) pour le service IPTV multicast. Lors d’un accès nomade, les arbres statiques pourraient être incapables de fournir le service de manière efficace vu que l'utilisation de la bande passante augmente aux côté des points de streaming (racines de la topologie). Finalement, nous étudions des mesures de sécurité fiables en streaming vidéo basées sur la méthodologie de la chaîne de hachage et nous proposons un nouvel algorithme hybride. Nous effectuons des comparaisons entre les différentes manières utilisées dans la réalisation de la fiabilité des chaînes de hachage basées sur les classifications générique

    Algorithmes d'optimisation de service vidéo

    No full text
    L'objectif de cette thèse est de fournir des algorithmes d'optimisation pour l'accès aux services vidéo qu ils soient non-gérés (Internet TV) ou gérés (IPTV). Nous étudions des statistiques récentes concernant les services vidéo non-gérés comme YouTube et nous proposons des techniques d'optimisation appropriées qui pourraient améliorer l'accès aux fichiers vidéos et réduire le coût de cet accès. En outre, l analyse des coûts joue un rôle important dans les décisions qui concernent la mise en cache des fichiers vidéos et celles liées au choix des périodes temporelles d'hébergement de ces fichiers sur les serveurs. En ce qui concerne les services vidéo gérés appelés IPTV, nous avons mené des expériences sur une architecture ouverte IPTV-collaboration entre différents opérateurs. Ce modèle est analysé selon un critère de coût d investissement et d'exploitation à l'intérieur de la sphère domestique. En outre, nous avons introduit une solution d optimisation dynamique de l'arbre minimum spanning tree (MST) pour le service IPTV multicast. Lors d un accès nomade, les arbres statiques pourraient être incapables de fournir le service de manière efficace vu que l'utilisation de la bande passante augmente aux côté des points de streaming (racines de la topologie). Finalement, nous étudions des mesures de sécurité fiables en streaming vidéo basées sur la méthodologie de la chaîne de hachage et nous proposons un nouvel algorithme hybride. Nous effectuons des comparaisons entre les différentes manières utilisées dans la réalisation de la fiabilité des chaînes de hachage basées sur les classifications génériquesThe aim of this thesis is to provide optimization algorithms for accessing video services either in unmanaged or managed ways. We study recent statistics about unmanaged video services like YouTube and propose suitable optimization techniques that could enhance files accessing and reduce their access costs. Moreover, this cost analysis plays an important role in decision making about video files caching and hosting periods on the servers. Under managed video services called IPTV, we conducted experiments for an open-IPTV collaborative architecture between different operators. This model is analyzed in terms of CAPEX and OPEX costs inside the domestic sphere. Moreover, we introduced a dynamic way for optimizing the Minimum Spanning Tree (MST) for multicast IPTV service. In nomadic access, the static trees could be unable to provide the service in an efficient manner as the utilization of bandwidth increases towards the streaming points (roots of topologies). Finally, we study reliable security measures in video streaming based on hash chain methodology and propose a new algorithm. Then, we conduct comparisons between different ways used in achieving reliability of hash chains based on generic classificationsEVRY-INT (912282302) / SudocSudocFranceF
    corecore