SlideShare a Scribd company logo
1 of 9
Download to read offline
TELKOMNIKA Telecommunication, Computing, Electronics and Control
Vol. 18, No. 2, April 2020, pp. 613~621
ISSN: 1693-6930, accredited First Grade by Kemenristekdikti, Decree No: 21/E/KPT/2018
DOI: 10.12928/TELKOMNIKA.v18i2.13947  613
Journal homepage: http://journal.uad.ac.id/index.php/TELKOMNIKA
Dynamic multiagent method to avoid duplicated information
at intersections in VANETs
Mohammed I. Habelalmateen1
, A. H. Abbas2
, L. Audah3
, N. A. M. Alduais4
1,2,3
Wireless and Radio Science Centre (WARAS) Faculty of Electrical and Electronic Engineering,
Universiti Tun Hussein Onn Malaysia, Malaysia
2
Communication Engineering Techniques, Imam Jaafar Alsadiq University, Iraq
1
Department of Computer Technical Engineering, College of Technical Engineering, the Islamic University, Iraq
4
Department of Information Security and Web Technology, Faculty of Computer Science and Information Technology,
Universiti Tun Hussein Onn Malaysia, Malaysia
Article Info ABSTRACT
Article history:
Received Aug 21, 2019
Revised Dec 31, 2019
Accepted Jan 16, 2020
Vehicular ad hoc networks (VANETs) allow vehicles to contact one another
to provide safety and comfort applications. However, mobility is a great
challenge in VANETs. High vehicle speed causes topological changes that
result in unstable networks. Therefore, most previous studies focused on
using clustering techniques in roads to reduce the effect of vehicle mobility
and enhance network stability. Vehicles stop moving at intersections,
and their mobility does not impact clustering. However, none of previous
studies discussed the impact of vehicle stopping at intersections on base
stations (BSs). Vehicles that have stopped moving at intersections continue
to send the same information to BSs, which causes duplicated information.
Hence, this study proposes a new method named dynamic multiagent (DMA)
to filter cluster information and prevent duplicated information from being
sent to BSs at intersections. The performance of the proposed method
was evaluated through simulations during the use of DMA and
without-DMA (W-DMA) methods based on real data collected from 10
intersections in Batu Pahat City, Johor, Malaysia. Overall, the proposed
DMA method results in a considerable reduction in duplicated information at
intersections, with an average percentage of 81% from the W-DMA method.
Keywords:
Clustering algorithm
Data dissemination
Intelligent transportation
system (ITS)
Multiagent
Vehicular ad hoc network
(VANET)
This is an open access article under the CC BY-SA license.
Corresponding Author:
A. H. Abbas,
Wireless and Radio Science Centre (WARAS)
Faculty of Electrical and Electronic Engineering,
Universiti Tun Hussein Onn Malaysia, Malaysia.
Email: alsalamy1987@gmail.com, hanif@uthm.edu.my
1. INTRODUCTION
The increase in land vehicles over the last few decades has led to traffic congestion and road
accidents. This reason makes research on connections among vehicles that exchange information a necessity.
This information can be collected from intelligent vehicle networks that are part of intelligent transportation
systems. Intelligent vehicle networks enable vehicles to communicate with one another in what is called
VANETs. VANETs are a subpart of mobile ad hoc networks that have attracted the attention of researchers
and industries [1]. VANETs have two types of communication. The first type is vehicle-to-vehicle
communication in which a vehicle communicates directly with other vehicles within the same transmission
range (TR). This type of communication does not incur costs and has easy-to-establish networks, but it faces
 ISSN: 1693-6930
TELKOMNIKA Telecommun Comput El Control, Vol. 18, No. 2, April 2020: 613 - 621
614
disconnection problems when vehicle density is low [2, 3]. Therefore, vehicle-to-vehicle communication
cannot be applied in sparse areas. The second type is vehicle-to-infrastructure communication in which
vehicles communicate with roadside units (RSUs). This communication type can be expensive, and RSUs
have a limited coverage area (500 m to 800 m) and may not be allowed to be installed in several places [4, 5].
Clustering was proposed to address these challenges [6]. Clusters are groups of vehicles in a specific
TR. This group has a leader called cluster head (CH), and all remaining vehicles are called cluster members
(CMs). The CH is the manager of the group, and all CMs can communicate with one another and send
information to the CH. Only the CH can communicate with the base station (BS) and send information about
its CMs [7]. High vehicle mobility affects cluster stability and data dissemination. Thus, most previous
studies focused only on cluster stability [8-12], data dissemination among cluster vehicles [13], detected
the traffic congestion in the city by using clustering techniques in [14] and analyzed routing protocols
of clustering in VANETs [15, 16]. Only a few studies have focused on clustering at intersections.
When vehicles stop at intersections, mobility ceases to affect clusters, but clusters continue to send vehicle
information to BSs. Most information sent to BSs at intersections is consequently duplicated information.
Clusters should be stopped from sending vehicle information at intersections due to network stopping,
and clusters should be reformed and the CH be re-elected after intersections. This study proposes
the dynamic multiagent (DMA) method to solve the problem of duplicated information being received from
immobile vehicles at intersections. The main contributions of this study are as follows:
− It proposes a new method called DMA to prevent unnecessary information from being resent to BSs when
vehicles stop at an intersection.
− This is the first study based on real data collected from monitoring the intersections in Batu Pahat City,
Johor, Malaysia by using Arduino Uno, Global Positioning System (GPS) and external antennas to form
accurate locations.
− It provides evaluation and validation by comparing the use and disuse of DMA using
MATLAB simulations.
2. RELATED WORK
This section introduces previous works that used clustering at intersections in VANETs. The main
challenge at intersections is the high number of vehicles (N.O.V), which results in a large number of
connections that increase network load, disconnections, flooding and packet drop. In [17] proposed
a direction-based clustering algorithm to estimate vehicle density at intersections. The authors assumed that
immobile vehicles do not disseminate information, which causes network disconnections. CHs must know
CM information during this time.
In [18] proposed a real-time vehicular communication (RTVC) framework that enables stable
communication among vehicles in urban and highway scenarios. In [19] proposed a multiagent-driven
dynamic clustering scheme to dynamically form clusters and efficiently disseminate information after
vehicles pass through intersections. In [20] proposed the cluster-based location service (CBLS) protocol to
avoid sending and receiving upgrade and query packets from a location server (BSs).
In [21] proposed geographic routing over VANETs (GROOV) to select the best path to send vehicle
information at intersections based on specific relay vehicles. In [22] introduced the nearest intersection
location-dependent dissemination of traffic information (NILDD) to reduce channel congestion
by forwarding traffic update messages to a specific destination. This method reduces the number of
forwarded messages but duplicates messages sent to the BSs at intersections. In [23] proposed
the traffic-aware intersection-based geographical routing (TIGeR) protocol to improve packet dissemination
efficiency at intersections.
In previous [24] suggested an efficient road-based directional (ERD) broadcast protocol to
disseminate vehicle information in all directions at intersections using a relay vehicle. This method
disseminates vehicle information at intersections, but data continue to be duplicated which increases
the number of unnecessary information sent to BSs. Most previous works that discussed intersection
clustering did not focus on a number of duplicated messages sent from clusters to BSs. Therefore, the current
study proposes a new method named DMA to avoid unnecessary information from being sent to BSs
at intersections with no lost connections among vehicles. The DMA method uses a specific intelligent agent
vehicle (IAV) that receives and stores cluster information for comparison with future information. The IAV
drops duplicated information and only sends new information to the BS. Table 1 summaries previous studies.
TELKOMNIKA Telecommun Comput El Control 
Dynamic multiagent method t avoid duplicated information… (Mohammed I. Habelalmateen)
615
3. RESEARCH METHOD
Based on related works, most of previous methods studied vehicles stop at intersection not focus on
the load at BSs that result from number of uplinks connection and duplicated information sent from vehicles
to the BSs. Therefore, to solve these issues proposed DMA method. The work of the DMA method starts
after a cluster is formed therefore, the DMA method used the same cluster formation method as in [25].
In this study proposed the DMA method to control the uplink connections between BSs and CHs at
intersections to prevent duplicated information from being broadcasted to BSs at intersections. Table 1
represent the related work.
Table 1. Summary of related works
Ref. Method name Problem Purpose Software Simulated area Outcome
[4]
Direction-based
clustering algorithm
Data
dissemination
Managing traffic at
intersections
NCTUns tools 3000 × 3000 m
Decrease in packet
flooding
[5] RTVC
Maintaing
message
dissemination
Establishing stable
communication among
vehicles
NS 2 NaN Lower overhead
[6]
Multiagent-driven
dynamic clustering
scheme
Link failures Cluster formation
‘C’
programming
NaN
Controlled
overhead
[7] CBLS
Number of
messages
Avoiding upgrade
packets
OMNET++ 2000 × 2000 m
Avoidance of
network congestion
[8] GROOV
Varying
topographies
Selecting the best route
at intersections
GloMoSim 1600 × 1600 m
Increased packet
delivery ratio
[9] NILDD
Updating
traffic
messages
Reducing channel
congestion by
forwarding traffic
update messages
NS 2 5000 × 3000 m
Reduction in
unnecessary
bandwidth
utilisation
[10] TIGeR
Packet
dissemination
Electing the best routes
towards a destination
TraNS v1.2 3500 × 4000 m
Improved packet
delivery ratio
[11] ERD
Data
dissemination
Increasing
the chance of
propagating data in all
directions
NS 2
1200 × 600 m Increased packet
efficiency
3.1. DMA election
Each vehicle at an intersection broadcasts an intersection message (INT-MES) that contains
information on CMs and the number of CHs (N.O.CH) within its TR. The vehicle with the highest N.O.CH
broadcasts an agent beacon (AgB) to inform other vehicles to change their state to agent CH (ACH). If more
than one vehicle has the highest N.O.CH, then the first vehicle to broadcast an AgB becomes the ACH. Other
vehicles stop competing after receiving the AgB. Figure 1 shows a flow chart for ACH election. Table 2
shows the symbols used in this paper.
Table 2. List of symbols
Symbol Description
DMA Dynamic multiagent
INT-MES Intersection message
N.O.CH Number of CHs
AgB Agent beacon
ACH Agent CH
BSCH Base station CH
INCH Inter-CH
ETM End time messages
BS Base station
TR Transmission range
𝑁𝐿 Number of road lanes
𝑑 Distance between two vehicles
𝑉𝐿 Vehicle length
𝑁. 𝑂. 𝑉 Number of vehicles
𝐶𝑀 Cluster member
𝐶𝐻 Cluster head
W-DMA Without dynamic multiagent
NPS-to BS-at
intersections
Number of packets sent to BSs at
intersections
Figure 1. ACH election flow chart
 ISSN: 1693-6930
TELKOMNIKA Telecommun Comput El Control, Vol. 18, No. 2, April 2020: 613 - 621
616
3.2. ACH operations
The operation of ACH explain in the following stepes:
− After a vehicle becomes an ACH, it sends a message to stop other vehicles from trying to become
the ACH and inform CHs to contact the ACH.
− The ACH broadcasts a message containing the ID of the CH with the highest receiving signal strength
(RSS). If more than one CH has the same RSS, then the one closest to the BS is selected.
When CHs receive this message, they check its ID. The CH with a matching ID remains connected to
the BS and becomes a BS-CH (BSCH); otherwise, it disconnects from the BS and becomes an inter-CH
(INCH). Clusters in this state send cluster information to the ACH and not to the BS. The INCH sends
cluster information to the ACH every 3 s. The ACH filters this information by comparing it to previous
information for the same cluster. ACHs drop vehicle information similar to information previously
received from a cluster. The remaining INCH information is sent to the BS through the BSCH
to prevent unnecessary messages and reduce the number of BS uplinks.
− When a traffic light turns green, ACHs send end time messages (ETMs) before a red traffic light changes
to inform INCHs to re-establish communication with the BS before they move, after which
the ACH returns to its previous state. Figure 2 shows a flow chart for ACH operations.
3.3. Benefit using ACH
The benefits of using ACHs are as follows:
− ACHs filter cluster information and remove duplicate CM vehicle information. Duplicate CH information
is retained; thus, the BS can track the N.O.CH in the network.
− ACHs reduce the number of uplinks between CHs and BS at intersections by making only one CH
(BSCH) connect to the BS. The BSCH relays CH information to the BS with the help of ACHs. Instead
of every cluster within 300 m being connected, the use of an ACH means that only one cluster needs to be
connected every 300 m when vehicles stop moving.
Figure 2. ACH operation flow chart
TELKOMNIKA Telecommun Comput El Control 
Dynamic multiagent method t avoid duplicated information… (Mohammed I. Habelalmateen)
617
3.4. Reasons for using DMA at intersections and numerical analysis
Vehicles at intersections stop moving, which makes the information they send to CHs unimportant.
Most of this information is duplicated, because vehicles do not change their speed, location, direction,
relative distance and relative speed whilst they stop. Stopping vehicles from broadcasting their information
also destroys networks, because each cluster must know the situation of its members. Using DMA at
intersections solves these issues by preventing duplicated messages from being sent to the BS, thereby
improving network efficiency.
Based on [26-28], TR was 300 m. The N.O.V within a TR was calculated by [29] using (1).
𝑁. 𝑂. 𝑉 = 𝑁𝐿 ∗
𝑇𝑅
𝑑 + 𝑉𝐿
(1)
This study focused on Batu Pahat City in Johor, Malaysia with a TR of 300 m and three lanes for each road
(NL). The average vehicle length (VL) was 3 m. This study focused on times when roads were crowded;
hence, the distance between any two vehicles (d) was 1 m. The N.O.V within a 300 m TR was
as follows:
N.O.V = 3 * 300/(1 + 3) = 225 vehicles
each cluster at an intersection had 225 vehicles. A cluster had a limited number of CMs (maximum number
of CMs in each cluster was 20) according to [21]. Therefore, these vehicles were divided into several
clusters. The number of clusters (N.O.C) resulting from 225 vehicles was calculated by using (2).
𝑁. 𝑂. 𝐶 =
𝑁. 𝑂. 𝑉
𝐶𝑀𝑠 + 𝐶𝐻
(2)
The N.O.C was 11, which meant that 11 uplinks exist within 300 m of each intersection. According
to the Malaysian traffic light system, the minimum waiting time at an intersection is 30 s, with 3 s for standby
(yellow light traffic) and a maximum waiting time of 99 s. The total waiting time at an intersection varied
between 33 and 102 s. Each CH transmitted cluster information every 3 s in this study. The number
of messages sent from each CH whilst waiting varied between 11 and 34, which made the total number
of messages sent from 11 clusters in the same TR vary between 121 and 374. Most of these messages were
duplicates, because vehicles had stopped moving. This condition led to reduced network efficiency
and increased BS load. This study proposed the DMA method to solve these issues. The DMA aims to reduce
the number of uplink connections that come from a large N.O.CH at BSs and to filter unnecessary cluster
information by removing duplicated vehicle information from being resent to BSs.
4. SIMULATION
Cluster formation and CH election were based on our previous work in [25]. The current study
provided an in-depth analysis of unnecessary messages from the use and disuse of DMA method at
intersections based on real data. The data were collected by monitoring an intersection in Batu Pahat, Johor,
Malaysia, that is, at Jalan Kluang, 83300 Sri Gading, Johor (1.85574, 103.01377) to Jalan Tanjong Laboh
Batu 8 1/2, Johor, 83200 Senggarang, Johor (1.79225, 102.96596).
4.1. Simulation parameters
Evaluation and validation were performed according to the following parameters.
− For an intersection with 100 vehicles, the N.O.CH varied randomly between 1 and 4 for a 300 m TR.
− For an intersection with 200 vehicles, the N.O.CH varied randomly between 4 and 6 for a 300 m TR.
− For an intersection with 300 vehicles, the N.O.CH varied randomly between 6 and 8 for a 300 m TR.
− For an intersection with 400 vehicles, the N.O.CH varied randomly between 8 and 10 for a 300 m TR.
− For an intersection with 575 vehicles, the N.O.CH varied randomly between 9 and 11 for a 300 m TR.
− Crowded areas before an intersection were set as 300 m for the scenario with 100 vehicles, 300 m for
the scenario with 200 vehicles, 600 m for the scenario with 300 vehicles, 900 m for the scenario with 400
vehicles and 1.2 km for the scenario with 575 vehicles. Table 3 shows a summary of intersection
simulation parameters, and Table 4 shows a summary of network simulation parameters.
 ISSN: 1693-6930
TELKOMNIKA Telecommun Comput El Control, Vol. 18, No. 2, April 2020: 613 - 621
618
Table 3. Intersection simulation parameters
N.O.V
N.O.CH at
intersection
Crowded area
before intersection
100 1 to 4 300 m
200 4 to 6 (300-600) m
300 6 to 8 (400-700) m
400 8 to 10 900 m
575 9 to 11 1.2 km
Table 4. Simulation parameters used in the network
Parameters Values
Average vehicle
length
3 m
Space between cars
1 m when crowded and more than
4 m in other scenarios
Road length 17.8 km
Area of work
Batu Pahat, Johor, Malaysia
between Jalan Kluang, 83300 Sri
Gading, Johor and Jalan Tanjong
Laboh Batu 8 1/2, Johor, 83200
Senggarang, Johor
Transmission range 300 m
Number of vehicles 100, 200, 300, 400 and 575
Time spent by
vehicles at
intersections
33 s to 102 s
Number of
intersections
10
Data collection
method
Arduino, external antenna, and
GPS
Number of iterations 100
4.2. Result and analysis
This section presents an evaluation of the use (DMA) and without DMA (W-DMA) of the DMA
method at intersections. The DMA method was used in this study to reduce the number of unnecessary
messages that were sent from vehicles at intersections to BSs. Evaluation was conducted according to
the number of packets sent to BSs at intersections (NPS-to BS-at Intersections) for different vehicle densities.
Figure 3 shows the simulation results for 100 vehicles at an intersection with a TR of 300 m.
Figure 3 shows that when the DMA method was not used, more packets were sent to intersection
BSs, because each vehicle sent scenario updates every 3 s. In contrast, when several vehicles were at
an intersection, considerable information that was the same as a previous message was sent, thereby
increasing the number of unnecessary messages. Using DMA resulted in a reduction in the number
of messages being sent to intersection BSs, because DMA prevents duplicated messages from being resent.
Without DMA, all CHs remained connected to intersection BSs. When DMA was used, only one uplink
existed in every 300 m TR, which reduced the total number of uplink connections. With 100 vehicles at
an intersection, the W-DMA method had five CHs, whereas the DMA system had one CH. Table 5 shows
the average reduction percentage for 100 vehicles with DMA.
Table 5 shows that the number of sent messages depended on the number of times that vehicles
stopped at the intersection. Therefore, the number of messages sent increased with increased stop time
for both methods. However, DMA showed an average reduction percentage of 59.42% less than that of
W-DMA. According to [30], an increase in N.O.V results in an increase in the number of uplink connections.
Figure 4 shows the simulation results for 200 vehicles at an intersection.
Figure 3. NPS-to BS-at intersections when
TR=300 m and N.O. V= 100
Figure 4. NPS-to BS-at intersections when
TR=300 m and N.O. V= 200
TELKOMNIKA Telecommun Comput El Control 
Dynamic multiagent method t avoid duplicated information… (Mohammed I. Habelalmateen)
619
Figure 4 shows that an increase in N.O.V to 200 at intersection resulted in an increase in the number
of uplinks for W-DMA, because each cluster had the maximum number of CMs. Therefore, the N.O.CH with
200 vehicles was 10 for W-DMA. When using DMA, only one uplink connection existed, because the 10
CHs connected to 1 DMA vehicle that filtered messages sent to the BS. The number of sent messages in both
methods increased, although DMA had fewer sent messages than W-DMA. Table 5 shows the average
reduction percentage for 200 vehicles with DMA. Table 5 shows that the use of the DMA method reduced
the messages sent to BSs by 80% compared with the W-DMA method. This result was caused by the 200
vehicles that were stopped at the intersection; these vehicles were divided into 10 clusters, and each cluster
had 1 CH that was responsible for connecting to the BS. When using DMA, these 10 CHs connected to
1 DMA, and only this DMA connected to the BS. Therefore, using DMA reduced the number of uplinks
from 10 to 1 at intersections in addition to removing duplicated vehicle information through filtering.
Figure 5 shows the simulation results for 300 vehicles at an intersection for both methods.
In Figure 5, the increased N.O.V at an intersection led to an increased number of uplink
connections, which resulted in an increased number of messages. However, DMA showed fewer uplink
connections than the W-DMA method, because each cluster had the maximum number of CMs in
the W-DMA method. Therefore, the N.O.CH within a 300 m TR was 15. The use of DMA reduced
the number of uplink connections to 2, because each DMA had 11 CHs. One DMA had 11 CHs, whereas
the other had 4 CHs. W-DMA did not control messages, which resulted in many messages being sent to
the BS. The use of DMA reduced the number of the sent messages, because DMA filtered out duplicated
messages from immobile vehicles. Table 5 shows the average reduction percentage for 300 vehicles with
and without DMA.
Table 5 shows that the use of DMA reduced the messages being sent to the BS by 86%
over W-DMA. When using DMA with 300 vehicles, only 2 DMAs sent information to BSs. By contrast,
the W-DMA method resulted in 15 uplink connections sending necessary and unnecessary information to
BSs. In crowded conditions, the N.O.V on the specific road covered by this study increased to 400 vehicles,
which increased the N.O.V stopped at intersections. Therefore, this section focuses on the analysis of 400
vehicles at an intersection, as shown in Figure 6.
Figure 6 shows that the increase in N.O.V to 400 at an intersection resulted in an increase in
the number of messages sent to BSs because of the increase in the number of uplinks. However, the number
of increased messages for the W-DMA method was greater than that for the DMA; the W-DMA method had
20 uplink connections, whereas the DMA had 2. The messages sent by the W-DMA method contained
necessary and unnecessary information. In DMA, only necessary information was sent to intersection BSs.
Table 5 shows the average reduction percentage for 400 vehicles with and without DMA.
Table 5 shows that the use of DMA reduced the number of messages sent to BSs by 89%
compared with W-DMA. When using DMA with 400 vehicles, only 2 DMAs sent information to the BSs.
In the W-DMA method, 20 uplink connections sent necessary and unnecessary information. In crowded
conditions, 575 vehicles existed at an intersection, which resulted in considerable uplink connections
and messages being sent to BSs. Figure 7 shows the effect of 575 vehicles being present at intersections.
Figure 7 shows that the increased N.O.V at an intersection resulted in an increased number of
uplinks and sent messages for both methods. The number of uplinks was 3 when using DMA, whereas it was
29 for W-DMA. Increased uplinks resulted in an increased number of messages being sent to intersection
BSs. The increased stop time of vehicles (red light traffic) at the intersection also increased the number of
messages being sent to BSs. Table 5 shows the average reduction percentage for 575 vehicles with
and without DMA. Table 5 shows that the use of DMA reduced the amount of messages sent to BSs by 90%
compared with W-DMA. Only 3 DMAs sent necessary information to BSs when using DMA with 575
vehicles, whereas 29 uplink connections sent necessary and unnecessary information in the W-DMA method.
Table 5. Reduction percentage in packets sent at intersections form 100 to 575 vehicles
No. 100 vehicles 200 vehicles 300 vehicles 400 vehicles 575 vehicles
1 60.53% 80.41% 85.93% 89.00% 90.05%
2 59.21% 79.89% 85.38% 89.06% 90.00%
3 58.82% 79.31% 85.77% 88.92% 89.98%
4 59.38% 80.61% 85.32% 88.98% 90.06%
5 60.00% 80.00% 85.54% 88.86% 89.98%
6 60.47% 80.09% 85.67% 88.91% 89.99%
7 61.82% 79.59% 85.79% 89.04% 89.92%
8 57.45% 79.28% 85.83% 89.03% 89.99%
9 60.00% 79.73% 85.86% 88.87% 89.92%
10 56.57% 79.93% 85.81% 88.98% 89.96%
 ISSN: 1693-6930
TELKOMNIKA Telecommun Comput El Control, Vol. 18, No. 2, April 2020: 613 - 621
620
Figure 5. NPS-to BS-at intersections when
TR=300 m and N.O. V=300
Figure 6. NPS-to BS-at intersections when
TR=300 m and N.O. V=400
Figure 7. NPS-to BS-at intersections when TR=300 m and N.O. V=575
5. CONCLUSION AND FUTURE WORK
This study proposes the DMA method to avoid duplicated information from being sent to BSs
at intersections to reduce unnecessary messages in VANETs. The DMA uses IAVs, which are vehicles
that receive and store information from a large N.O.CH. The IAVs compare their stored information with
the contents of new messages to eliminate duplicated information and ensure that only new information
is sent to BSs. In this method, CHs continue to receive information from CMs, although they have stopped
moving at an intersection to prevent network disconnections. BSs receive only new information from CHs.
Evaluation was conducted using MATLAB software. The evaluation of this study investigated the use
(DMA) and disuse (W-DMA) of the proposed method at intersections. The results show that the DMA
method reduces the average amount of unnecessary messages by 81% compared with the W-DMA method.
Future works can analyse and evaluate DMA’s performance in scenarios in which vehicles move among
intersections in reducing unnecessary information and under highway conditions.
REFERENCES
[1] A. Mehmood, A. Khanan, A. H. H. M. Mohamed, S. Mahfooz, H. Song, and S. Abdullah, “ANTSC: An intelligent
naive Bayesian probabilistic estimation practice for traffic flow to form stable clustering in VANET,” IEEE Access,
vol. 6, pp. 4452–4461, 2018.
[2] V. Vukadinovic et al., “3GPP C-V2X and IEEE 802.11p for vehicle-to-vehicle communications in highway
platooning scenarios,” Ad Hoc Networks, vol. 74, pp. 17–29, 2018.
TELKOMNIKA Telecommun Comput El Control 
Dynamic multiagent method t avoid duplicated information… (Mohammed I. Habelalmateen)
621
[3] G. Yan and D. B. Rawat, “Vehicle-to-vehicle connectivity analysis for vehicular ad-hoc networks,” Ad Hoc
Networks, vol. 58, pp. 25–35, 2017.
[4] M. Hoeft and J. Rak, “How to provide fair service for V2I communications in VANETs?,” Ad Hoc Networks,
vol. 37, pp. 283–294, 2016.
[5] E. Ndashimye, S. K. Ray, N. I. Sarkar, and J. A. Gutiérrez, “Vehicle-to-infrastructure communication over multi-tier
heterogeneous networks: A survey,” Comput. Networks, vol. 112, pp. 144–166, 2017.
[6] S. Vodopivec, J. Bešter, and A. Kos, “A survey on clustering algorithms for vehicular ad-hoc networks,” in 35th
International Conference on Telecommunications and Signal Processing (TSP), pp. 52–56, 2012.
[7] M. S. Talib, A. Hassan, B. Hussin, and A. A. Hassan, “Vehicular ad-hoc networks: Current challenges and future
direction of research,” Jour. Adv. Res. Dyn. Control Syst., vol. 10, no. 2, pp. 2065–2074, 2018.
[8] M. Ren, L. Khoukhi, H. Labiod, J. Zhang, and V. Vèque, “A mobility-based scheme for dynamic clustering in
vehicular ad-hoc networks (VANETs),” Veh. Commun., vol. 9, pp. 233–241, 2017.
[9] M. S. Talib, A. Hassan, B. Hussin, Z. A. Abas, Z. S. Talib, and Z. S. Rasoul, “A Novel Stable Clustering Approach
based on Gaussian Distribution and Relative Velocity in VANETs,” International Journal of Advanced Computer
Science and Applications, vol. 9, no. 4, pp. 216-220, 2018.
[10] C J.-H. Kwon, H. S. Chang, T. Shon, J.-J. Jung, and E.-J. Kim, “Neighbor stability-based VANET clustering for
urban vehicular environments,” The Journal Supercomputing, vol. 72, no. 1, pp. 161–176, 2016.
[11] A. Abuashour and M. Kadoch, “Performance improvement of cluster-based routing protocol in VANET,” IEEE
Access, vol. 5, pp. 15354–15371, 2017.
[12] W. Qi, Q. Song, X. Wang, L. Guo, and Z. Ning, “SDN-enabled social-aware clustering in 5G-VANET systems,”
IEEE Access, vol. 6, pp. 28213–28224, 2018.
[13] M. S. Talib, A. Hassan, B. Hussin, Z. S. Talib, Z. S. Rasoul, and M. Sammour, “Data dissemination based clustering
techniques for VANETs: A review,” J. Adv. Res. Dyn. Control Syst, vol. 10, no. 4, pp. 596–604, 2018.
[14] A. Mohanty, S. Mahapatra, and U. Bhanja, “Traffic congestion detection in a city using clustering techniques in
VANETs,” Indonesian Journal of Electrical Engineering and Computer Science, vol. 13, no. 2, pp. 884-891, 2019.
[15] M. H. Alwan, K. N. Ramli, Y. A. Al-Jawher, A. Z. Sameen, and H. F. Mahdi, “Performance comparison between
802.11 and 802.11 p for high speed vehicle in VANET,” International Journal of Electrical and Computer
Engineering (IJECE), vol. 9, no. 5, pp. 3687-3694, 2019.
[16] T. O. Fahad and A. A. Ali, “Compressed fuzzy logic based multi-criteria AODV routing in VANET environment,”
International Journal of Electrical and Computer Engineering (IJECE), vol. 9, no. 1, pp. 397-401, 2019.
[17] N. Maslekar, M. Boussedjra, J. Mouzna, and L. Houda, “Direction based clustering algorithm for data dissemination
in vehicular networks,” in Vehicular Networking Conference (VNC), pp. 1–6, 2009.
[18] W. Farooq, M. Ali Khan, and S. Rehman, “A novel real time framework for cluster based multicast communication
in vehicular ad hoc networks,” Int. J. Distrib. Sens. Networks, vol. 12, no. 4, pp. 1-18, 2016.
[19] M. S. Kakkasageri and S. S. Manvi, “Multiagent driven dynamic clustering of vehicles in VANETs,” J. Netw.
Comput. Appl., vol. 35, no. 6, pp. 1771-1780, 2012.
[20] S. Asoudeh, M. Mehrjoo, N.-M. Balouchzahi, and A. Bejarzahi, “Location service implementation in vehicular
networks by nodes clustering in urban environments,” Veh. Commun., vol. 9, pp. 109–114, 2017.
[21] S. K. Dhurandher, M. S. Obaidat, D. Bhardwaj, and A. Garg, “GROOV: A geographic routing over VANETs and its
performance evaluation,” in IEEE Global Communications Conference (GLOBECOM), pp. 1670–1675, 2012.
[22] B. B. Dubey, N. Chauhan, and L. K. Awasthi, “Nildd: Nearest intersection location dependent dissemination of
traffic information in vanets,” in Proceedings of the 2011 International Conference on Communication, Computing
and Security, pp. 96–99, 2011.
[23] R. Tavakoli and M. Nabi, “TIGeR: A traffic-aware intersection-based geographical routing protocol for urban
VANETs,” in IEEE 77th Vehicular Technology Conference (VTC Spring), pp. 1–5, 2013.
[24] L.-C. Tung and M. Gerla, “An efficient road-based directional broadcast protocol for urban VANETs,” in IEEE
vehicular networking conference, New Jersey, pp. 9–16, 2010.
[25] A. H. Abbas, L. Audah, and N. A. M. Alduais, “An efficient load balance algorithm for vehicular ad-hoc network,”
in Electrical Power, Electronics, Communications, Controls and Informatics Seminar, pp. 207–212, 2018.
[26] Z. Khan and P. Fan, “A multi-hop moving zone (MMZ) clustering scheme based on cellular-V2X,” China
Commun., vol. 15, no. 7, pp. 55–66, 2018.
[27] S. Ucar, S. C. Ergen, and O. Ozkasap, “Multihop cluster based IEEE 802.11 p and LTE hybrid architecture for
VANET safety message dissemination,” IEEE Trans. Veh. Technol., vol. 65, no. 4, pp. 2621-2636, 2016.
[28] I. Ahmad et al., “VANET-LTE based heterogeneous vehicular clustering for driving assistance and route planning
applications,” Comput. Networks, vol. 145, pp. 128–140, 2018.
[29] A. Daeinabi, A. G. P. Rahbar, and A. Khademzadeh, “VWCA: An efficient clustering algorithm in vehicular ad hoc
networks,” J. Netw. Comput. Appl., vol. 34, no. 1, pp. 207–222, 2011.
[30] A. H. Abbas, Mohammed I. Habelalmateen, L. Audah and N.A.M. Alduais, “A novel intelligent cluster-head (ICH)
to mitigate the handover problem of clustering in VANETs,” International Journal of Advanced Computer Science
and Applications (IJACSA), vol. 10, no. 6, pp. 194-203, 2019.

More Related Content

What's hot

PERFORMANCE ANALYSIS OF ROUTING PROTOCOLS WITH ROADSIDE UNIT INFRASTRUCTURE I...
PERFORMANCE ANALYSIS OF ROUTING PROTOCOLS WITH ROADSIDE UNIT INFRASTRUCTURE I...PERFORMANCE ANALYSIS OF ROUTING PROTOCOLS WITH ROADSIDE UNIT INFRASTRUCTURE I...
PERFORMANCE ANALYSIS OF ROUTING PROTOCOLS WITH ROADSIDE UNIT INFRASTRUCTURE I...IJCNCJournal
 
International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)inventionjournals
 
INTELLIGENT INFORMATION DISSEMINATION IN VEHICULAR AD HOC NETWORKS
INTELLIGENT INFORMATION DISSEMINATION IN VEHICULAR AD HOC NETWORKSINTELLIGENT INFORMATION DISSEMINATION IN VEHICULAR AD HOC NETWORKS
INTELLIGENT INFORMATION DISSEMINATION IN VEHICULAR AD HOC NETWORKSijasuc
 
Simulation Based Analysis of Bee Swarm Inspired Hybrid Routing Protocol Param...
Simulation Based Analysis of Bee Swarm Inspired Hybrid Routing Protocol Param...Simulation Based Analysis of Bee Swarm Inspired Hybrid Routing Protocol Param...
Simulation Based Analysis of Bee Swarm Inspired Hybrid Routing Protocol Param...Editor IJCATR
 
A Proposed Model for Radio Frequency Systems to Tracking Trains via GPS
A Proposed Model for Radio Frequency Systems to Tracking Trains via GPSA Proposed Model for Radio Frequency Systems to Tracking Trains via GPS
A Proposed Model for Radio Frequency Systems to Tracking Trains via GPSHossam Al-Ansary
 
Group based algorithm to manage access
Group based algorithm to manage accessGroup based algorithm to manage access
Group based algorithm to manage accessijwmn
 
A new approach in position-based routing Protocol using learning automata for...
A new approach in position-based routing Protocol using learning automata for...A new approach in position-based routing Protocol using learning automata for...
A new approach in position-based routing Protocol using learning automata for...ijasa
 
Multicast routing protocol for advanced vehicular ad hoc networks
Multicast routing protocol for advanced vehicular ad hoc networksMulticast routing protocol for advanced vehicular ad hoc networks
Multicast routing protocol for advanced vehicular ad hoc networksTELKOMNIKA JOURNAL
 
An Analytical Review of the Algorithms Controlling Congestion in Vehicular Ne...
An Analytical Review of the Algorithms Controlling Congestion in Vehicular Ne...An Analytical Review of the Algorithms Controlling Congestion in Vehicular Ne...
An Analytical Review of the Algorithms Controlling Congestion in Vehicular Ne...iosrjce
 
Optimal content downloading in vehicular network with density measurement
Optimal content downloading in vehicular network with density measurementOptimal content downloading in vehicular network with density measurement
Optimal content downloading in vehicular network with density measurementZac Darcy
 
Differential Evolution Based Secured Routing Protocols for VANETs
Differential Evolution Based Secured Routing Protocols for VANETsDifferential Evolution Based Secured Routing Protocols for VANETs
Differential Evolution Based Secured Routing Protocols for VANETsIJCSIS Research Publications
 
Control of A Platoon of Vehicles in Vanets using Communication Scheduling Pro...
Control of A Platoon of Vehicles in Vanets using Communication Scheduling Pro...Control of A Platoon of Vehicles in Vanets using Communication Scheduling Pro...
Control of A Platoon of Vehicles in Vanets using Communication Scheduling Pro...IRJET Journal
 
Ijartes v1-i1-004
Ijartes v1-i1-004Ijartes v1-i1-004
Ijartes v1-i1-004IJARTES
 
Disseminating Traffic Information in Vehicular Networks
Disseminating Traffic Information in Vehicular NetworksDisseminating Traffic Information in Vehicular Networks
Disseminating Traffic Information in Vehicular NetworksEswar Publications
 
IRJET- An Incentive Framework for Cellular Traffic Offloading
IRJET-  	  An Incentive Framework for Cellular Traffic OffloadingIRJET-  	  An Incentive Framework for Cellular Traffic Offloading
IRJET- An Incentive Framework for Cellular Traffic OffloadingIRJET Journal
 

What's hot (19)

VANET Clustering Survey
VANET Clustering SurveyVANET Clustering Survey
VANET Clustering Survey
 
PERFORMANCE ANALYSIS OF ROUTING PROTOCOLS WITH ROADSIDE UNIT INFRASTRUCTURE I...
PERFORMANCE ANALYSIS OF ROUTING PROTOCOLS WITH ROADSIDE UNIT INFRASTRUCTURE I...PERFORMANCE ANALYSIS OF ROUTING PROTOCOLS WITH ROADSIDE UNIT INFRASTRUCTURE I...
PERFORMANCE ANALYSIS OF ROUTING PROTOCOLS WITH ROADSIDE UNIT INFRASTRUCTURE I...
 
International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)
 
INTELLIGENT INFORMATION DISSEMINATION IN VEHICULAR AD HOC NETWORKS
INTELLIGENT INFORMATION DISSEMINATION IN VEHICULAR AD HOC NETWORKSINTELLIGENT INFORMATION DISSEMINATION IN VEHICULAR AD HOC NETWORKS
INTELLIGENT INFORMATION DISSEMINATION IN VEHICULAR AD HOC NETWORKS
 
Simulation Based Analysis of Bee Swarm Inspired Hybrid Routing Protocol Param...
Simulation Based Analysis of Bee Swarm Inspired Hybrid Routing Protocol Param...Simulation Based Analysis of Bee Swarm Inspired Hybrid Routing Protocol Param...
Simulation Based Analysis of Bee Swarm Inspired Hybrid Routing Protocol Param...
 
A Proposed Model for Radio Frequency Systems to Tracking Trains via GPS
A Proposed Model for Radio Frequency Systems to Tracking Trains via GPSA Proposed Model for Radio Frequency Systems to Tracking Trains via GPS
A Proposed Model for Radio Frequency Systems to Tracking Trains via GPS
 
Group based algorithm to manage access
Group based algorithm to manage accessGroup based algorithm to manage access
Group based algorithm to manage access
 
A new approach in position-based routing Protocol using learning automata for...
A new approach in position-based routing Protocol using learning automata for...A new approach in position-based routing Protocol using learning automata for...
A new approach in position-based routing Protocol using learning automata for...
 
Multicast routing protocol for advanced vehicular ad hoc networks
Multicast routing protocol for advanced vehicular ad hoc networksMulticast routing protocol for advanced vehicular ad hoc networks
Multicast routing protocol for advanced vehicular ad hoc networks
 
L011138596
L011138596L011138596
L011138596
 
An Analytical Review of the Algorithms Controlling Congestion in Vehicular Ne...
An Analytical Review of the Algorithms Controlling Congestion in Vehicular Ne...An Analytical Review of the Algorithms Controlling Congestion in Vehicular Ne...
An Analytical Review of the Algorithms Controlling Congestion in Vehicular Ne...
 
Optimal content downloading in vehicular network with density measurement
Optimal content downloading in vehicular network with density measurementOptimal content downloading in vehicular network with density measurement
Optimal content downloading in vehicular network with density measurement
 
Mercury
MercuryMercury
Mercury
 
Differential Evolution Based Secured Routing Protocols for VANETs
Differential Evolution Based Secured Routing Protocols for VANETsDifferential Evolution Based Secured Routing Protocols for VANETs
Differential Evolution Based Secured Routing Protocols for VANETs
 
Control of A Platoon of Vehicles in Vanets using Communication Scheduling Pro...
Control of A Platoon of Vehicles in Vanets using Communication Scheduling Pro...Control of A Platoon of Vehicles in Vanets using Communication Scheduling Pro...
Control of A Platoon of Vehicles in Vanets using Communication Scheduling Pro...
 
Ijartes v1-i1-004
Ijartes v1-i1-004Ijartes v1-i1-004
Ijartes v1-i1-004
 
Ag4103191195
Ag4103191195Ag4103191195
Ag4103191195
 
Disseminating Traffic Information in Vehicular Networks
Disseminating Traffic Information in Vehicular NetworksDisseminating Traffic Information in Vehicular Networks
Disseminating Traffic Information in Vehicular Networks
 
IRJET- An Incentive Framework for Cellular Traffic Offloading
IRJET-  	  An Incentive Framework for Cellular Traffic OffloadingIRJET-  	  An Incentive Framework for Cellular Traffic Offloading
IRJET- An Incentive Framework for Cellular Traffic Offloading
 

Similar to Dynamic multiagent method to avoid duplicated information at intersections in VANETs

Predictive Data Dissemination in Vanet
Predictive Data Dissemination in VanetPredictive Data Dissemination in Vanet
Predictive Data Dissemination in VanetDhruvMarothi
 
AN OPTIMAL ROUTE DISCOVERY USING BIOGEOGRAPHY BASED OPTIMIZATION FOR VEHICULA...
AN OPTIMAL ROUTE DISCOVERY USING BIOGEOGRAPHY BASED OPTIMIZATION FOR VEHICULA...AN OPTIMAL ROUTE DISCOVERY USING BIOGEOGRAPHY BASED OPTIMIZATION FOR VEHICULA...
AN OPTIMAL ROUTE DISCOVERY USING BIOGEOGRAPHY BASED OPTIMIZATION FOR VEHICULA...IJCNCJournal
 
Cross Layer based Congestion Free Route Selection in Vehicular Ad Hoc Networks
Cross Layer based Congestion Free Route Selection in Vehicular Ad Hoc NetworksCross Layer based Congestion Free Route Selection in Vehicular Ad Hoc Networks
Cross Layer based Congestion Free Route Selection in Vehicular Ad Hoc NetworksIJCNCJournal
 
CROSS LAYER BASED CONGESTION FREE ROUTE SELECTION IN VEHICULAR AD HOC NETWORKS
CROSS LAYER BASED CONGESTION FREE ROUTE SELECTION IN VEHICULAR AD HOC NETWORKSCROSS LAYER BASED CONGESTION FREE ROUTE SELECTION IN VEHICULAR AD HOC NETWORKS
CROSS LAYER BASED CONGESTION FREE ROUTE SELECTION IN VEHICULAR AD HOC NETWORKSIJCNCJournal
 
journal publications
 journal publications journal publications
journal publicationsrikaseorika
 
A Comparative Study of Congestion Control Algorithm in Vehicle Ad- hoc Networ...
A Comparative Study of Congestion Control Algorithm in Vehicle Ad- hoc Networ...A Comparative Study of Congestion Control Algorithm in Vehicle Ad- hoc Networ...
A Comparative Study of Congestion Control Algorithm in Vehicle Ad- hoc Networ...IRJET Journal
 
The impact of channel model on the performance of distance-based schemes in v...
The impact of channel model on the performance of distance-based schemes in v...The impact of channel model on the performance of distance-based schemes in v...
The impact of channel model on the performance of distance-based schemes in v...IJECEIAES
 
A novel k-means powered algorithm for an efficient clustering in vehicular ad...
A novel k-means powered algorithm for an efficient clustering in vehicular ad...A novel k-means powered algorithm for an efficient clustering in vehicular ad...
A novel k-means powered algorithm for an efficient clustering in vehicular ad...IJECEIAES
 
Towards Improving Road Safety Using Advanced Vehicular Networks
Towards Improving Road Safety Using Advanced Vehicular NetworksTowards Improving Road Safety Using Advanced Vehicular Networks
Towards Improving Road Safety Using Advanced Vehicular NetworksTELKOMNIKA JOURNAL
 
Real–Time Intelligent Transportation System based on VANET
Real–Time Intelligent Transportation System based on VANETReal–Time Intelligent Transportation System based on VANET
Real–Time Intelligent Transportation System based on VANETIRJET Journal
 
Smart optimization in 802.11p media access control protocol for vehicular ad ...
Smart optimization in 802.11p media access control protocol for vehicular ad ...Smart optimization in 802.11p media access control protocol for vehicular ad ...
Smart optimization in 802.11p media access control protocol for vehicular ad ...IJECEIAES
 
A THRESHOLD BASED AUTHENTICATION MECHANISM FOR VEHICULAR AD HOC NETWORK (VANET)
A THRESHOLD BASED AUTHENTICATION MECHANISM FOR VEHICULAR AD HOC NETWORK (VANET)A THRESHOLD BASED AUTHENTICATION MECHANISM FOR VEHICULAR AD HOC NETWORK (VANET)
A THRESHOLD BASED AUTHENTICATION MECHANISM FOR VEHICULAR AD HOC NETWORK (VANET)IAEME Publication
 
Optimal model of vehicular ad-hoc network assisted by unmanned aerial vehicl...
Optimal model of vehicular ad-hoc network assisted by  unmanned aerial vehicl...Optimal model of vehicular ad-hoc network assisted by  unmanned aerial vehicl...
Optimal model of vehicular ad-hoc network assisted by unmanned aerial vehicl...IJECEIAES
 
Towards a new approach of data dissemination in vanets networks
Towards a new approach of data dissemination in vanets networksTowards a new approach of data dissemination in vanets networks
Towards a new approach of data dissemination in vanets networkscsandit
 
TOWARDS A NEW APPROACH OF DATA DISSEMINATION IN VANETS NETWORKS
TOWARDS A NEW APPROACH OF DATA DISSEMINATION IN VANETS NETWORKSTOWARDS A NEW APPROACH OF DATA DISSEMINATION IN VANETS NETWORKS
TOWARDS A NEW APPROACH OF DATA DISSEMINATION IN VANETS NETWORKScscpconf
 
GPSFR: GPS-Free Routing Protocol for Vehicular Networks with Directional Ante...
GPSFR: GPS-Free Routing Protocol for Vehicular Networks with Directional Ante...GPSFR: GPS-Free Routing Protocol for Vehicular Networks with Directional Ante...
GPSFR: GPS-Free Routing Protocol for Vehicular Networks with Directional Ante...ijwmn
 
Big data traffic management in vehicular ad-hoc network
Big data traffic management in vehicular ad-hoc network Big data traffic management in vehicular ad-hoc network
Big data traffic management in vehicular ad-hoc network IJECEIAES
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...ijceronline
 

Similar to Dynamic multiagent method to avoid duplicated information at intersections in VANETs (20)

Predictive Data Dissemination in Vanet
Predictive Data Dissemination in VanetPredictive Data Dissemination in Vanet
Predictive Data Dissemination in Vanet
 
AN OPTIMAL ROUTE DISCOVERY USING BIOGEOGRAPHY BASED OPTIMIZATION FOR VEHICULA...
AN OPTIMAL ROUTE DISCOVERY USING BIOGEOGRAPHY BASED OPTIMIZATION FOR VEHICULA...AN OPTIMAL ROUTE DISCOVERY USING BIOGEOGRAPHY BASED OPTIMIZATION FOR VEHICULA...
AN OPTIMAL ROUTE DISCOVERY USING BIOGEOGRAPHY BASED OPTIMIZATION FOR VEHICULA...
 
Cross Layer based Congestion Free Route Selection in Vehicular Ad Hoc Networks
Cross Layer based Congestion Free Route Selection in Vehicular Ad Hoc NetworksCross Layer based Congestion Free Route Selection in Vehicular Ad Hoc Networks
Cross Layer based Congestion Free Route Selection in Vehicular Ad Hoc Networks
 
CROSS LAYER BASED CONGESTION FREE ROUTE SELECTION IN VEHICULAR AD HOC NETWORKS
CROSS LAYER BASED CONGESTION FREE ROUTE SELECTION IN VEHICULAR AD HOC NETWORKSCROSS LAYER BASED CONGESTION FREE ROUTE SELECTION IN VEHICULAR AD HOC NETWORKS
CROSS LAYER BASED CONGESTION FREE ROUTE SELECTION IN VEHICULAR AD HOC NETWORKS
 
journal publications
 journal publications journal publications
journal publications
 
A Comparative Study of Congestion Control Algorithm in Vehicle Ad- hoc Networ...
A Comparative Study of Congestion Control Algorithm in Vehicle Ad- hoc Networ...A Comparative Study of Congestion Control Algorithm in Vehicle Ad- hoc Networ...
A Comparative Study of Congestion Control Algorithm in Vehicle Ad- hoc Networ...
 
The impact of channel model on the performance of distance-based schemes in v...
The impact of channel model on the performance of distance-based schemes in v...The impact of channel model on the performance of distance-based schemes in v...
The impact of channel model on the performance of distance-based schemes in v...
 
A novel k-means powered algorithm for an efficient clustering in vehicular ad...
A novel k-means powered algorithm for an efficient clustering in vehicular ad...A novel k-means powered algorithm for an efficient clustering in vehicular ad...
A novel k-means powered algorithm for an efficient clustering in vehicular ad...
 
Towards Improving Road Safety Using Advanced Vehicular Networks
Towards Improving Road Safety Using Advanced Vehicular NetworksTowards Improving Road Safety Using Advanced Vehicular Networks
Towards Improving Road Safety Using Advanced Vehicular Networks
 
Real–Time Intelligent Transportation System based on VANET
Real–Time Intelligent Transportation System based on VANETReal–Time Intelligent Transportation System based on VANET
Real–Time Intelligent Transportation System based on VANET
 
Smart optimization in 802.11p media access control protocol for vehicular ad ...
Smart optimization in 802.11p media access control protocol for vehicular ad ...Smart optimization in 802.11p media access control protocol for vehicular ad ...
Smart optimization in 802.11p media access control protocol for vehicular ad ...
 
A THRESHOLD BASED AUTHENTICATION MECHANISM FOR VEHICULAR AD HOC NETWORK (VANET)
A THRESHOLD BASED AUTHENTICATION MECHANISM FOR VEHICULAR AD HOC NETWORK (VANET)A THRESHOLD BASED AUTHENTICATION MECHANISM FOR VEHICULAR AD HOC NETWORK (VANET)
A THRESHOLD BASED AUTHENTICATION MECHANISM FOR VEHICULAR AD HOC NETWORK (VANET)
 
Optimal model of vehicular ad-hoc network assisted by unmanned aerial vehicl...
Optimal model of vehicular ad-hoc network assisted by  unmanned aerial vehicl...Optimal model of vehicular ad-hoc network assisted by  unmanned aerial vehicl...
Optimal model of vehicular ad-hoc network assisted by unmanned aerial vehicl...
 
C0961318
C0961318C0961318
C0961318
 
F017343241
F017343241F017343241
F017343241
 
Towards a new approach of data dissemination in vanets networks
Towards a new approach of data dissemination in vanets networksTowards a new approach of data dissemination in vanets networks
Towards a new approach of data dissemination in vanets networks
 
TOWARDS A NEW APPROACH OF DATA DISSEMINATION IN VANETS NETWORKS
TOWARDS A NEW APPROACH OF DATA DISSEMINATION IN VANETS NETWORKSTOWARDS A NEW APPROACH OF DATA DISSEMINATION IN VANETS NETWORKS
TOWARDS A NEW APPROACH OF DATA DISSEMINATION IN VANETS NETWORKS
 
GPSFR: GPS-Free Routing Protocol for Vehicular Networks with Directional Ante...
GPSFR: GPS-Free Routing Protocol for Vehicular Networks with Directional Ante...GPSFR: GPS-Free Routing Protocol for Vehicular Networks with Directional Ante...
GPSFR: GPS-Free Routing Protocol for Vehicular Networks with Directional Ante...
 
Big data traffic management in vehicular ad-hoc network
Big data traffic management in vehicular ad-hoc network Big data traffic management in vehicular ad-hoc network
Big data traffic management in vehicular ad-hoc network
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
 

More from TELKOMNIKA JOURNAL

Amazon products reviews classification based on machine learning, deep learni...
Amazon products reviews classification based on machine learning, deep learni...Amazon products reviews classification based on machine learning, deep learni...
Amazon products reviews classification based on machine learning, deep learni...TELKOMNIKA JOURNAL
 
Design, simulation, and analysis of microstrip patch antenna for wireless app...
Design, simulation, and analysis of microstrip patch antenna for wireless app...Design, simulation, and analysis of microstrip patch antenna for wireless app...
Design, simulation, and analysis of microstrip patch antenna for wireless app...TELKOMNIKA JOURNAL
 
Design and simulation an optimal enhanced PI controller for congestion avoida...
Design and simulation an optimal enhanced PI controller for congestion avoida...Design and simulation an optimal enhanced PI controller for congestion avoida...
Design and simulation an optimal enhanced PI controller for congestion avoida...TELKOMNIKA JOURNAL
 
Improving the detection of intrusion in vehicular ad-hoc networks with modifi...
Improving the detection of intrusion in vehicular ad-hoc networks with modifi...Improving the detection of intrusion in vehicular ad-hoc networks with modifi...
Improving the detection of intrusion in vehicular ad-hoc networks with modifi...TELKOMNIKA JOURNAL
 
Conceptual model of internet banking adoption with perceived risk and trust f...
Conceptual model of internet banking adoption with perceived risk and trust f...Conceptual model of internet banking adoption with perceived risk and trust f...
Conceptual model of internet banking adoption with perceived risk and trust f...TELKOMNIKA JOURNAL
 
Efficient combined fuzzy logic and LMS algorithm for smart antenna
Efficient combined fuzzy logic and LMS algorithm for smart antennaEfficient combined fuzzy logic and LMS algorithm for smart antenna
Efficient combined fuzzy logic and LMS algorithm for smart antennaTELKOMNIKA JOURNAL
 
Design and implementation of a LoRa-based system for warning of forest fire
Design and implementation of a LoRa-based system for warning of forest fireDesign and implementation of a LoRa-based system for warning of forest fire
Design and implementation of a LoRa-based system for warning of forest fireTELKOMNIKA JOURNAL
 
Wavelet-based sensing technique in cognitive radio network
Wavelet-based sensing technique in cognitive radio networkWavelet-based sensing technique in cognitive radio network
Wavelet-based sensing technique in cognitive radio networkTELKOMNIKA JOURNAL
 
A novel compact dual-band bandstop filter with enhanced rejection bands
A novel compact dual-band bandstop filter with enhanced rejection bandsA novel compact dual-band bandstop filter with enhanced rejection bands
A novel compact dual-band bandstop filter with enhanced rejection bandsTELKOMNIKA JOURNAL
 
Deep learning approach to DDoS attack with imbalanced data at the application...
Deep learning approach to DDoS attack with imbalanced data at the application...Deep learning approach to DDoS attack with imbalanced data at the application...
Deep learning approach to DDoS attack with imbalanced data at the application...TELKOMNIKA JOURNAL
 
Brief note on match and miss-match uncertainties
Brief note on match and miss-match uncertaintiesBrief note on match and miss-match uncertainties
Brief note on match and miss-match uncertaintiesTELKOMNIKA JOURNAL
 
Implementation of FinFET technology based low power 4×4 Wallace tree multipli...
Implementation of FinFET technology based low power 4×4 Wallace tree multipli...Implementation of FinFET technology based low power 4×4 Wallace tree multipli...
Implementation of FinFET technology based low power 4×4 Wallace tree multipli...TELKOMNIKA JOURNAL
 
Evaluation of the weighted-overlap add model with massive MIMO in a 5G system
Evaluation of the weighted-overlap add model with massive MIMO in a 5G systemEvaluation of the weighted-overlap add model with massive MIMO in a 5G system
Evaluation of the weighted-overlap add model with massive MIMO in a 5G systemTELKOMNIKA JOURNAL
 
Reflector antenna design in different frequencies using frequency selective s...
Reflector antenna design in different frequencies using frequency selective s...Reflector antenna design in different frequencies using frequency selective s...
Reflector antenna design in different frequencies using frequency selective s...TELKOMNIKA JOURNAL
 
Reagentless iron detection in water based on unclad fiber optical sensor
Reagentless iron detection in water based on unclad fiber optical sensorReagentless iron detection in water based on unclad fiber optical sensor
Reagentless iron detection in water based on unclad fiber optical sensorTELKOMNIKA JOURNAL
 
Impact of CuS counter electrode calcination temperature on quantum dot sensit...
Impact of CuS counter electrode calcination temperature on quantum dot sensit...Impact of CuS counter electrode calcination temperature on quantum dot sensit...
Impact of CuS counter electrode calcination temperature on quantum dot sensit...TELKOMNIKA JOURNAL
 
A progressive learning for structural tolerance online sequential extreme lea...
A progressive learning for structural tolerance online sequential extreme lea...A progressive learning for structural tolerance online sequential extreme lea...
A progressive learning for structural tolerance online sequential extreme lea...TELKOMNIKA JOURNAL
 
Electroencephalography-based brain-computer interface using neural networks
Electroencephalography-based brain-computer interface using neural networksElectroencephalography-based brain-computer interface using neural networks
Electroencephalography-based brain-computer interface using neural networksTELKOMNIKA JOURNAL
 
Adaptive segmentation algorithm based on level set model in medical imaging
Adaptive segmentation algorithm based on level set model in medical imagingAdaptive segmentation algorithm based on level set model in medical imaging
Adaptive segmentation algorithm based on level set model in medical imagingTELKOMNIKA JOURNAL
 
Automatic channel selection using shuffled frog leaping algorithm for EEG bas...
Automatic channel selection using shuffled frog leaping algorithm for EEG bas...Automatic channel selection using shuffled frog leaping algorithm for EEG bas...
Automatic channel selection using shuffled frog leaping algorithm for EEG bas...TELKOMNIKA JOURNAL
 

More from TELKOMNIKA JOURNAL (20)

Amazon products reviews classification based on machine learning, deep learni...
Amazon products reviews classification based on machine learning, deep learni...Amazon products reviews classification based on machine learning, deep learni...
Amazon products reviews classification based on machine learning, deep learni...
 
Design, simulation, and analysis of microstrip patch antenna for wireless app...
Design, simulation, and analysis of microstrip patch antenna for wireless app...Design, simulation, and analysis of microstrip patch antenna for wireless app...
Design, simulation, and analysis of microstrip patch antenna for wireless app...
 
Design and simulation an optimal enhanced PI controller for congestion avoida...
Design and simulation an optimal enhanced PI controller for congestion avoida...Design and simulation an optimal enhanced PI controller for congestion avoida...
Design and simulation an optimal enhanced PI controller for congestion avoida...
 
Improving the detection of intrusion in vehicular ad-hoc networks with modifi...
Improving the detection of intrusion in vehicular ad-hoc networks with modifi...Improving the detection of intrusion in vehicular ad-hoc networks with modifi...
Improving the detection of intrusion in vehicular ad-hoc networks with modifi...
 
Conceptual model of internet banking adoption with perceived risk and trust f...
Conceptual model of internet banking adoption with perceived risk and trust f...Conceptual model of internet banking adoption with perceived risk and trust f...
Conceptual model of internet banking adoption with perceived risk and trust f...
 
Efficient combined fuzzy logic and LMS algorithm for smart antenna
Efficient combined fuzzy logic and LMS algorithm for smart antennaEfficient combined fuzzy logic and LMS algorithm for smart antenna
Efficient combined fuzzy logic and LMS algorithm for smart antenna
 
Design and implementation of a LoRa-based system for warning of forest fire
Design and implementation of a LoRa-based system for warning of forest fireDesign and implementation of a LoRa-based system for warning of forest fire
Design and implementation of a LoRa-based system for warning of forest fire
 
Wavelet-based sensing technique in cognitive radio network
Wavelet-based sensing technique in cognitive radio networkWavelet-based sensing technique in cognitive radio network
Wavelet-based sensing technique in cognitive radio network
 
A novel compact dual-band bandstop filter with enhanced rejection bands
A novel compact dual-band bandstop filter with enhanced rejection bandsA novel compact dual-band bandstop filter with enhanced rejection bands
A novel compact dual-band bandstop filter with enhanced rejection bands
 
Deep learning approach to DDoS attack with imbalanced data at the application...
Deep learning approach to DDoS attack with imbalanced data at the application...Deep learning approach to DDoS attack with imbalanced data at the application...
Deep learning approach to DDoS attack with imbalanced data at the application...
 
Brief note on match and miss-match uncertainties
Brief note on match and miss-match uncertaintiesBrief note on match and miss-match uncertainties
Brief note on match and miss-match uncertainties
 
Implementation of FinFET technology based low power 4×4 Wallace tree multipli...
Implementation of FinFET technology based low power 4×4 Wallace tree multipli...Implementation of FinFET technology based low power 4×4 Wallace tree multipli...
Implementation of FinFET technology based low power 4×4 Wallace tree multipli...
 
Evaluation of the weighted-overlap add model with massive MIMO in a 5G system
Evaluation of the weighted-overlap add model with massive MIMO in a 5G systemEvaluation of the weighted-overlap add model with massive MIMO in a 5G system
Evaluation of the weighted-overlap add model with massive MIMO in a 5G system
 
Reflector antenna design in different frequencies using frequency selective s...
Reflector antenna design in different frequencies using frequency selective s...Reflector antenna design in different frequencies using frequency selective s...
Reflector antenna design in different frequencies using frequency selective s...
 
Reagentless iron detection in water based on unclad fiber optical sensor
Reagentless iron detection in water based on unclad fiber optical sensorReagentless iron detection in water based on unclad fiber optical sensor
Reagentless iron detection in water based on unclad fiber optical sensor
 
Impact of CuS counter electrode calcination temperature on quantum dot sensit...
Impact of CuS counter electrode calcination temperature on quantum dot sensit...Impact of CuS counter electrode calcination temperature on quantum dot sensit...
Impact of CuS counter electrode calcination temperature on quantum dot sensit...
 
A progressive learning for structural tolerance online sequential extreme lea...
A progressive learning for structural tolerance online sequential extreme lea...A progressive learning for structural tolerance online sequential extreme lea...
A progressive learning for structural tolerance online sequential extreme lea...
 
Electroencephalography-based brain-computer interface using neural networks
Electroencephalography-based brain-computer interface using neural networksElectroencephalography-based brain-computer interface using neural networks
Electroencephalography-based brain-computer interface using neural networks
 
Adaptive segmentation algorithm based on level set model in medical imaging
Adaptive segmentation algorithm based on level set model in medical imagingAdaptive segmentation algorithm based on level set model in medical imaging
Adaptive segmentation algorithm based on level set model in medical imaging
 
Automatic channel selection using shuffled frog leaping algorithm for EEG bas...
Automatic channel selection using shuffled frog leaping algorithm for EEG bas...Automatic channel selection using shuffled frog leaping algorithm for EEG bas...
Automatic channel selection using shuffled frog leaping algorithm for EEG bas...
 

Recently uploaded

(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptxApplication of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx959SahilShah
 
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort serviceGurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort servicejennyeacort
 
Introduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptxIntroduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptxvipinkmenon1
 
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝soniya singh
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...srsj9000
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVRajaP95
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )Tsuyoshi Horigome
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024hassan khalil
 
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...ZTE
 
Current Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCLCurrent Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCLDeelipZope
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSKurinjimalarL3
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escortsranjana rawat
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130Suhani Kapoor
 
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ
 
Internship report on mechanical engineering
Internship report on mechanical engineeringInternship report on mechanical engineering
Internship report on mechanical engineeringmalavadedarshan25
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidNikhilNagaraju
 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AIabhishek36461
 

Recently uploaded (20)

(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptxApplication of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx
 
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort serviceGurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
 
Introduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptxIntroduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptx
 
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
 
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024
 
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
 
Current Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCLCurrent Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCL
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
 
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
 
Internship report on mechanical engineering
Internship report on mechanical engineeringInternship report on mechanical engineering
Internship report on mechanical engineering
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfid
 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AI
 
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCRCall Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
 

Dynamic multiagent method to avoid duplicated information at intersections in VANETs

  • 1. TELKOMNIKA Telecommunication, Computing, Electronics and Control Vol. 18, No. 2, April 2020, pp. 613~621 ISSN: 1693-6930, accredited First Grade by Kemenristekdikti, Decree No: 21/E/KPT/2018 DOI: 10.12928/TELKOMNIKA.v18i2.13947  613 Journal homepage: http://journal.uad.ac.id/index.php/TELKOMNIKA Dynamic multiagent method to avoid duplicated information at intersections in VANETs Mohammed I. Habelalmateen1 , A. H. Abbas2 , L. Audah3 , N. A. M. Alduais4 1,2,3 Wireless and Radio Science Centre (WARAS) Faculty of Electrical and Electronic Engineering, Universiti Tun Hussein Onn Malaysia, Malaysia 2 Communication Engineering Techniques, Imam Jaafar Alsadiq University, Iraq 1 Department of Computer Technical Engineering, College of Technical Engineering, the Islamic University, Iraq 4 Department of Information Security and Web Technology, Faculty of Computer Science and Information Technology, Universiti Tun Hussein Onn Malaysia, Malaysia Article Info ABSTRACT Article history: Received Aug 21, 2019 Revised Dec 31, 2019 Accepted Jan 16, 2020 Vehicular ad hoc networks (VANETs) allow vehicles to contact one another to provide safety and comfort applications. However, mobility is a great challenge in VANETs. High vehicle speed causes topological changes that result in unstable networks. Therefore, most previous studies focused on using clustering techniques in roads to reduce the effect of vehicle mobility and enhance network stability. Vehicles stop moving at intersections, and their mobility does not impact clustering. However, none of previous studies discussed the impact of vehicle stopping at intersections on base stations (BSs). Vehicles that have stopped moving at intersections continue to send the same information to BSs, which causes duplicated information. Hence, this study proposes a new method named dynamic multiagent (DMA) to filter cluster information and prevent duplicated information from being sent to BSs at intersections. The performance of the proposed method was evaluated through simulations during the use of DMA and without-DMA (W-DMA) methods based on real data collected from 10 intersections in Batu Pahat City, Johor, Malaysia. Overall, the proposed DMA method results in a considerable reduction in duplicated information at intersections, with an average percentage of 81% from the W-DMA method. Keywords: Clustering algorithm Data dissemination Intelligent transportation system (ITS) Multiagent Vehicular ad hoc network (VANET) This is an open access article under the CC BY-SA license. Corresponding Author: A. H. Abbas, Wireless and Radio Science Centre (WARAS) Faculty of Electrical and Electronic Engineering, Universiti Tun Hussein Onn Malaysia, Malaysia. Email: alsalamy1987@gmail.com, hanif@uthm.edu.my 1. INTRODUCTION The increase in land vehicles over the last few decades has led to traffic congestion and road accidents. This reason makes research on connections among vehicles that exchange information a necessity. This information can be collected from intelligent vehicle networks that are part of intelligent transportation systems. Intelligent vehicle networks enable vehicles to communicate with one another in what is called VANETs. VANETs are a subpart of mobile ad hoc networks that have attracted the attention of researchers and industries [1]. VANETs have two types of communication. The first type is vehicle-to-vehicle communication in which a vehicle communicates directly with other vehicles within the same transmission range (TR). This type of communication does not incur costs and has easy-to-establish networks, but it faces
  • 2.  ISSN: 1693-6930 TELKOMNIKA Telecommun Comput El Control, Vol. 18, No. 2, April 2020: 613 - 621 614 disconnection problems when vehicle density is low [2, 3]. Therefore, vehicle-to-vehicle communication cannot be applied in sparse areas. The second type is vehicle-to-infrastructure communication in which vehicles communicate with roadside units (RSUs). This communication type can be expensive, and RSUs have a limited coverage area (500 m to 800 m) and may not be allowed to be installed in several places [4, 5]. Clustering was proposed to address these challenges [6]. Clusters are groups of vehicles in a specific TR. This group has a leader called cluster head (CH), and all remaining vehicles are called cluster members (CMs). The CH is the manager of the group, and all CMs can communicate with one another and send information to the CH. Only the CH can communicate with the base station (BS) and send information about its CMs [7]. High vehicle mobility affects cluster stability and data dissemination. Thus, most previous studies focused only on cluster stability [8-12], data dissemination among cluster vehicles [13], detected the traffic congestion in the city by using clustering techniques in [14] and analyzed routing protocols of clustering in VANETs [15, 16]. Only a few studies have focused on clustering at intersections. When vehicles stop at intersections, mobility ceases to affect clusters, but clusters continue to send vehicle information to BSs. Most information sent to BSs at intersections is consequently duplicated information. Clusters should be stopped from sending vehicle information at intersections due to network stopping, and clusters should be reformed and the CH be re-elected after intersections. This study proposes the dynamic multiagent (DMA) method to solve the problem of duplicated information being received from immobile vehicles at intersections. The main contributions of this study are as follows: − It proposes a new method called DMA to prevent unnecessary information from being resent to BSs when vehicles stop at an intersection. − This is the first study based on real data collected from monitoring the intersections in Batu Pahat City, Johor, Malaysia by using Arduino Uno, Global Positioning System (GPS) and external antennas to form accurate locations. − It provides evaluation and validation by comparing the use and disuse of DMA using MATLAB simulations. 2. RELATED WORK This section introduces previous works that used clustering at intersections in VANETs. The main challenge at intersections is the high number of vehicles (N.O.V), which results in a large number of connections that increase network load, disconnections, flooding and packet drop. In [17] proposed a direction-based clustering algorithm to estimate vehicle density at intersections. The authors assumed that immobile vehicles do not disseminate information, which causes network disconnections. CHs must know CM information during this time. In [18] proposed a real-time vehicular communication (RTVC) framework that enables stable communication among vehicles in urban and highway scenarios. In [19] proposed a multiagent-driven dynamic clustering scheme to dynamically form clusters and efficiently disseminate information after vehicles pass through intersections. In [20] proposed the cluster-based location service (CBLS) protocol to avoid sending and receiving upgrade and query packets from a location server (BSs). In [21] proposed geographic routing over VANETs (GROOV) to select the best path to send vehicle information at intersections based on specific relay vehicles. In [22] introduced the nearest intersection location-dependent dissemination of traffic information (NILDD) to reduce channel congestion by forwarding traffic update messages to a specific destination. This method reduces the number of forwarded messages but duplicates messages sent to the BSs at intersections. In [23] proposed the traffic-aware intersection-based geographical routing (TIGeR) protocol to improve packet dissemination efficiency at intersections. In previous [24] suggested an efficient road-based directional (ERD) broadcast protocol to disseminate vehicle information in all directions at intersections using a relay vehicle. This method disseminates vehicle information at intersections, but data continue to be duplicated which increases the number of unnecessary information sent to BSs. Most previous works that discussed intersection clustering did not focus on a number of duplicated messages sent from clusters to BSs. Therefore, the current study proposes a new method named DMA to avoid unnecessary information from being sent to BSs at intersections with no lost connections among vehicles. The DMA method uses a specific intelligent agent vehicle (IAV) that receives and stores cluster information for comparison with future information. The IAV drops duplicated information and only sends new information to the BS. Table 1 summaries previous studies.
  • 3. TELKOMNIKA Telecommun Comput El Control  Dynamic multiagent method t avoid duplicated information… (Mohammed I. Habelalmateen) 615 3. RESEARCH METHOD Based on related works, most of previous methods studied vehicles stop at intersection not focus on the load at BSs that result from number of uplinks connection and duplicated information sent from vehicles to the BSs. Therefore, to solve these issues proposed DMA method. The work of the DMA method starts after a cluster is formed therefore, the DMA method used the same cluster formation method as in [25]. In this study proposed the DMA method to control the uplink connections between BSs and CHs at intersections to prevent duplicated information from being broadcasted to BSs at intersections. Table 1 represent the related work. Table 1. Summary of related works Ref. Method name Problem Purpose Software Simulated area Outcome [4] Direction-based clustering algorithm Data dissemination Managing traffic at intersections NCTUns tools 3000 × 3000 m Decrease in packet flooding [5] RTVC Maintaing message dissemination Establishing stable communication among vehicles NS 2 NaN Lower overhead [6] Multiagent-driven dynamic clustering scheme Link failures Cluster formation ‘C’ programming NaN Controlled overhead [7] CBLS Number of messages Avoiding upgrade packets OMNET++ 2000 × 2000 m Avoidance of network congestion [8] GROOV Varying topographies Selecting the best route at intersections GloMoSim 1600 × 1600 m Increased packet delivery ratio [9] NILDD Updating traffic messages Reducing channel congestion by forwarding traffic update messages NS 2 5000 × 3000 m Reduction in unnecessary bandwidth utilisation [10] TIGeR Packet dissemination Electing the best routes towards a destination TraNS v1.2 3500 × 4000 m Improved packet delivery ratio [11] ERD Data dissemination Increasing the chance of propagating data in all directions NS 2 1200 × 600 m Increased packet efficiency 3.1. DMA election Each vehicle at an intersection broadcasts an intersection message (INT-MES) that contains information on CMs and the number of CHs (N.O.CH) within its TR. The vehicle with the highest N.O.CH broadcasts an agent beacon (AgB) to inform other vehicles to change their state to agent CH (ACH). If more than one vehicle has the highest N.O.CH, then the first vehicle to broadcast an AgB becomes the ACH. Other vehicles stop competing after receiving the AgB. Figure 1 shows a flow chart for ACH election. Table 2 shows the symbols used in this paper. Table 2. List of symbols Symbol Description DMA Dynamic multiagent INT-MES Intersection message N.O.CH Number of CHs AgB Agent beacon ACH Agent CH BSCH Base station CH INCH Inter-CH ETM End time messages BS Base station TR Transmission range 𝑁𝐿 Number of road lanes 𝑑 Distance between two vehicles 𝑉𝐿 Vehicle length 𝑁. 𝑂. 𝑉 Number of vehicles 𝐶𝑀 Cluster member 𝐶𝐻 Cluster head W-DMA Without dynamic multiagent NPS-to BS-at intersections Number of packets sent to BSs at intersections Figure 1. ACH election flow chart
  • 4.  ISSN: 1693-6930 TELKOMNIKA Telecommun Comput El Control, Vol. 18, No. 2, April 2020: 613 - 621 616 3.2. ACH operations The operation of ACH explain in the following stepes: − After a vehicle becomes an ACH, it sends a message to stop other vehicles from trying to become the ACH and inform CHs to contact the ACH. − The ACH broadcasts a message containing the ID of the CH with the highest receiving signal strength (RSS). If more than one CH has the same RSS, then the one closest to the BS is selected. When CHs receive this message, they check its ID. The CH with a matching ID remains connected to the BS and becomes a BS-CH (BSCH); otherwise, it disconnects from the BS and becomes an inter-CH (INCH). Clusters in this state send cluster information to the ACH and not to the BS. The INCH sends cluster information to the ACH every 3 s. The ACH filters this information by comparing it to previous information for the same cluster. ACHs drop vehicle information similar to information previously received from a cluster. The remaining INCH information is sent to the BS through the BSCH to prevent unnecessary messages and reduce the number of BS uplinks. − When a traffic light turns green, ACHs send end time messages (ETMs) before a red traffic light changes to inform INCHs to re-establish communication with the BS before they move, after which the ACH returns to its previous state. Figure 2 shows a flow chart for ACH operations. 3.3. Benefit using ACH The benefits of using ACHs are as follows: − ACHs filter cluster information and remove duplicate CM vehicle information. Duplicate CH information is retained; thus, the BS can track the N.O.CH in the network. − ACHs reduce the number of uplinks between CHs and BS at intersections by making only one CH (BSCH) connect to the BS. The BSCH relays CH information to the BS with the help of ACHs. Instead of every cluster within 300 m being connected, the use of an ACH means that only one cluster needs to be connected every 300 m when vehicles stop moving. Figure 2. ACH operation flow chart
  • 5. TELKOMNIKA Telecommun Comput El Control  Dynamic multiagent method t avoid duplicated information… (Mohammed I. Habelalmateen) 617 3.4. Reasons for using DMA at intersections and numerical analysis Vehicles at intersections stop moving, which makes the information they send to CHs unimportant. Most of this information is duplicated, because vehicles do not change their speed, location, direction, relative distance and relative speed whilst they stop. Stopping vehicles from broadcasting their information also destroys networks, because each cluster must know the situation of its members. Using DMA at intersections solves these issues by preventing duplicated messages from being sent to the BS, thereby improving network efficiency. Based on [26-28], TR was 300 m. The N.O.V within a TR was calculated by [29] using (1). 𝑁. 𝑂. 𝑉 = 𝑁𝐿 ∗ 𝑇𝑅 𝑑 + 𝑉𝐿 (1) This study focused on Batu Pahat City in Johor, Malaysia with a TR of 300 m and three lanes for each road (NL). The average vehicle length (VL) was 3 m. This study focused on times when roads were crowded; hence, the distance between any two vehicles (d) was 1 m. The N.O.V within a 300 m TR was as follows: N.O.V = 3 * 300/(1 + 3) = 225 vehicles each cluster at an intersection had 225 vehicles. A cluster had a limited number of CMs (maximum number of CMs in each cluster was 20) according to [21]. Therefore, these vehicles were divided into several clusters. The number of clusters (N.O.C) resulting from 225 vehicles was calculated by using (2). 𝑁. 𝑂. 𝐶 = 𝑁. 𝑂. 𝑉 𝐶𝑀𝑠 + 𝐶𝐻 (2) The N.O.C was 11, which meant that 11 uplinks exist within 300 m of each intersection. According to the Malaysian traffic light system, the minimum waiting time at an intersection is 30 s, with 3 s for standby (yellow light traffic) and a maximum waiting time of 99 s. The total waiting time at an intersection varied between 33 and 102 s. Each CH transmitted cluster information every 3 s in this study. The number of messages sent from each CH whilst waiting varied between 11 and 34, which made the total number of messages sent from 11 clusters in the same TR vary between 121 and 374. Most of these messages were duplicates, because vehicles had stopped moving. This condition led to reduced network efficiency and increased BS load. This study proposed the DMA method to solve these issues. The DMA aims to reduce the number of uplink connections that come from a large N.O.CH at BSs and to filter unnecessary cluster information by removing duplicated vehicle information from being resent to BSs. 4. SIMULATION Cluster formation and CH election were based on our previous work in [25]. The current study provided an in-depth analysis of unnecessary messages from the use and disuse of DMA method at intersections based on real data. The data were collected by monitoring an intersection in Batu Pahat, Johor, Malaysia, that is, at Jalan Kluang, 83300 Sri Gading, Johor (1.85574, 103.01377) to Jalan Tanjong Laboh Batu 8 1/2, Johor, 83200 Senggarang, Johor (1.79225, 102.96596). 4.1. Simulation parameters Evaluation and validation were performed according to the following parameters. − For an intersection with 100 vehicles, the N.O.CH varied randomly between 1 and 4 for a 300 m TR. − For an intersection with 200 vehicles, the N.O.CH varied randomly between 4 and 6 for a 300 m TR. − For an intersection with 300 vehicles, the N.O.CH varied randomly between 6 and 8 for a 300 m TR. − For an intersection with 400 vehicles, the N.O.CH varied randomly between 8 and 10 for a 300 m TR. − For an intersection with 575 vehicles, the N.O.CH varied randomly between 9 and 11 for a 300 m TR. − Crowded areas before an intersection were set as 300 m for the scenario with 100 vehicles, 300 m for the scenario with 200 vehicles, 600 m for the scenario with 300 vehicles, 900 m for the scenario with 400 vehicles and 1.2 km for the scenario with 575 vehicles. Table 3 shows a summary of intersection simulation parameters, and Table 4 shows a summary of network simulation parameters.
  • 6.  ISSN: 1693-6930 TELKOMNIKA Telecommun Comput El Control, Vol. 18, No. 2, April 2020: 613 - 621 618 Table 3. Intersection simulation parameters N.O.V N.O.CH at intersection Crowded area before intersection 100 1 to 4 300 m 200 4 to 6 (300-600) m 300 6 to 8 (400-700) m 400 8 to 10 900 m 575 9 to 11 1.2 km Table 4. Simulation parameters used in the network Parameters Values Average vehicle length 3 m Space between cars 1 m when crowded and more than 4 m in other scenarios Road length 17.8 km Area of work Batu Pahat, Johor, Malaysia between Jalan Kluang, 83300 Sri Gading, Johor and Jalan Tanjong Laboh Batu 8 1/2, Johor, 83200 Senggarang, Johor Transmission range 300 m Number of vehicles 100, 200, 300, 400 and 575 Time spent by vehicles at intersections 33 s to 102 s Number of intersections 10 Data collection method Arduino, external antenna, and GPS Number of iterations 100 4.2. Result and analysis This section presents an evaluation of the use (DMA) and without DMA (W-DMA) of the DMA method at intersections. The DMA method was used in this study to reduce the number of unnecessary messages that were sent from vehicles at intersections to BSs. Evaluation was conducted according to the number of packets sent to BSs at intersections (NPS-to BS-at Intersections) for different vehicle densities. Figure 3 shows the simulation results for 100 vehicles at an intersection with a TR of 300 m. Figure 3 shows that when the DMA method was not used, more packets were sent to intersection BSs, because each vehicle sent scenario updates every 3 s. In contrast, when several vehicles were at an intersection, considerable information that was the same as a previous message was sent, thereby increasing the number of unnecessary messages. Using DMA resulted in a reduction in the number of messages being sent to intersection BSs, because DMA prevents duplicated messages from being resent. Without DMA, all CHs remained connected to intersection BSs. When DMA was used, only one uplink existed in every 300 m TR, which reduced the total number of uplink connections. With 100 vehicles at an intersection, the W-DMA method had five CHs, whereas the DMA system had one CH. Table 5 shows the average reduction percentage for 100 vehicles with DMA. Table 5 shows that the number of sent messages depended on the number of times that vehicles stopped at the intersection. Therefore, the number of messages sent increased with increased stop time for both methods. However, DMA showed an average reduction percentage of 59.42% less than that of W-DMA. According to [30], an increase in N.O.V results in an increase in the number of uplink connections. Figure 4 shows the simulation results for 200 vehicles at an intersection. Figure 3. NPS-to BS-at intersections when TR=300 m and N.O. V= 100 Figure 4. NPS-to BS-at intersections when TR=300 m and N.O. V= 200
  • 7. TELKOMNIKA Telecommun Comput El Control  Dynamic multiagent method t avoid duplicated information… (Mohammed I. Habelalmateen) 619 Figure 4 shows that an increase in N.O.V to 200 at intersection resulted in an increase in the number of uplinks for W-DMA, because each cluster had the maximum number of CMs. Therefore, the N.O.CH with 200 vehicles was 10 for W-DMA. When using DMA, only one uplink connection existed, because the 10 CHs connected to 1 DMA vehicle that filtered messages sent to the BS. The number of sent messages in both methods increased, although DMA had fewer sent messages than W-DMA. Table 5 shows the average reduction percentage for 200 vehicles with DMA. Table 5 shows that the use of the DMA method reduced the messages sent to BSs by 80% compared with the W-DMA method. This result was caused by the 200 vehicles that were stopped at the intersection; these vehicles were divided into 10 clusters, and each cluster had 1 CH that was responsible for connecting to the BS. When using DMA, these 10 CHs connected to 1 DMA, and only this DMA connected to the BS. Therefore, using DMA reduced the number of uplinks from 10 to 1 at intersections in addition to removing duplicated vehicle information through filtering. Figure 5 shows the simulation results for 300 vehicles at an intersection for both methods. In Figure 5, the increased N.O.V at an intersection led to an increased number of uplink connections, which resulted in an increased number of messages. However, DMA showed fewer uplink connections than the W-DMA method, because each cluster had the maximum number of CMs in the W-DMA method. Therefore, the N.O.CH within a 300 m TR was 15. The use of DMA reduced the number of uplink connections to 2, because each DMA had 11 CHs. One DMA had 11 CHs, whereas the other had 4 CHs. W-DMA did not control messages, which resulted in many messages being sent to the BS. The use of DMA reduced the number of the sent messages, because DMA filtered out duplicated messages from immobile vehicles. Table 5 shows the average reduction percentage for 300 vehicles with and without DMA. Table 5 shows that the use of DMA reduced the messages being sent to the BS by 86% over W-DMA. When using DMA with 300 vehicles, only 2 DMAs sent information to BSs. By contrast, the W-DMA method resulted in 15 uplink connections sending necessary and unnecessary information to BSs. In crowded conditions, the N.O.V on the specific road covered by this study increased to 400 vehicles, which increased the N.O.V stopped at intersections. Therefore, this section focuses on the analysis of 400 vehicles at an intersection, as shown in Figure 6. Figure 6 shows that the increase in N.O.V to 400 at an intersection resulted in an increase in the number of messages sent to BSs because of the increase in the number of uplinks. However, the number of increased messages for the W-DMA method was greater than that for the DMA; the W-DMA method had 20 uplink connections, whereas the DMA had 2. The messages sent by the W-DMA method contained necessary and unnecessary information. In DMA, only necessary information was sent to intersection BSs. Table 5 shows the average reduction percentage for 400 vehicles with and without DMA. Table 5 shows that the use of DMA reduced the number of messages sent to BSs by 89% compared with W-DMA. When using DMA with 400 vehicles, only 2 DMAs sent information to the BSs. In the W-DMA method, 20 uplink connections sent necessary and unnecessary information. In crowded conditions, 575 vehicles existed at an intersection, which resulted in considerable uplink connections and messages being sent to BSs. Figure 7 shows the effect of 575 vehicles being present at intersections. Figure 7 shows that the increased N.O.V at an intersection resulted in an increased number of uplinks and sent messages for both methods. The number of uplinks was 3 when using DMA, whereas it was 29 for W-DMA. Increased uplinks resulted in an increased number of messages being sent to intersection BSs. The increased stop time of vehicles (red light traffic) at the intersection also increased the number of messages being sent to BSs. Table 5 shows the average reduction percentage for 575 vehicles with and without DMA. Table 5 shows that the use of DMA reduced the amount of messages sent to BSs by 90% compared with W-DMA. Only 3 DMAs sent necessary information to BSs when using DMA with 575 vehicles, whereas 29 uplink connections sent necessary and unnecessary information in the W-DMA method. Table 5. Reduction percentage in packets sent at intersections form 100 to 575 vehicles No. 100 vehicles 200 vehicles 300 vehicles 400 vehicles 575 vehicles 1 60.53% 80.41% 85.93% 89.00% 90.05% 2 59.21% 79.89% 85.38% 89.06% 90.00% 3 58.82% 79.31% 85.77% 88.92% 89.98% 4 59.38% 80.61% 85.32% 88.98% 90.06% 5 60.00% 80.00% 85.54% 88.86% 89.98% 6 60.47% 80.09% 85.67% 88.91% 89.99% 7 61.82% 79.59% 85.79% 89.04% 89.92% 8 57.45% 79.28% 85.83% 89.03% 89.99% 9 60.00% 79.73% 85.86% 88.87% 89.92% 10 56.57% 79.93% 85.81% 88.98% 89.96%
  • 8.  ISSN: 1693-6930 TELKOMNIKA Telecommun Comput El Control, Vol. 18, No. 2, April 2020: 613 - 621 620 Figure 5. NPS-to BS-at intersections when TR=300 m and N.O. V=300 Figure 6. NPS-to BS-at intersections when TR=300 m and N.O. V=400 Figure 7. NPS-to BS-at intersections when TR=300 m and N.O. V=575 5. CONCLUSION AND FUTURE WORK This study proposes the DMA method to avoid duplicated information from being sent to BSs at intersections to reduce unnecessary messages in VANETs. The DMA uses IAVs, which are vehicles that receive and store information from a large N.O.CH. The IAVs compare their stored information with the contents of new messages to eliminate duplicated information and ensure that only new information is sent to BSs. In this method, CHs continue to receive information from CMs, although they have stopped moving at an intersection to prevent network disconnections. BSs receive only new information from CHs. Evaluation was conducted using MATLAB software. The evaluation of this study investigated the use (DMA) and disuse (W-DMA) of the proposed method at intersections. The results show that the DMA method reduces the average amount of unnecessary messages by 81% compared with the W-DMA method. Future works can analyse and evaluate DMA’s performance in scenarios in which vehicles move among intersections in reducing unnecessary information and under highway conditions. REFERENCES [1] A. Mehmood, A. Khanan, A. H. H. M. Mohamed, S. Mahfooz, H. Song, and S. Abdullah, “ANTSC: An intelligent naive Bayesian probabilistic estimation practice for traffic flow to form stable clustering in VANET,” IEEE Access, vol. 6, pp. 4452–4461, 2018. [2] V. Vukadinovic et al., “3GPP C-V2X and IEEE 802.11p for vehicle-to-vehicle communications in highway platooning scenarios,” Ad Hoc Networks, vol. 74, pp. 17–29, 2018.
  • 9. TELKOMNIKA Telecommun Comput El Control  Dynamic multiagent method t avoid duplicated information… (Mohammed I. Habelalmateen) 621 [3] G. Yan and D. B. Rawat, “Vehicle-to-vehicle connectivity analysis for vehicular ad-hoc networks,” Ad Hoc Networks, vol. 58, pp. 25–35, 2017. [4] M. Hoeft and J. Rak, “How to provide fair service for V2I communications in VANETs?,” Ad Hoc Networks, vol. 37, pp. 283–294, 2016. [5] E. Ndashimye, S. K. Ray, N. I. Sarkar, and J. A. Gutiérrez, “Vehicle-to-infrastructure communication over multi-tier heterogeneous networks: A survey,” Comput. Networks, vol. 112, pp. 144–166, 2017. [6] S. Vodopivec, J. Bešter, and A. Kos, “A survey on clustering algorithms for vehicular ad-hoc networks,” in 35th International Conference on Telecommunications and Signal Processing (TSP), pp. 52–56, 2012. [7] M. S. Talib, A. Hassan, B. Hussin, and A. A. Hassan, “Vehicular ad-hoc networks: Current challenges and future direction of research,” Jour. Adv. Res. Dyn. Control Syst., vol. 10, no. 2, pp. 2065–2074, 2018. [8] M. Ren, L. Khoukhi, H. Labiod, J. Zhang, and V. Vèque, “A mobility-based scheme for dynamic clustering in vehicular ad-hoc networks (VANETs),” Veh. Commun., vol. 9, pp. 233–241, 2017. [9] M. S. Talib, A. Hassan, B. Hussin, Z. A. Abas, Z. S. Talib, and Z. S. Rasoul, “A Novel Stable Clustering Approach based on Gaussian Distribution and Relative Velocity in VANETs,” International Journal of Advanced Computer Science and Applications, vol. 9, no. 4, pp. 216-220, 2018. [10] C J.-H. Kwon, H. S. Chang, T. Shon, J.-J. Jung, and E.-J. Kim, “Neighbor stability-based VANET clustering for urban vehicular environments,” The Journal Supercomputing, vol. 72, no. 1, pp. 161–176, 2016. [11] A. Abuashour and M. Kadoch, “Performance improvement of cluster-based routing protocol in VANET,” IEEE Access, vol. 5, pp. 15354–15371, 2017. [12] W. Qi, Q. Song, X. Wang, L. Guo, and Z. Ning, “SDN-enabled social-aware clustering in 5G-VANET systems,” IEEE Access, vol. 6, pp. 28213–28224, 2018. [13] M. S. Talib, A. Hassan, B. Hussin, Z. S. Talib, Z. S. Rasoul, and M. Sammour, “Data dissemination based clustering techniques for VANETs: A review,” J. Adv. Res. Dyn. Control Syst, vol. 10, no. 4, pp. 596–604, 2018. [14] A. Mohanty, S. Mahapatra, and U. Bhanja, “Traffic congestion detection in a city using clustering techniques in VANETs,” Indonesian Journal of Electrical Engineering and Computer Science, vol. 13, no. 2, pp. 884-891, 2019. [15] M. H. Alwan, K. N. Ramli, Y. A. Al-Jawher, A. Z. Sameen, and H. F. Mahdi, “Performance comparison between 802.11 and 802.11 p for high speed vehicle in VANET,” International Journal of Electrical and Computer Engineering (IJECE), vol. 9, no. 5, pp. 3687-3694, 2019. [16] T. O. Fahad and A. A. Ali, “Compressed fuzzy logic based multi-criteria AODV routing in VANET environment,” International Journal of Electrical and Computer Engineering (IJECE), vol. 9, no. 1, pp. 397-401, 2019. [17] N. Maslekar, M. Boussedjra, J. Mouzna, and L. Houda, “Direction based clustering algorithm for data dissemination in vehicular networks,” in Vehicular Networking Conference (VNC), pp. 1–6, 2009. [18] W. Farooq, M. Ali Khan, and S. Rehman, “A novel real time framework for cluster based multicast communication in vehicular ad hoc networks,” Int. J. Distrib. Sens. Networks, vol. 12, no. 4, pp. 1-18, 2016. [19] M. S. Kakkasageri and S. S. Manvi, “Multiagent driven dynamic clustering of vehicles in VANETs,” J. Netw. Comput. Appl., vol. 35, no. 6, pp. 1771-1780, 2012. [20] S. Asoudeh, M. Mehrjoo, N.-M. Balouchzahi, and A. Bejarzahi, “Location service implementation in vehicular networks by nodes clustering in urban environments,” Veh. Commun., vol. 9, pp. 109–114, 2017. [21] S. K. Dhurandher, M. S. Obaidat, D. Bhardwaj, and A. Garg, “GROOV: A geographic routing over VANETs and its performance evaluation,” in IEEE Global Communications Conference (GLOBECOM), pp. 1670–1675, 2012. [22] B. B. Dubey, N. Chauhan, and L. K. Awasthi, “Nildd: Nearest intersection location dependent dissemination of traffic information in vanets,” in Proceedings of the 2011 International Conference on Communication, Computing and Security, pp. 96–99, 2011. [23] R. Tavakoli and M. Nabi, “TIGeR: A traffic-aware intersection-based geographical routing protocol for urban VANETs,” in IEEE 77th Vehicular Technology Conference (VTC Spring), pp. 1–5, 2013. [24] L.-C. Tung and M. Gerla, “An efficient road-based directional broadcast protocol for urban VANETs,” in IEEE vehicular networking conference, New Jersey, pp. 9–16, 2010. [25] A. H. Abbas, L. Audah, and N. A. M. Alduais, “An efficient load balance algorithm for vehicular ad-hoc network,” in Electrical Power, Electronics, Communications, Controls and Informatics Seminar, pp. 207–212, 2018. [26] Z. Khan and P. Fan, “A multi-hop moving zone (MMZ) clustering scheme based on cellular-V2X,” China Commun., vol. 15, no. 7, pp. 55–66, 2018. [27] S. Ucar, S. C. Ergen, and O. Ozkasap, “Multihop cluster based IEEE 802.11 p and LTE hybrid architecture for VANET safety message dissemination,” IEEE Trans. Veh. Technol., vol. 65, no. 4, pp. 2621-2636, 2016. [28] I. Ahmad et al., “VANET-LTE based heterogeneous vehicular clustering for driving assistance and route planning applications,” Comput. Networks, vol. 145, pp. 128–140, 2018. [29] A. Daeinabi, A. G. P. Rahbar, and A. Khademzadeh, “VWCA: An efficient clustering algorithm in vehicular ad hoc networks,” J. Netw. Comput. Appl., vol. 34, no. 1, pp. 207–222, 2011. [30] A. H. Abbas, Mohammed I. Habelalmateen, L. Audah and N.A.M. Alduais, “A novel intelligent cluster-head (ICH) to mitigate the handover problem of clustering in VANETs,” International Journal of Advanced Computer Science and Applications (IJACSA), vol. 10, no. 6, pp. 194-203, 2019.