64,355 research outputs found
Advances on Network Protocols and Algorithms for Vehicular Ad Hoc Networks
Vehicular Ad Hoc Network (VANET) is an emerging area of
wireless ad hoc networks that facilitates ubiquitous connectivity
between smart vehicles through Vehicle-to-Vehicle
(V2V) or Vehicle-to-Roadside (V2R) and Roadside-to-
Vehicle (R2V) communications. This emerging field of technology
aims to improve safety of passengers and traffic flow,
reduces pollution to the environment and enables in-vehicle
entertainment applications. The safety-related applications
could reduce accidents by providing drivers with traffic information
such as collision avoidances, traffic flow alarms and
road surface conditions. Moreover, the passengers could exploit
an available infrastructure in order to connect to the
internet for infomobility and entertainment applications.Lloret, J.; Ghafoor, KZ.; Rawat, DB.; Xia, F. (2013). Advances on Network Protocols and Algorithms for Vehicular Ad Hoc Networks. Mobile Networks and Applications. 18(6):749-754. doi:10.1007/s11036-013-0490-7S749754186Lloret J, Canovas A, CatalĂĄ A, Garcia M (2013) Group-based protocol and mobility model for VANETs to offer internet access. J Netw Comput Appl 36(3):1027â1038. doi: 10.1016/j.jnca.2012.02.009Khokhar RH, Zia T, Ghafoor KZ, Lloret J, Shiraz M (2013) Realistic and efficient radio propagation model for V2X communications. KSII Trans Internet Inform Syst 7(8):1933â1953. doi: 10.3837/tiis.2013.08.011Ghafoor KZ (2013) Routing protocols in vehicular ad hoc networks: survey and research challenges, Netw Protocol Algorithm 5(4). doi: 10.5296/npa.v5i4.4134Ghafoor KZ, Bakar KA, Lloret J, Ke C-H, Lee KC (2013) Intelligent beaconless geographical routing for urban vehicular environments. Wirel Netw 19(3):345â362. doi: 10.1007/s11276-012-0470-zGhafoor KZ, Bakar KA, Lee K, AL-Hashimi H (2010) A novel delay- and reliability- aware inter-vehicle routing protocol. Netw Protocol Algorithms 2(2):66â88. doi: 10.5296/npa.v2i2.427Dias JAFF, Rodrigues JJPC, Isento JN, Pereira PRBA, Lloret J (2011) Performance assessment of fragmentation mechanisms for vehicular delay-tolerant networks. EURASIP J Wirel Commun Netw 2011(195):1â14. doi: 10.1186/1687-1499-2011-195Zhang D, Yang Z, Raychoudhury V, Chen Z, Lloret J (2013) An energy-efficient routing protocol using movement trend in vehicular Ad-hoc networks. Comput J 58(8):938â946. doi: 10.1093/comjnl/bxt028Ghafoor KZ, Lloret J, Bakar KA, Sadiq AS, Mussa SAB (2013) Beaconing approaches in vehicular Ad Hoc networks: a survey. Wirel Pers Commun. doi: 10.1007/s11277-013-1222-9Sadiq AS, Bakar KA, Ghafoor KZ, Lloret J (2013) An intelligent vertical handover scheme for audio and video streaming in heterogeneous vehicular networks. Mobile Netw Appl. doi: 10.1007/s11036-013-0465-8Khamayseh YM (2013) Network size estimation in VANETs. Netw Protocol Algorithm 5(3):136â152. doi: 10.5296/npa.v5i6.3838Rawat DB, Popescu DC, Yan G, Olariu S (2011) Enhancing VANET performance by joint adaptation of transmission power and contention window size. IEEE Trans Parallel Distrib Syst 22(9):1528â1535Yan G, Rawat DB, Bista BB. Provisioning vehicular ad hoc networks with quality of services. Int J Space-Based Situated Comput 2(2):104â111Rawat DB, Bista BB, Yan G, Weigle MC (2011) Securing vehicular ad-hoc networks against malicious drivers: a probabilistic approach, International Conference on Complex, Intelligent, and Software Intensive Systems Pp. 146â151. June 30, 2011Sun W, Xia F, Ma J, Fu T, Sun Y. An optimal ODAM-based broadcast algorithm for vehicular Ad-Hoc Networks. KSII Trans Internet Inform Syst 6(12): 3257â3274Vinel AV, Dudin AN, Andreev SD, Xia F (2010) Performance modeling methodology of emergency dissemination algorithms for vehicular ad-hoc networks, 6th Communication Systems, Networks & Digital Signal Processing (CSNDSP 2010), Pp. 397â400AL-Hashimi HN, Bakar KA, Ghafoor KZ (2010) Inter-domain proxy mobile IPv6 based vehicular network. Netw Protocol Algorithm 2(4):1â15. doi: 10.5296/npa.v2i4.488Ghafoor KZ, Bakar KA, Mohammed MA, Lloret J (2013) Vehicular cloud computing: trends and challenges, in the book âmobile computing over cloud: technologies, services, and applicationsâ. IGI GlobalYan G, Rawat DB, Bista BB (2012) Towards secure vehicular clouds, Sixth International Conference on Complex, Intelligent and Software Intensive Systems (CISIS 2012), Pp. 370â375FernĂĄndez H, Rubio L, Reig J, Rodrigo-Peñarrocha VM, Valero A (2013) Path loss modeling for vehicular system performance and communication protocols evaluation. Mobile Netw Appl. doi: 10.1007/s11036-013-0463-xAllouche Y, Segal M (2013) A cluster-based beaconing approach in VANETs: near optimal topology via proximity information. Mobile Netw Appl. doi: 10.1007/s11036-013-0468-5Merah AF, Samarah S, Boukerche A, Mammeri A (2013) A sequential patterns data mining approach towards vehicular route prediction in VANETs. Mobile Netw Appl. doi: 10.1007/s11036-013-0459-6Zhang D, Huang H, Zhou J, Xia F, Chen Z (2013) Detecting hot road mobility of vehicular Ad Hoc Networks. Mobile Netw Appl. doi: 10.1007/s11036-013-0467-6El Ajaltouni H, Boukerche A, Mammeri A (2013) A multichannel QoS MAC with dynamic transmit opportunity for. Mobile Netw Appl. doi: 10.1007/s11036-013-0475-6Reñé S, Esparza O, Alins J, Mata-DĂaz J, Muñoz JL (2013) VSPLIT: a cross-layer architecture for V2I TCP services over. Mobile Netw Appl. doi: 10.1007/s11036-013-0473-8Blanco B, Liberal F (2013) Amaia Aguirregoitia, application of cognitive techniques to adaptive routing for VANETs in city environments. Mobile Netw Appl. doi: 10.1007/s11036-013-0466-7Kim J, Krunz M (2013) Spectrum-aware beaconless geographical routing protocol for cognitive radio enabled vehicular networks. Mobile Netw Appl. doi: 10.1007/s11036-013-0476-5Dias JAFF, Rodrigues JJPC, Isento JNG, Niu J (2013) The impact of cooperative nodes on the performance of vehicular delay-tolerant networks. Mobile Netw Appl. doi: 10.1007/s11036-013-0464-9Sadiq AS, Bakar KA, Ghafoor KZ, Lloret J, Khokhar R (2013) An intelligent vertical handover scheme for audio and video streaming in heterogeneous vehicular networks. Mobile Netw Appl. doi: 10.1007/s11036-013-0465-8Machado S, OzĂłn J, GonzĂĄlez AJ, Ghafoor KZ (2013) Structured peer-to-peer real time video transmission over vehicular Ad Hoc networks. Mobile Netw Appl. doi: 10.1007/s11036-013-0461-zLin C, Wu G, Xia F, Yao L (2013) Enhance the attacking efficiency of the node compromise attack in vehicular Ad-hoc network using connected dominating set. Mobile Netw Appl. doi: 10.1007/s11036-013-0469-
A Resource Intensive Traffic-Aware Scheme for Cluster-based Energy Conservation in Wireless Devices
Wireless traffic that is destined for a certain device in a network, can be
exploited in order to minimize the availability and delay trade-offs, and
mitigate the Energy consumption. The Energy Conservation (EC) mechanism can be
node-centric by considering the traversed nodal traffic in order to prolong the
network lifetime. This work describes a quantitative traffic-based approach
where a clustered Sleep-Proxy mechanism takes place in order to enable each
node to sleep according to the time duration of the active traffic that each
node expects and experiences. Sleep-proxies within the clusters are created
according to pairwise active-time comparison, where each node expects during
the active periods, a requested traffic. For resource availability and recovery
purposes, the caching mechanism takes place in case where the node for which
the traffic is destined is not available. The proposed scheme uses Role-based
nodes which are assigned to manipulate the traffic in a cluster, through the
time-oriented backward difference traffic evaluation scheme. Simulation study
is carried out for the proposed backward estimation scheme and the
effectiveness of the end-to-end EC mechanism taking into account a number of
metrics and measures for the effects while incrementing the sleep time duration
under the proposed framework. Comparative simulation results show that the
proposed scheme could be applied to infrastructure-less systems, providing
energy-efficient resource exchange with significant minimization in the power
consumption of each device.Comment: 6 pages, 8 figures, To appear in the proceedings of IEEE 14th
International Conference on High Performance Computing and Communications
(HPCC-2012) of the Third International Workshop on Wireless Networks and
Multimedia (WNM-2012), 25-27 June 2012, Liverpool, U
Mengenal pasti masalah pemahaman dan hubungannya dengan latar belakang matematik, gaya pembelajaran, motivasi dan minat pelajar terhadap bab pengawalan kos makanan di Sekolah Menengah Teknik (ert) Rembau: satu kajian kes.
Kajian ini dijalankan untuk mengkaji hubungan korelasi antara latar belakang Matematik, gaya pembelajaran, motivasi dan minat dengan pemahaman pelajar terhadap bab tersebut. Responden adalah seramai 30 orang iaitu terdiri daripada pelajar tingkatan lima kursus Katering, Sekolah Menengah Teknik (ERT) Rembau, Negeri Sembilan. Instrumen kajian adalah soal selidik dan semua data dianalisis menggunakan program SPSS versi 10.0 untuk mendapatkan nilai min dan nilai korelasi bagi memenuhi objektif yang telah ditetapkan. Hasil kajian ini menunjukkan bahawa hubungan korelasi antara gaya pembelajaran pelajar terhadap pemahaman pelajar adalah kuat. Manakala hubungan korelasi antara latar belakang Matematik, motivasi dan minat terhadap pemahaman pelajar adalah sederhana. Nilai tahap min bagi masalah pemahaman pelajar, latar belakang Matematik, gaya pembelajaran, motivasi dan minat terhadap bab Pengawalan Kos Makanan adalah sederhana. Kajian ini mencadangkan penghasilan satu Modul Pembelajaran Kendiri bagi bab Pengawalan Kos Makanan untuk membantu pelajar kursus Katering dalam proses pembelajaran mereka
Three applications for mobile epidemic algorithms
This paper presents a framework for the pervasive sharing of data using wireless networks. 'FarCry' uses the mobility of users to carry files between separated networks. Through a mix of ad-hoc and infrastructure-based wireless networking, files are transferred between users without their direct involvement. As users move to different locations, files are then transmitted on to other users, spreading and sharing information. We examine three applications of this framework. Each of these exploits the physically proximate nature of social gatherings. As people group together in, for example, business meetings and cafés, this can be taken as an indication of similar interests, e.g. in the same presentation or in a type of music. MediaNet affords sharing of media files between strangers or friends, MeetingNet shares business documents in meetings, and NewsNet shares RSS feeds between mobile users. NewsNet also develops the use of pre-emptive caching: collecting information from others not for oneself, but for the predicted later sharing with others. We offer observations on developing this system for a mobile, multi-user, multi-device environment
A Review of the Energy Efficient and Secure Multicast Routing Protocols for Mobile Ad hoc Networks
This paper presents a thorough survey of recent work addressing energy
efficient multicast routing protocols and secure multicast routing protocols in
Mobile Ad hoc Networks (MANETs). There are so many issues and solutions which
witness the need of energy management and security in ad hoc wireless networks.
The objective of a multicast routing protocol for MANETs is to support the
propagation of data from a sender to all the receivers of a multicast group
while trying to use the available bandwidth efficiently in the presence of
frequent topology changes. Multicasting can improve the efficiency of the
wireless link when sending multiple copies of messages by exploiting the
inherent broadcast property of wireless transmission. Secure multicast routing
plays a significant role in MANETs. However, offering energy efficient and
secure multicast routing is a difficult and challenging task. In recent years,
various multicast routing protocols have been proposed for MANETs. These
protocols have distinguishing features and use different mechanismsComment: 15 page
Recommended from our members
A classification of emerging and traditional grid systems
The grid has evolved in numerous distinct phases. It started in the early â90s as a model of metacomputing in which supercomputers share resources; subsequently, researchers added the ability to share data. This is usually referred to as the first-generation grid. By the late â90s, researchers had outlined the framework for second-generation grids, characterized by their use of grid middleware systems to âglueâ different grid technologies together. Third-generation grids originated in the early millennium when Web technology was combined with second-generation grids. As a result, the invisible grid, in which grid complexity is fully hidden through resource virtualization, started receiving attention. Subsequently, grid researchers identified the requirement for semantically rich knowledge grids, in which middleware technologies are more intelligent and autonomic. Recently, the necessity for grids to support and extend the ambient intelligence vision has emerged. In AmI, humans are surrounded by computing technologies that are unobtrusively embedded in their surroundings.
However, third-generation gridsâ current architecture doesnât meet the requirements of next-generation grids (NGG) and service-oriented knowledge utility (SOKU).4 A few years ago, a group of independent experts, arranged by the European Commission, identified these shortcomings as a way to identify potential European grid research priorities for 2010 and beyond. The experts envision grid systemsâ information, knowledge, and processing capabilities as a set of utility services.3 Consequently, new grid systems are emerging to materialize these visions. Here, we review emerging grids and classify them to motivate further research and help establish a solid foundation in this rapidly evolving area
GCP: Gossip-based Code Propagation for Large-scale Mobile Wireless Sensor Networks
Wireless sensor networks (WSN) have recently received an increasing interest.
They are now expected to be deployed for long periods of time, thus requiring
software updates. Updating the software code automatically on a huge number of
sensors is a tremendous task, as ''by hand'' updates can obviously not be
considered, especially when all participating sensors are embedded on mobile
entities. In this paper, we investigate an approach to automatically update
software in mobile sensor-based application when no localization mechanism is
available. We leverage the peer-to-peer cooperation paradigm to achieve a good
trade-off between reliability and scalability of code propagation. More
specifically, we present the design and evaluation of GCP ({\emph Gossip-based
Code Propagation}), a distributed software update algorithm for mobile wireless
sensor networks. GCP relies on two different mechanisms (piggy-backing and
forwarding control) to improve significantly the load balance without
sacrificing on the propagation speed. We compare GCP against traditional
dissemination approaches. Simulation results based on both synthetic and
realistic workloads show that GCP achieves a good convergence speed while
balancing the load evenly between sensors
- âŠ