39 research outputs found

    RESP: Relay suitability-based routing protocol for video streaming in vehicular Ad Hoc Networks

    Get PDF
    Video streaming in Vehicular Ad Hoc Networks (VANETs) is a fundamental requirement for a roadside emergency and smart video surveillance services. However, vehicles moving at a high speed usually create unstable wireless links that drop video frames qualities. In a high-density network, network collision between vehicles is another obstacle in improving the scalability of unicast routing protocols. In this paper, the RElay Suitability-based Routing Protocol (RESP) which makes a routing decision based on the link stability measurement was proposed for an uninterrupted video streaming. The RESP estimates the geographic advancement and link stability of a vehicle towards its destination only in the small region. To ensure the reliability while extending the scalability of routing, the relay suitability metric integrates the packet delay, collision dropping, link stability, and the Expected Transmission Count (ETX) in the weighted division algorithm, and selects a high-quality forwarding node for video streaming. The experimental results demonstrated the proposed RESP outperformed the link Lifetime-aware Beacon-less Routing Protocol (LBRP) and other traditional geographical streaming protocols in providing a high packet delivery ratio and packet delay with various network densities, and proved the scalability support of RESP for video streaming

    Biometric Template Protection based on Hill Cipher Algorithm with Two Invertible Keys

    Get PDF
    The security of stored templates has become an important issue in biometric authentication systems this because most of the biometric attacks target the biometric database beside the difficulty of issuing the templates again. Thus, to protect the biometric templates it must be encrypted before storing in database. In this paper we proposed an efficient encryption method based on two invertible and random keys to enhance and overcome the weakness of hill cipher algorithm the keys generated using upper triangular matrices with Pseudo-Random Number Generator (PRNG) using two large and random encryption keys. The proposed encryption method provides sufficient security and protection for the biometric templates from attacks, where the experimental results showed high efficiency comparing with the traditional Hill Cipher and existing methods

    HSO: A Hybrid Swarm Optimization Algorithm for Re-Ducing Energy Consumption in the Cloudlets

    Get PDF
    Mobile Cloud Computing (MCC) is an emerging technology for the improvement of mobile service quality. MCC resources are dynamically allocated to the users who pay for the resources based on their needs. The drawback of this process is that it is prone to failure and demands a high energy input. Resource providers mainly focus on resource performance and utilization with more consideration on the constraints of service level agreement (SLA). Resource performance can be achieved through virtualization techniques which facilitates the sharing of resource providers’ information between different virtual machines. To address these issues, this study sets forth a novel algorithm (HSO) that optimized energy efficiency resource management in the cloud; the process of the proposed method involves the use of the developed cost and runtime-effective model to create a minimum energy configuration of the cloud compute nodes while guaranteeing the maintenance of all minimum performances. The cost functions will cover energy, performance and reliability concerns. With the proposed model, the performance of the Hybrid swarm algorithm was significantly increased, as observed by optimizing the number of tasks through simulation, (power consumption was reduced by 42%). The simulation studies also showed a reduction in the number of required calculations by about 20% by the inclusion of the presented algorithms compared to the traditional static approach. There was also a decrease in the node loss which allowed the optimization algorithm to achieve a minimal overhead on cloud compute resources while still saving energy significantly. Conclusively, an energy-aware optimization model which describes the required system constraints was presented in this study, and a further proposal for techniques to determine the best overall solution was also made

    Multipath routing protocol based on cross-layer approach for MANET

    Get PDF
    Mobile Ad-hoc Networks (MANETs) involved in many applications, whether smart or traditional and for both civilian and military uses, and that because of their special features, where it does not depend on any infrastructure during its working, as well as the nodes in MANETs have a freedom of movement with the ability to self-configure, in addition, to working as a router or client at the same time. Moreover, MANETs considered as an infrastructure less network, so the cost of this type of networks is less in comparison to other traditional networks. On the other hand, the routing considered one of most important challenges in MANETs due to the perpetual motion and randomness of the nodes that can causing a continuous change of the network topology and thus to all paths between nodes, where finding valid paths between the nodes is the core task of routing protocols. Recently, it has been argued that the traditional layered architecture is ineffective to deal with receiving signal strength related problems. In an effort to improve the performance of MANETs, there has been increased in protocols that rely on cross-layer interaction between different layers. In this paper, a Cross-layer design among Network, MAC and Physical layers based on Threshold Multipath Routing Protocol (CTMRP) is proposed. The CTMRP is designed for decision maker based on threshold value of average paths signal for efficient transmission of the Text, image, audio and video as well as sending the data via multiple paths, which mitigate the negatives effects causes from forcing the nodes to send the data via single. The Route Discovery Delay, Number of RREQ Messages, Number of RREP Messages, End-to-End Delay, Packet Delivery Ratio (PDR), and Throughput were selected as the main performance evaluation metrics. The results show that the proposed algorithm has better performance and lead to increase stability of transmission link

    Reduction the Effect of Mobility in Link Transmitting Using Efficient DSR Route Cache for MANETs

    Get PDF
    Communication between mobile users is becoming more popular than ever before due to the recent technological advances in wireless communication devices. Ad hoc networks are generally closed in that, it’s a collection of two or more devices equipped with wireless communications and networking capability; they do not connect to the Internet and are typically created between participants. This means that a formed network can be de-formed on-the-fly without the need for any system administration. Many routing protocol methods have been proposed in Mobile Ad-Hoc Network but still the challenges are to improve the routing performance. The DSR (Dynamic Source Routing) routing protocol dependent on the cache memory for every node to store the routing path from source to destination. This paper presented a new algorithm using DSR routing cache technique to improve the routing between mobile nodes to reduction the effect of mobility in link transmitting that can solve link broken problem. The simulation results show a low delay, stable link in routing and better performance in terms of Route Discovery Time. It indicates that DSR cache outperforms DSR standard and had a high quality of packet delivery

    Issues and Challenges of Video Dissemination in VANET and Routing Protocol: Review

    Get PDF
    New technology called Vehicular Ad-hoc Networks (VANETs), this topology quick changing and frequent disconnection has taken huge attention within last years and makes it complex to design an active routing protocol to routing data among vehicles, Vehicle to Vehicle (V2V) communication and Vehicle to roadside Infrastructure (V2I). Routing protocols which existing for VANETs don’t efficient upon meet all traffic scenarios. Hence, the study of an efficient routing protocol has received significant recognition. Therefore, it is really essential to distinguish the pros and cons of routing protocols that can be done for additional growth or development of any new routing protocol. This study present different aspects of VANET technologies that form a real life vehicular network. More detail for the potential applications and current initiatives for the vehicle networks are covered. In addition, brief discussion of existing related work on video streaming in VANETs which are focused on different protocol stack layers. Finally, provides a comprehensive background on vehicular communication networks. Also, the surveys different routing techniques that have improved video broadcasting functionality to achieve acceptable QoS over VANETs

    Shrewd vehicle framework model with a streamlined informed approach for green transportation in smart cities

    Get PDF
    Infrastructure is essential for the activity of a smart city in lighting framework, water conveyance system, smart monitoring infrastructure, and so on. Presently the transport framework is set at the task of such smart city by making smooth portability of the individuals and products, particularly with the probability of managing traffic clog, giving up-dated information and in time data from the open transportation client, creating green methods for transportation (bicycle and vehicle sharing for example), and so on. This paper is highly engaged in keeping up the shrewd vehicle framework model with a streamlined informed approach, which has been planned and created depending on the Smart City segment. This smart model vehicle framework has added to the structure and planning for a smart city by making it increasingly important with a superior utilization of offices, less noisy, free of accidents, progressively conscious of condition with web organized analysis for utilizing data from the clients for adjusting the transportation administrations. Further, the ability to serve the client by giving it to them with open transportation and increasingly interconnected stations moves towards urban areas inside the city

    Technology enhancement learning reflection on improving students’ satisfaction in Omani Universities

    Get PDF
    The excellence of Omani Universities in technology enhancement learning (TEL) has become essential in supporting the rapid growth and sustainability of the education sector for usage and application. Technology enhancement learning is depending on use of different application tools like Microsoft office files and video blog programs to facilitate the academic performance. The real problem faced education is a need for several applications and technologies in the higher education institutions in Oman to improve their outputs and improve on teacher-student satisfaction. This paper aims to determine the common type of (TEL) of video and attached assignments and data analysis used in the Universities. In addition to facilitate (TEL) used is used in colleges and Universities in conjunction with improving lab equipment and administrative systems. In the first phase of this study, a systematic review of the existing literature was carried out to determine and define the suitable quantitative and qualitative criteria of existence applications; and then, design and exploit pair-wise comparison and online evaluation forms to get experts opinions/preference on the evaluation criteria used to measure the satisfaction of these technologies. In this study, survey questionnaires were distributed to 3 different Universities in Oman to assess their technology enhancement learning performances which served as a link between the Universities and higher education (HEI). The findings of this paper aid in establishing the need to improve teaching material by using attached assignment with material description by video programs in the Universities, higher educational institutions (HEI); and new techniques that add value in teacher assessment method for student satisfaction in higher education. Further studies could be carried out in the future with more technological developments

    HSO: A hybrid swarm optimization algorithm for reducing energy consumption in the cloudlets

    Get PDF
    Mobile Cloud Computing (MCC) is an emerging technology for the improvement of mobile service quality. MCC resources are dynamically allocated to the users who pay for the resources based on their needs. The drawback of this process is that it is prone to failure and demands a high energy input. Resource providers mainly focus on resource performance and utilization with more consideration on the constraints of service level agreement (SLA). Resource performance can be achieved through virtualization techniques which facilitates the sharing of resource providers’ information between different virtual machines. To address these issues, this study sets forth a novel algorithm (HSO) that optimized energy efficiency resource management in the cloud; the process of the proposed method involves the use of the developed cost and runtime-effective model to create a minimum energy configuration of the cloud compute nodes while guaranteeing the maintenance of all minimum performances. The cost functions will cover energy, performance and reliability concerns. With the proposed model, the performance of the Hybrid swarm algorithm was significantly increased, as observed by optimizing the number of tasks through simulation, (power consumption was reduced by 42%). The simulation studies also showed a reduction in the number of required calculations by about 20% by the inclusion of the presented algorithms compared to the traditional static approach. There was also a decrease in the node loss which allowed the optimization algorithm to achieve a minimal overhead on cloud compute resources while still saving energy significantly. Conclusively, an energy-aware optimization model which describes the required system constraints was presented in this study, and a further proposal for techniques to determine the best overall solution was also made

    A Modified Route Discovery Approach For Dynamic Source Routing (DSR) Protocol In Mobile Ad-Hoc Networks

    Get PDF
    Mobile Ad-hoc networks (MANETs) involved in many applications, whether commercial or military because of their characteristics that do not depend on the infrastructure as well as the freedom movement of their elements, but in return has caused this random mobility of the nodes many of the challenges, where the routing is considered one of these challenges. There are many types of routing protocols that operate within MANET networks, which responsible for finding paths between the source and destination nodes with the modernization of these paths which are constantly changing due to the dynamic topology of the network stemming from the constant random movement of the nodes. The DSR (Dynamic Source Routing) routing protocol algorithm is one of these routing protocols which consist of two main stages; route discovery and maintenance, where the route discovery algorithm operates based on blind flooding of request messages. blind flooding is considered as the most well known broadcasting mechanism , it is inefficient in terms of communication and resource utilization, which causing increasing the probability of collisions, repeating send several copies of the same message, as well as increasing the delay. Hence, a new mechanism in route discovery stage and in caching the routes in DSR algorithm according to the node's location in the network and the direction of the broadcast is proposed for better performance especially in terms of delay as well as redundant packets rate. The implementation of proposed algorithms showed positive results in terms of delay, overhead, and improve the performance of MANETs in general
    corecore