56,717 research outputs found

    CMD: A Multi-Channel Coordination Scheme for Emergency Message Dissemination in IEEE 1609.4

    Full text link
    In the IEEE 1609.4 legacy standard for multi-channel communications in vehicular ad hoc networks(VANETs), the control channel (CCH) is dedicated to broadcast safety messages while the service channels (SCH's) are dedicated to transmit infotainment service content. However, the SCH can be used as an alternative to transmit high priority safety messages in the event that they are invoked during the service channel interval (SCHI). This implies that there is a need to transmit safety messages across multiple available utilized channels to ensure that all vehicles receive the safety message. Transmission across multiple SCH's using the legacy IEEE 1609.4 requires multiple channel switching and therefore introduces further end-to-end delays. Given that safety messaging is a life critical application, it is important that optimal end-to-end delay performance is derived in multi-channel VANET scenarios to ensure reliable safety message dissemination. To tackle this challenge, three primary contributions are in this article: first, a channel coordinator selection approach based on the least average separation distance (LAD) to the vehicles that expect to tune to other SCH's and operates during the control channel interval (CCHI) is proposed. Second, a model to determine the optimal time intervals in which CMD operates during the CCHI is proposed. Third, a contention back-off mechanism for safety message transmission during the SCHI is proposed. Computer simulations and mathematical analysis show that CMD performs better than the legacy IEEE 1609.4 and a selected state-of-the-art multi-channel message dissemination schemes in terms of end-to-end delay and packet reception ratio.Comment: 15 pages, 10 figures, 7 table

    Lean Thinking: Theory, Application and Dissemination

    Get PDF
    This book was written and compiled by the University of Huddersfield to share the learnings and experiences of seven years of Knowledge Transfer Partnership (KTP) and Economic and Social Research Council (ESRC) funded projects with the National Health Service (NHS). The focus of these projects was the implementation of Lean thinking and optimising strategic decision making processes. Each of these projects led to major local improvements and this book explains how they were achieved and compiles the lessons learnt. The book is split into three chapters; Lean Thinking Theory, Lean Thinking Applied and Lean Thinking Dissemination

    Reforming the agricultural extension system in India: What do we know about what works where and why?

    Get PDF
    "In order to realize agricultural potential and to increase agricultural yields, India's extension system has experienced major conceptual, structural, and institutional changes since the late 1990s. This paper reviews existing reform programs and strategies currently existing in agricultural extension in India. It distinguishes strategies that have been employed to strengthen both the supply and demand sides of service provision in the area of agricultural extension, and it reviews the effects of the demand- and supply-side strategies on the access to and the quality of agricultural extension services. The ultimate objectives are (1) to gain a view on what works where and why in improving the effectiveness of agricultural extension in a decentralized environment; (2) to identify measures that strengthen and improve agricultural extension service provision; and (3) to reveal existing knowledge gaps. Although the range of extension reform approaches is wide, this paper shows that an answer to the question of what works where and why is complicated by the absence of sound and comprehensive qualitative and quantitative impact and evaluation assessment studies. Even evidence from the National Agricultural Technology Project and the Diversified Agricultural Support Project of the World Bank, the women empowerment programs of the Danish International Development Agency, the Andhra Pradesh Tribal Development Project, and the e-Choupal program of the Indian Tobacco Company is subject to methodological and identification problems. Conclusions regarding the importance (1) of implementing both decentralized, participatory, adaptive, and pluralistic demand- and supply-side extension approaches; (2) of involving the public, private, and third (civil society) sectors in extension service provision and funding; and (3) of strengthening the capacity of and the collaboration between farmers, researchers, and extension workers are necessarily tentative and require further quantification. The paper seeks to inform policymakers and providers of extension services from all sectors about the need to make performance assessments and impact evaluations inherent components of any extension program so as to increase the effectiveness of extension service reforms." from Author's AbstractDemand-driven and supply-driven agricultural extension services' extension service reforms, Agricultural extension services, Reforms, Demand driven, Supply driven, Governance,

    A Resource Intensive Traffic-Aware Scheme for Cluster-based Energy Conservation in Wireless Devices

    Full text link
    Wireless traffic that is destined for a certain device in a network, can be exploited in order to minimize the availability and delay trade-offs, and mitigate the Energy consumption. The Energy Conservation (EC) mechanism can be node-centric by considering the traversed nodal traffic in order to prolong the network lifetime. This work describes a quantitative traffic-based approach where a clustered Sleep-Proxy mechanism takes place in order to enable each node to sleep according to the time duration of the active traffic that each node expects and experiences. Sleep-proxies within the clusters are created according to pairwise active-time comparison, where each node expects during the active periods, a requested traffic. For resource availability and recovery purposes, the caching mechanism takes place in case where the node for which the traffic is destined is not available. The proposed scheme uses Role-based nodes which are assigned to manipulate the traffic in a cluster, through the time-oriented backward difference traffic evaluation scheme. Simulation study is carried out for the proposed backward estimation scheme and the effectiveness of the end-to-end EC mechanism taking into account a number of metrics and measures for the effects while incrementing the sleep time duration under the proposed framework. Comparative simulation results show that the proposed scheme could be applied to infrastructure-less systems, providing energy-efficient resource exchange with significant minimization in the power consumption of each device.Comment: 6 pages, 8 figures, To appear in the proceedings of IEEE 14th International Conference on High Performance Computing and Communications (HPCC-2012) of the Third International Workshop on Wireless Networks and Multimedia (WNM-2012), 25-27 June 2012, Liverpool, U

    Superprocesses as models for information dissemination in the Future Internet

    Full text link
    Future Internet will be composed by a tremendous number of potentially interconnected people and devices, offering a variety of services, applications and communication opportunities. In particular, short-range wireless communications, which are available on almost all portable devices, will enable the formation of the largest cloud of interconnected, smart computing devices mankind has ever dreamed about: the Proximate Internet. In this paper, we consider superprocesses, more specifically super Brownian motion, as a suitable mathematical model to analyse a basic problem of information dissemination arising in the context of Proximate Internet. The proposed model provides a promising analytical framework to both study theoretical properties related to the information dissemination process and to devise efficient and reliable simulation schemes for very large systems

    An Enhanced Source Location Privacy based on Data Dissemination in Wireless Sensor Networks (DeLP)

    Get PDF
    open access articleWireless Sensor Network is a network of large number of nodes with limited power and computational capabilities. It has the potential of event monitoring in unattended locations where there is a chance of unauthorized access. The work that is presented here identifies and addresses the problem of eavesdropping in the exposed environment of the sensor network, which makes it easy for the adversary to trace the packets to find the originator source node, hence compromising the contextual privacy. Our scheme provides an enhanced three-level security system for source location privacy. The base station is at the center of square grid of four quadrants and it is surrounded by a ring of flooding nodes, which act as a first step in confusing the adversary. The fake node is deployed in the opposite quadrant of actual source and start reporting base station. The selection of phantom node using our algorithm in another quadrant provides the third level of confusion. The results show that Dissemination in Wireless Sensor Networks (DeLP) has reduced the energy utilization by 50% percent, increased the safety period by 26%, while providing a six times more packet delivery ratio along with a further 15% decrease in the packet delivery delay as compared to the tree-based scheme. It also provides 334% more safety period than the phantom routing, while it lags behind in other parameters due to the simplicity of phantom scheme. This work illustrates the privacy protection of the source node and the designed procedure may be useful in designing more robust algorithms for location privac
    • 

    corecore