56,717 research outputs found
CMD: A Multi-Channel Coordination Scheme for Emergency Message Dissemination in IEEE 1609.4
In the IEEE 1609.4 legacy standard for multi-channel communications in
vehicular ad hoc networks(VANETs), the control channel (CCH) is dedicated to
broadcast safety messages while the service channels (SCH's) are dedicated to
transmit infotainment service content. However, the SCH can be used as an
alternative to transmit high priority safety messages in the event that they
are invoked during the service channel interval (SCHI). This implies that there
is a need to transmit safety messages across multiple available utilized
channels to ensure that all vehicles receive the safety message. Transmission
across multiple SCH's using the legacy IEEE 1609.4 requires multiple channel
switching and therefore introduces further end-to-end delays. Given that safety
messaging is a life critical application, it is important that optimal
end-to-end delay performance is derived in multi-channel VANET scenarios to
ensure reliable safety message dissemination. To tackle this challenge, three
primary contributions are in this article: first, a channel coordinator
selection approach based on the least average separation distance (LAD) to the
vehicles that expect to tune to other SCH's and operates during the control
channel interval (CCHI) is proposed. Second, a model to determine the optimal
time intervals in which CMD operates during the CCHI is proposed. Third, a
contention back-off mechanism for safety message transmission during the SCHI
is proposed. Computer simulations and mathematical analysis show that CMD
performs better than the legacy IEEE 1609.4 and a selected state-of-the-art
multi-channel message dissemination schemes in terms of end-to-end delay and
packet reception ratio.Comment: 15 pages, 10 figures, 7 table
Lean Thinking: Theory, Application and Dissemination
This book was written and compiled by the University of Huddersfield to share the learnings and experiences of seven years of Knowledge Transfer Partnership (KTP) and Economic and Social
Research Council (ESRC) funded projects with the
National Health Service (NHS). The focus of these
projects was the implementation of Lean thinking and optimising strategic decision making processes. Each of these projects led to major local improvements and this book explains how they were achieved and compiles the lessons learnt. The book is split into three chapters; Lean Thinking Theory, Lean Thinking Applied and Lean Thinking Dissemination
Reforming the agricultural extension system in India: What do we know about what works where and why?
"In order to realize agricultural potential and to increase agricultural yields, India's extension system has experienced major conceptual, structural, and institutional changes since the late 1990s. This paper reviews existing reform programs and strategies currently existing in agricultural extension in India. It distinguishes strategies that have been employed to strengthen both the supply and demand sides of service provision in the area of agricultural extension, and it reviews the effects of the demand- and supply-side strategies on the access to and the quality of agricultural extension services. The ultimate objectives are (1) to gain a view on what works where and why in improving the effectiveness of agricultural extension in a decentralized environment; (2) to identify measures that strengthen and improve agricultural extension service provision; and (3) to reveal existing knowledge gaps. Although the range of extension reform approaches is wide, this paper shows that an answer to the question of what works where and why is complicated by the absence of sound and comprehensive qualitative and quantitative impact and evaluation assessment studies. Even evidence from the National Agricultural Technology Project and the Diversified Agricultural Support Project of the World Bank, the women empowerment programs of the Danish International Development Agency, the Andhra Pradesh Tribal Development Project, and the e-Choupal program of the Indian Tobacco Company is subject to methodological and identification problems. Conclusions regarding the importance (1) of implementing both decentralized, participatory, adaptive, and pluralistic demand- and supply-side extension approaches; (2) of involving the public, private, and third (civil society) sectors in extension service provision and funding; and (3) of strengthening the capacity of and the collaboration between farmers, researchers, and extension workers are necessarily tentative and require further quantification. The paper seeks to inform policymakers and providers of extension services from all sectors about the need to make performance assessments and impact evaluations inherent components of any extension program so as to increase the effectiveness of extension service reforms." from Author's AbstractDemand-driven and supply-driven agricultural extension services' extension service reforms, Agricultural extension services, Reforms, Demand driven, Supply driven, Governance,
A Resource Intensive Traffic-Aware Scheme for Cluster-based Energy Conservation in Wireless Devices
Wireless traffic that is destined for a certain device in a network, can be
exploited in order to minimize the availability and delay trade-offs, and
mitigate the Energy consumption. The Energy Conservation (EC) mechanism can be
node-centric by considering the traversed nodal traffic in order to prolong the
network lifetime. This work describes a quantitative traffic-based approach
where a clustered Sleep-Proxy mechanism takes place in order to enable each
node to sleep according to the time duration of the active traffic that each
node expects and experiences. Sleep-proxies within the clusters are created
according to pairwise active-time comparison, where each node expects during
the active periods, a requested traffic. For resource availability and recovery
purposes, the caching mechanism takes place in case where the node for which
the traffic is destined is not available. The proposed scheme uses Role-based
nodes which are assigned to manipulate the traffic in a cluster, through the
time-oriented backward difference traffic evaluation scheme. Simulation study
is carried out for the proposed backward estimation scheme and the
effectiveness of the end-to-end EC mechanism taking into account a number of
metrics and measures for the effects while incrementing the sleep time duration
under the proposed framework. Comparative simulation results show that the
proposed scheme could be applied to infrastructure-less systems, providing
energy-efficient resource exchange with significant minimization in the power
consumption of each device.Comment: 6 pages, 8 figures, To appear in the proceedings of IEEE 14th
International Conference on High Performance Computing and Communications
(HPCC-2012) of the Third International Workshop on Wireless Networks and
Multimedia (WNM-2012), 25-27 June 2012, Liverpool, U
Superprocesses as models for information dissemination in the Future Internet
Future Internet will be composed by a tremendous number of potentially
interconnected people and devices, offering a variety of services, applications
and communication opportunities. In particular, short-range wireless
communications, which are available on almost all portable devices, will enable
the formation of the largest cloud of interconnected, smart computing devices
mankind has ever dreamed about: the Proximate Internet. In this paper, we
consider superprocesses, more specifically super Brownian motion, as a suitable
mathematical model to analyse a basic problem of information dissemination
arising in the context of Proximate Internet. The proposed model provides a
promising analytical framework to both study theoretical properties related to
the information dissemination process and to devise efficient and reliable
simulation schemes for very large systems
An Enhanced Source Location Privacy based on Data Dissemination in Wireless Sensor Networks (DeLP)
open access articleWireless Sensor Network is a network of large number of nodes with limited power and computational capabilities. It has the potential of event monitoring in unattended locations where there is a chance of unauthorized access. The work that is presented here identifies and addresses the problem of eavesdropping in the exposed environment of the sensor network, which makes it easy for the adversary to trace the packets to find the originator source node, hence compromising the contextual privacy. Our scheme provides an enhanced three-level security system for source location privacy. The base station is at the center of square grid of four quadrants and it is surrounded by a ring of flooding nodes, which act as a first step in confusing the adversary. The fake node is deployed in the opposite quadrant of actual source and start reporting base station. The selection of phantom node using our algorithm in another quadrant provides the third level of confusion. The results show that Dissemination in Wireless Sensor Networks (DeLP) has reduced the energy utilization by 50% percent, increased the safety period by 26%, while providing a six times more packet delivery ratio along with a further 15% decrease in the packet delivery delay as compared to the tree-based scheme. It also provides 334% more safety period than the phantom routing, while it lags behind in other parameters due to the simplicity of phantom scheme. This work illustrates the privacy protection of the source node and the designed procedure may be useful in designing more robust algorithms for location privac
- âŠ