Vehicular adhoc network (VANET) adopts or resembles a similar structure of Mobile adhoc network (MANET). The communication in VANET are generally classified into following three categories such as Vehicle to Infrastructure (V2I), Vehicle to Vehicle (V2V) and Hybrid network which is a combination of V2V and V2I network. VANET using the IEEE 802.11p standard has great potential of achieving objectives of Smart intelligent transport system (SITS) for improving transport and road safety efficiency. As more and more services is been provided for V2V based VANET network. It is a challenging task to provide QoS to end user, due to wireless medium that has limited channel availability for transmission. To guarantee QoS and provide efficient network performance, a prioritized MAC need to be designed. Many priority based MAC has been designed in recent times to improve the quality of data delivery to end user. However these do not consider the impact of environment and presence of obstacle which affects the signal attenuation at the receiver end and affecting the QoS of channel availability. To address, this work present an obstacle based radio propagation model, obstacle based CEV (City, Expressway and Village) environmental model and a selective MAC to provide QoS for different services. The proposed model efficiency is evaluated in term of throughput achieved per channel, Collison and success packet transmission. To evaluate the adaptive performance of proposed AMACexperiment are conducted under CEV environment and are compared with existing MAC NCCMA. The outcome achieved shows that the proposed model is efficient in term of reducing Collison, improving packet transmission and throughput performance considering two types of services.
An Accurate Performance Analysis of Hybrid Efficient and Reliable MAC Protoco...IJECEIAES
Vehicular Ad Hoc Networks (VANETs) is a technology supporting two types of applications, safety and service applications with higher and lower priorities respectively. Thereby, Medium Access Control (MAC) protocol is designed to provide reliable and efficient data broadcasting based on prioritization. Different from the IEEE 1609.4 (legacy), HER-MAC protocol is a new multi-channel MAC proposed for VANETs, offering remarkable performance with regards to safety applications transmission. This paper focuses on the analysis of packet delivery ratio of the HER-MAC protocol under non-saturated conditions. 1-D and 2-D Markov chains have been developed for safety and non-safety applications respectively, to evaluate mathematically the performance of HER-MAC protocol. The presented work has taken into account the freezing of the backoff timer for both applications and the backoff stages along with short retry limit for non-safety applications in order to meet the IEEE 802.11p specifications. It highlights that taking these elements into consideration are important in modeling the system, to provide an accurate estimation of the channel access, and guarantees that no packet is served indefinitely. More precise results of the system packet delivery ratio have been yield. The probability of successful transmission and collisions were derived and used to compute the packet delivery ratio. The simulation results validate the analytical results of our models and indicate that the performance of our models outperformed the existing models in terms of the packet delivery ratio under different number of vehicles and contention window.
MAR SECURITY: IMPROVED SECURITY MECHANISM FOR EMERGENCY MESSAGES OF VANET USI...IJCNCJournal
Vehicular Ad-hoc network (VANET) is one of the emerging technologies for research community to get various research challenges to construct secured framework for autonomous vehicular communication. The prime concern of this technology is to provide efficient data communication among registered vehicle nodes. The several research ideas are implemented practically to improve overall communication in VANETs by considering security and privacy as major aspects of VANETs. Several mechanisms have been implemented using cryptography algorithms and methodologies. However, these mechanisms provide a solution only for some restricted environments and to limited security threats. Hence, the proposed novel mechanism has been introduced, implemented and tested using key management technique. It provides secured network environment for VANET and its components. Later, this mechanism provides security for data packets of emergency messages using cryptography mechanism. Hence, the proposed novel mechanism is named Group Key Management & Cryptography Schemes (GKMC). The experimental analysis shows significant improvements in the network performance to provide security and privacy for emergency messages. This GKMC mechanism will help the VANET user’s to perform secured emergency message communication in network environment.
Distributed Priority based channel access for VANET (DPBCA)Editor IJMTER
IEEE 802.11p vehicular network supports various applications with different
transmission priorities and QoS requirements. It classifies the access categories into four priority
levels to ensure the successful transmission of higher priority traffic compared to lower priority
traffic in a vehicle. But the external collision between traffic of same priority from different vehicles
is not considered. Based on such consideration, this paper proposes a distributed priority based
channel access scheme. In this proposed work, the priority of each vehicle is calculated based on its
stature on the road and access category. The proposed approach can ensure successful transmission
reducing collision leading to overall throughput improvement.
PERFORMANCE ANALYSIS OF WIRELESS MESH NETWORK USING ADAPTIVE INFORMANT FACTOR...IJCSES Journal
Wireless mesh network (WMN) has become an important leading technology which provides several types of useful applications such as community network, broadband home network and internet access, etc. The rise in the size of users in WMN has created a degradation of efficiency in a network especially in dense areas due to the clumsy channel allocation and hence creating many challenges for enhancing the users experience, network quality and throughput. Therefore in this paper, we proposed OCA based AIF model that can access the channel information and then it process to improve the RF channel association. The proposed OCA-AIF will function for each period when some interference is detected via AIF and we further extend this analysis by taking in to consideration the influence of interference to provide a high quality indicator in network. The analysis of result shows the optimization by our proposed approach which increases as per the increment of relay nodes (RNs).
Performance of Vehicle-to-Vehicle Communication using IEEE 802.11p in Vehicul...IJNSA Journal
Traffic safety applications using vehicle-to-vehicle (V2V) communication is an emerging and promising area within the ITS environment. Many of these applications require real-time communication with high reliability. To meet a real-time deadline, timely and predictable access to the channel is paramount. The medium access method used in 802.11p, CSMA with collision avoidance, does not guarantee channel
access before a finite deadline. The well-known property of CSMA is undesirable for critical communications scenarios. The simulation results reveal that a specific vehicle is forced to drop over 80% of its packets because no channel access was possible before the next message was generated. To overcome this problem, we propose to use STDMA for real-time data traffic between vehicles. The realtime properties of STDMA are investigated by means of the highway road simulation scenario, with promising results.
An Accurate Performance Analysis of Hybrid Efficient and Reliable MAC Protoco...IJECEIAES
Vehicular Ad Hoc Networks (VANETs) is a technology supporting two types of applications, safety and service applications with higher and lower priorities respectively. Thereby, Medium Access Control (MAC) protocol is designed to provide reliable and efficient data broadcasting based on prioritization. Different from the IEEE 1609.4 (legacy), HER-MAC protocol is a new multi-channel MAC proposed for VANETs, offering remarkable performance with regards to safety applications transmission. This paper focuses on the analysis of packet delivery ratio of the HER-MAC protocol under non-saturated conditions. 1-D and 2-D Markov chains have been developed for safety and non-safety applications respectively, to evaluate mathematically the performance of HER-MAC protocol. The presented work has taken into account the freezing of the backoff timer for both applications and the backoff stages along with short retry limit for non-safety applications in order to meet the IEEE 802.11p specifications. It highlights that taking these elements into consideration are important in modeling the system, to provide an accurate estimation of the channel access, and guarantees that no packet is served indefinitely. More precise results of the system packet delivery ratio have been yield. The probability of successful transmission and collisions were derived and used to compute the packet delivery ratio. The simulation results validate the analytical results of our models and indicate that the performance of our models outperformed the existing models in terms of the packet delivery ratio under different number of vehicles and contention window.
MAR SECURITY: IMPROVED SECURITY MECHANISM FOR EMERGENCY MESSAGES OF VANET USI...IJCNCJournal
Vehicular Ad-hoc network (VANET) is one of the emerging technologies for research community to get various research challenges to construct secured framework for autonomous vehicular communication. The prime concern of this technology is to provide efficient data communication among registered vehicle nodes. The several research ideas are implemented practically to improve overall communication in VANETs by considering security and privacy as major aspects of VANETs. Several mechanisms have been implemented using cryptography algorithms and methodologies. However, these mechanisms provide a solution only for some restricted environments and to limited security threats. Hence, the proposed novel mechanism has been introduced, implemented and tested using key management technique. It provides secured network environment for VANET and its components. Later, this mechanism provides security for data packets of emergency messages using cryptography mechanism. Hence, the proposed novel mechanism is named Group Key Management & Cryptography Schemes (GKMC). The experimental analysis shows significant improvements in the network performance to provide security and privacy for emergency messages. This GKMC mechanism will help the VANET user’s to perform secured emergency message communication in network environment.
Distributed Priority based channel access for VANET (DPBCA)Editor IJMTER
IEEE 802.11p vehicular network supports various applications with different
transmission priorities and QoS requirements. It classifies the access categories into four priority
levels to ensure the successful transmission of higher priority traffic compared to lower priority
traffic in a vehicle. But the external collision between traffic of same priority from different vehicles
is not considered. Based on such consideration, this paper proposes a distributed priority based
channel access scheme. In this proposed work, the priority of each vehicle is calculated based on its
stature on the road and access category. The proposed approach can ensure successful transmission
reducing collision leading to overall throughput improvement.
PERFORMANCE ANALYSIS OF WIRELESS MESH NETWORK USING ADAPTIVE INFORMANT FACTOR...IJCSES Journal
Wireless mesh network (WMN) has become an important leading technology which provides several types of useful applications such as community network, broadband home network and internet access, etc. The rise in the size of users in WMN has created a degradation of efficiency in a network especially in dense areas due to the clumsy channel allocation and hence creating many challenges for enhancing the users experience, network quality and throughput. Therefore in this paper, we proposed OCA based AIF model that can access the channel information and then it process to improve the RF channel association. The proposed OCA-AIF will function for each period when some interference is detected via AIF and we further extend this analysis by taking in to consideration the influence of interference to provide a high quality indicator in network. The analysis of result shows the optimization by our proposed approach which increases as per the increment of relay nodes (RNs).
Performance of Vehicle-to-Vehicle Communication using IEEE 802.11p in Vehicul...IJNSA Journal
Traffic safety applications using vehicle-to-vehicle (V2V) communication is an emerging and promising area within the ITS environment. Many of these applications require real-time communication with high reliability. To meet a real-time deadline, timely and predictable access to the channel is paramount. The medium access method used in 802.11p, CSMA with collision avoidance, does not guarantee channel
access before a finite deadline. The well-known property of CSMA is undesirable for critical communications scenarios. The simulation results reveal that a specific vehicle is forced to drop over 80% of its packets because no channel access was possible before the next message was generated. To overcome this problem, we propose to use STDMA for real-time data traffic between vehicles. The realtime properties of STDMA are investigated by means of the highway road simulation scenario, with promising results.
V2V communication systems communicates with the approaching vehicle and avoids the accident by alerting the driver and often it drives away the vehicle if the driver fails to stop it. V2I communication system communicates with the server in the road and reduces the traffic taking place in the road.
PERFORMANCE ANALYSIS OF ROUTING PROTOCOLS WITH ROADSIDE UNIT INFRASTRUCTURE I...IJCNCJournal
Vehicular ad-hoc networks (VANETs) represent a powerful and active field of research and have given rise to many challenges related to routing protocols and communication problems with other vehicles or fixed infrastructure called roadside units (RSU). The dynamic topology and the obstacles encountered in VANET environments mean that the routing of data and the communication between vehicles is confronted with many problems, and particularly in vehicular applications that require reliable communication and satisfactory quality of service (QoS). This paper promotes the intention of infrastructure in an urban
scenario and studies the performance of routing protocols considering the constraint of mobility. This leads us to analyze a wide range of routing protocols to ensure optimal coverage and continuous connectivity, taking into consideration two types of data traffic in realistic environments that depend on certain performance metrics. The paper also investigates which protocols provide better performance with RSUs by ranking the results for QoS.
The performance of the vehicular communication-clustering processTELKOMNIKA JOURNAL
For the new wireless systems and beyond, the intelligent transportation system is considered as one of the main features that could be covered in the new research topics. Furthermore, both high-speed data transmission and data processing play a crucial role for these generations. Our work covers two main propositions in order to attain an improvement in such intelligent systems performance. A clustering algorithm is proposed and presented for grouping mobile nodes based on their speeds with some modified head assignments processes. This will be combined with a parallel-processing technique that enhances the QoS. Mainly, this work concerns enhancing the V2V data transmission and the processing speed. Thus, a wavelet processing stage has been imposed to optimize the transmitted power phenomenon. In order to check the validity of such proposition, five main efficiency factors have been investigated; namely complementary cumulative distributions, bit rates, energy efficiency, the lifetime of cluster head and the ordinary nodes reattaching-head average times.
Optimization of Quality of Service (QoS) framework for highway based Vehicula...IJERA Editor
The Vehicular Ad-hoc Network is a novel technology. It has the property of higher node mobility. Vehicular Adhoc
networks offer wireless communications between vehicles themselves (V2V) and between vehicles to the
roadside units (V2R). The VANET is an active research area, as it has great prospective to enhance the road and
vehicle safety, efficiency of traffic. Vehicular Ad-hoc Network not only just provides the safety applications, but
also provides communication to the users. The QoS support in VANET is a challenge when the existing routing
paths become no longer are available as a result of changes in the velocity and position of node, and distance
between the vehicular nodes or network topology. In this study we designed a framework which provides us the
facility to enhance various Quality of Service parameters, such as End to End Delay, throughput and packet loss
ratio etc. The proposed model uses layered approach, deep classification as existed QoS components are further
broken down and provides Quality of Experience to the users. NCTUns is used as simulation tool to build up
simulations. After getting the results of simulation we carried out the performance analysis of various routing
protocols. The simulation results indicate that the proposed scheme provides much better performance in terms
of various QoS parameters like End to End Delay, throughput and packet loss ratio
Modified q aware scheduling algorithm for improved fairness in 802.16 j networksIJCNCJournal
Deployment of Multi-hop Relays in WiMax based Cellu
lar Networks is considered as a cost effective
solution to increase the Coverage area of Base Stat
ion and also to improve the Network Capacity with h
igh
quality short links. Scheduling became a challengin
g task in these Multi-hop Relay Wireless Cellular
Networks of IEEE 802.16j standard. H. Chen, X. Xie
and H. Wu proposed a Q-aware Scheduling
Algorithm in which back-pressure flow control mecha
nism is used to reflect current Q size of the Relay
s
and considered high back-pressure links to include
in Concurrent Transmission Scenarios, to maximize t
he
throughput. This focus on high back-pressure links,
leads to starvation of Mobile Stations having low
back-
pressure links, resulting unfairness in some cases.
To remedy this situation, a Fair Link Inclusion (F
LI)
mechanism is applied in Greedy Algorithm of Q-aware
Scheduling Algorithm. Simulation results show that
Modified Q-aware Scheduling Algorithm with FLI mech
anism has reasonable improvement in fairness and
maintaining steady throughput when compared with ex
isting algorithms.
International Journal of Computational Engineering Research (IJCER) ijceronline
International Journal of Computational Engineering Research(IJCER) is an intentional online Journal in English monthly publishing journal. This Journal publish original research work that contributes significantly to further the scientific knowledge in engineering and Technology
A Proactive Greedy Routing Protocol Precludes Sink-Hole Formation in Wireless...ijwmn
The International Journal of Wireless & Mobile Networks (IJWMN) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of Wireless & Mobile Networks. The journal focuses on all technical and practical aspects of Wireless & Mobile Networks. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on advanced wireless & mobile networking concepts and establishing new collaborations in these areas.
STUDY OF THE EFFECT OF VELOCITY ON END-TOEND DELAY FOR V2V COMMUNICATION IN ITSijngnjournal
This paper focuses on vehicle to vehicle (V2V) communications in VANET. With the development of vehicles and mobile Ad Hoc network technology, the Vehicle Ad hoc Network (VANET) has become an emerging field of study. VANET is a special case of MANET, and will play an important role in city road traffic control. It is a challenging problem for searching and maintaining an effective route for transporting data information. Vehicular Ad Hoc network (VANET), is a hot topic applying mobile Ad Hoc network (MANET) to ITS in recent years. In the era of wireless computing, VANET communications are gaining a lot of attention. In this paper we provide a simulation and study of the effect of velocity on end-to-end delay for v2v communication in intelligent transportation Systems
PERFORMANCE COMPARISON OF PACKET SCHEDULING ALGORITHMS FOR VIDEO TRAFFIC IN L...ijmnct
In this paper we have studied downlink packet scheduling algorithms proposed for LTE cellular networks.
The study emphasize on three most promising scheduling algorithms such as: FLS, EXP rule and LOG rule.
The performance of these three algorithms is conducted over video traffic in a vehicular environment using
LTE-Sim simulator. The simulation was setup with varying number of users from 10 - 60 in fixed bounded
regions of 1 km radius. The main goal this study is to provide results that will help in the design process of
packet scheduler for LTE cellular networks, aiming to get better overall performance users. Simulation
results show that, the FLS scheme outperforms in terms of average system throughput, average packet
delay, PLR; and with a satisfactory level of fairness index.
General Model for Single and Multiple Channels WLANs with Quality of Service ...ijwmn
In this paper we develop an intergraded model for request mechanism and data transmission in the uplink phase in the presence of channel noise. This model supports quality of service. The wireless channel is prone to many impairments. Thus, certain techniques have to be developed to deliver data to the receiver. We calculated the performance parameters for single and multichannel wireless networks, like the requests throughput, data throughput and the requests acceptance probability and data acceptance probability. The proposed model is general model since it can be applied to different wireless networks such as IEEE802.11a, IEEE802.16e, CDMA operated networks and Hiperlan\2.
A Modified Fault Tolerant Location-Based Service Discovery Protocol for Vehic...acijjournal
In the recent years, advances in Vehicular networks have attracted special attraction of researchers. Lately two types of applications have gain popularity: Road safety and Driving comfort. Reliable data transformation in the city environment is hard to accomplish due to presence of noise and obstacles. In
addition transient or permanent faults of vehicles or roadside routers (road components) are unavoidable, so we need a fault tolerant algorithm to overcome such failures. Although utilizing faulttolerant techniques cause to more efficiency and reliability in service discovery for vehicle networks, there are many few service discovery algorithms that have considered fault- tolerant techniques. In this paper we have improved one of these algorithms which is named Fault-Tolerant Location-Based
Vehicular Service Discovery Protocol (FLocVSD) in order to being more reliable.
New adaptation method based on cross layer and TCP over protocols to improve ...IJECEIAES
Due to rapid growth of multimedia traffic used over the mobile ad-hoc networks (MANETs), to keep up with the progress of this constraint MANETs protocols becoming increasingly concerned with the quality of service. In view of the random mobility nodes in MANET, TCP becomes more unreliability in case of higher energy consumption and packet loss. In this paper we proposed a new optimization approach to enhance decision making of TCP based on some changes of IEEE 802.11 MAC uses cross layer approach. The aim is to minimize the impact of retransmissions of packet lost and energy consumption in order to analyse and chose the appropriate routing protocol for TCP that can be enhance QoS MANET. Our simulation results based QoS study using NS3 show that, our proposal achieved better performance of TCP in MANETs significantly, and also improved the throughput, energy consumption and facilitates the traffic transmission over routing protocol.
Joint Routing and Congestion Control in Multipath Channel based on Signal to ...IJECEIAES
Routing protocol and congestion control in Transmission Control Protocol (TCP) have important roles in wireless mobile network performance. In wireless communication, the stability of the path and successful data transmission will be influenced by the channel condition. This channel condition constraints come from path loss and the multipath channel fading. With these constraints, the algorithm in the routing protocol and congestion control is confronted with the uncertainty of connection quality and probability of successful packet transmission, respectively. It is important to investigate the reliability and robustness of routing protocol and congestion control algorithms in dealing with such situation. In this paper, we develop a detailed approach and analytical throughput performance with a cross layer scheme (CLS) between routing and congestion control mechanism based on signal to noise ratio (SNR) in Rician and Rayleigh as multipath fading channel. We proposed joint routing and congestion control TCP with a cross layer scheme model based on SNR (RTCP-SNR). We compare the performance of RTCP-SNR with conventional routing-TCP and routing-TCP that used CLS with routing aware (RTCP-RA) model. The analyses and the simulation results showed that RTCP-SNR in a multipath channel outperforms conventional routing-TCP and RTCP-RA.
A MAC PROTOCOL WITH DYNAMIC ALLOCATION OF TIME SLOTS BASED ON TRAFFIC PRIORIT...ijaia
In a wireless body area network (WBAN), wireless biomedical sensors are placed around, on, or inside the human body. Given specific requirements, WBANs can significantly improve healthcare, diagnostic monitoring, and other medical services. However, the existing standards such as IEEE 802.11 and IEEE 802.15.4 have some limitations to meet all the requirements of WBANs. Many medium access control (MAC) protocols have been studied so far, most of which are derived from the IEEE 802.15.4 superframe structure with some improvements and adjustments. However, the MAC protocols do not provide the required quality of service (QoS) for various types of traffic in a WBAN. In this paper, a traffic-aware MAC (TA-MAC) protocol for WBANs is proposed, in which time slots are dynamically allocated on the basis of traffic priority, providing the required QoS. According to the performance evaluation results, the proposed TA-MAC is better than IEEE 802.15.4 MAC and the conventional priority-based MAC in terms of transmission time, system throughput, energy efficiency, and collision ratio.
CROSS LAYER DESIGN APPROACH FOR EFFICIENT DATA DELIVERY BASED ON IEEE 802.11P...pijans
Intelligent Transportation Systems (ITS) have been one of the promising technology that has a great interest attention from many researchers over the world. Vehicular Ad-hoc Network (VANET) communications environment as a part of ITS opens the way for a wide range of applications such as safety applications, mobility and connectivity for both driver and passengers to exploit the transport systems in a smoothly, efficiently and safer way. Several challenging tasks facing adopting VANET functionality for ITS such as modelling of wireless transmission and routing issues. These research issues have become more critical due to the high mobility of vehicles nodes (transmitters and receivers) and unexpected network topology due to the high speed of nodes. In fact, modelling radio propagation channel in VANET environment which considers as one of a stringent communications environment is a challenging task. The selection of a suitable transmission model plays a key role in the routing decisions for VANET. Different propagation models allow calculating the Received Signal Strength (RSS) based on key environmental properties such as the distance between transmitter vehicle and a receiver vehicle, the gain and antenna height of transmitter and a receiver vehicles. Hence, it is useful to calculate RSS and SNR values for a specific propagation model and then these values can be used later for routing decision in order to find the best path with high SNR. This paper evaluates the performance of different transmission models (freespace, two-ray and log-normal) in terms of Receive Signal Strength (RSS). In addition, the performance of such wireless transmission models for vehicular communication in terms of PDR, throughput and delay is evaluated by applying the proposed cross layer routing approach based on IEEE 802.11p. By using MATLAB, the obtained results confirm the best packet delivery ratio for our proposed approach, where it indicates poor quality of DSSS PHY with high number vehicles. The minimum delay achieved when traffic density is decreased.
CROSS LAYER DESIGN APPROACH FOR EFFICIENT DATA DELIVERY BASED ON IEEE 802.11P...pijans
Intelligent Transportation Systems (ITS) have been one of the promising technology that has a great
interest attention from many researchers over the world. Vehicular Ad-hoc Network (VANET)
communications environment as a part of ITS opens the way for a wide range of applications such as safety
applications, mobility and connectivity for both driver and passengers to exploit the transport systems in a
smoothly, efficiently and safer way. Several challenging tasks facing adopting VANET functionality for ITS
such as modelling of wireless transmission and routing issues. These research issues have become more
critical due to the high mobility of vehicles nodes (transmitters and receivers) and unexpected network
topology due to the high speed of nodes. In fact, modelling radio propagation channel in VANET
environment which considers as one of a stringent communications environment is a challenging task. The
selection of a suitable transmission model plays a key role in the routing decisions for VANET. Different
propagation models allow calculating the Received Signal Strength (RSS) based on key environmental
properties such as the distance between transmitter vehicle and a receiver vehicle, the gain and antenna
height of transmitter and a receiver vehicles. Hence, it is useful to calculate RSS and SNR values for a
specific propagation model and then these values can be used later for routing decision in order to find the
best path with high SNR. This paper evaluates the performance of different transmission models (free-
space, two-ray and log-normal) in terms of Receive Signal Strength (RSS). In addition, the performance of
such wireless transmission models for vehicular communication in terms of PDR, throughput and delay is
evaluated by applying the proposed cross layer routing approach based on IEEE 802.11p. By using
MATLAB, the obtained results confirm the best packet delivery ratio for our proposed approach, where it
indicates poor quality of DSSS PHY with high number vehicles. The minimum delay achieved when traffic
density is decreased
CONTROLLING ADAPTIVE CONTENTION WINDOW TO IMPROVE SAFE MESSAGE RECEIVED RATE ...IJCNCJournal
The primary goal of Vehicular Ad Hoc Networks (VANETs) is to support the secure transmission of applications via vehicles. Broadcasting is an important form of communication in the VANET network. Since there is no recovery for broadcast frames in the VANET network, the rate of receiving safe messages can become very low, especially in dense network conditions. In this paper, we present a new broadcast coordination mechanism with the aim of adaptive control of CW size to improve the received rate of safety messages. Each vehicle in the VANET can identify current local conditions of the network such as collisions or congestion by analyzing recently successfully sent and received frames. Based on the analysis of the received frame rate at each vehicle, the proposed mechanism controls the CW size and uses the EDCA mechanism to prioritize the important data flows. Using a combination of simulation tools in VANET, we build simulation scenarios in different network conditions to evaluate the received rate of safety messages compared to the default mechanism in the 802.11p standard. Simulation results have demonstrated that the proposed mechanism improves the received rate of safety messages better than the default mechanism in the 802.11p standard in all cases.
V2V communication systems communicates with the approaching vehicle and avoids the accident by alerting the driver and often it drives away the vehicle if the driver fails to stop it. V2I communication system communicates with the server in the road and reduces the traffic taking place in the road.
PERFORMANCE ANALYSIS OF ROUTING PROTOCOLS WITH ROADSIDE UNIT INFRASTRUCTURE I...IJCNCJournal
Vehicular ad-hoc networks (VANETs) represent a powerful and active field of research and have given rise to many challenges related to routing protocols and communication problems with other vehicles or fixed infrastructure called roadside units (RSU). The dynamic topology and the obstacles encountered in VANET environments mean that the routing of data and the communication between vehicles is confronted with many problems, and particularly in vehicular applications that require reliable communication and satisfactory quality of service (QoS). This paper promotes the intention of infrastructure in an urban
scenario and studies the performance of routing protocols considering the constraint of mobility. This leads us to analyze a wide range of routing protocols to ensure optimal coverage and continuous connectivity, taking into consideration two types of data traffic in realistic environments that depend on certain performance metrics. The paper also investigates which protocols provide better performance with RSUs by ranking the results for QoS.
The performance of the vehicular communication-clustering processTELKOMNIKA JOURNAL
For the new wireless systems and beyond, the intelligent transportation system is considered as one of the main features that could be covered in the new research topics. Furthermore, both high-speed data transmission and data processing play a crucial role for these generations. Our work covers two main propositions in order to attain an improvement in such intelligent systems performance. A clustering algorithm is proposed and presented for grouping mobile nodes based on their speeds with some modified head assignments processes. This will be combined with a parallel-processing technique that enhances the QoS. Mainly, this work concerns enhancing the V2V data transmission and the processing speed. Thus, a wavelet processing stage has been imposed to optimize the transmitted power phenomenon. In order to check the validity of such proposition, five main efficiency factors have been investigated; namely complementary cumulative distributions, bit rates, energy efficiency, the lifetime of cluster head and the ordinary nodes reattaching-head average times.
Optimization of Quality of Service (QoS) framework for highway based Vehicula...IJERA Editor
The Vehicular Ad-hoc Network is a novel technology. It has the property of higher node mobility. Vehicular Adhoc
networks offer wireless communications between vehicles themselves (V2V) and between vehicles to the
roadside units (V2R). The VANET is an active research area, as it has great prospective to enhance the road and
vehicle safety, efficiency of traffic. Vehicular Ad-hoc Network not only just provides the safety applications, but
also provides communication to the users. The QoS support in VANET is a challenge when the existing routing
paths become no longer are available as a result of changes in the velocity and position of node, and distance
between the vehicular nodes or network topology. In this study we designed a framework which provides us the
facility to enhance various Quality of Service parameters, such as End to End Delay, throughput and packet loss
ratio etc. The proposed model uses layered approach, deep classification as existed QoS components are further
broken down and provides Quality of Experience to the users. NCTUns is used as simulation tool to build up
simulations. After getting the results of simulation we carried out the performance analysis of various routing
protocols. The simulation results indicate that the proposed scheme provides much better performance in terms
of various QoS parameters like End to End Delay, throughput and packet loss ratio
Modified q aware scheduling algorithm for improved fairness in 802.16 j networksIJCNCJournal
Deployment of Multi-hop Relays in WiMax based Cellu
lar Networks is considered as a cost effective
solution to increase the Coverage area of Base Stat
ion and also to improve the Network Capacity with h
igh
quality short links. Scheduling became a challengin
g task in these Multi-hop Relay Wireless Cellular
Networks of IEEE 802.16j standard. H. Chen, X. Xie
and H. Wu proposed a Q-aware Scheduling
Algorithm in which back-pressure flow control mecha
nism is used to reflect current Q size of the Relay
s
and considered high back-pressure links to include
in Concurrent Transmission Scenarios, to maximize t
he
throughput. This focus on high back-pressure links,
leads to starvation of Mobile Stations having low
back-
pressure links, resulting unfairness in some cases.
To remedy this situation, a Fair Link Inclusion (F
LI)
mechanism is applied in Greedy Algorithm of Q-aware
Scheduling Algorithm. Simulation results show that
Modified Q-aware Scheduling Algorithm with FLI mech
anism has reasonable improvement in fairness and
maintaining steady throughput when compared with ex
isting algorithms.
International Journal of Computational Engineering Research (IJCER) ijceronline
International Journal of Computational Engineering Research(IJCER) is an intentional online Journal in English monthly publishing journal. This Journal publish original research work that contributes significantly to further the scientific knowledge in engineering and Technology
A Proactive Greedy Routing Protocol Precludes Sink-Hole Formation in Wireless...ijwmn
The International Journal of Wireless & Mobile Networks (IJWMN) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of Wireless & Mobile Networks. The journal focuses on all technical and practical aspects of Wireless & Mobile Networks. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on advanced wireless & mobile networking concepts and establishing new collaborations in these areas.
STUDY OF THE EFFECT OF VELOCITY ON END-TOEND DELAY FOR V2V COMMUNICATION IN ITSijngnjournal
This paper focuses on vehicle to vehicle (V2V) communications in VANET. With the development of vehicles and mobile Ad Hoc network technology, the Vehicle Ad hoc Network (VANET) has become an emerging field of study. VANET is a special case of MANET, and will play an important role in city road traffic control. It is a challenging problem for searching and maintaining an effective route for transporting data information. Vehicular Ad Hoc network (VANET), is a hot topic applying mobile Ad Hoc network (MANET) to ITS in recent years. In the era of wireless computing, VANET communications are gaining a lot of attention. In this paper we provide a simulation and study of the effect of velocity on end-to-end delay for v2v communication in intelligent transportation Systems
PERFORMANCE COMPARISON OF PACKET SCHEDULING ALGORITHMS FOR VIDEO TRAFFIC IN L...ijmnct
In this paper we have studied downlink packet scheduling algorithms proposed for LTE cellular networks.
The study emphasize on three most promising scheduling algorithms such as: FLS, EXP rule and LOG rule.
The performance of these three algorithms is conducted over video traffic in a vehicular environment using
LTE-Sim simulator. The simulation was setup with varying number of users from 10 - 60 in fixed bounded
regions of 1 km radius. The main goal this study is to provide results that will help in the design process of
packet scheduler for LTE cellular networks, aiming to get better overall performance users. Simulation
results show that, the FLS scheme outperforms in terms of average system throughput, average packet
delay, PLR; and with a satisfactory level of fairness index.
General Model for Single and Multiple Channels WLANs with Quality of Service ...ijwmn
In this paper we develop an intergraded model for request mechanism and data transmission in the uplink phase in the presence of channel noise. This model supports quality of service. The wireless channel is prone to many impairments. Thus, certain techniques have to be developed to deliver data to the receiver. We calculated the performance parameters for single and multichannel wireless networks, like the requests throughput, data throughput and the requests acceptance probability and data acceptance probability. The proposed model is general model since it can be applied to different wireless networks such as IEEE802.11a, IEEE802.16e, CDMA operated networks and Hiperlan\2.
A Modified Fault Tolerant Location-Based Service Discovery Protocol for Vehic...acijjournal
In the recent years, advances in Vehicular networks have attracted special attraction of researchers. Lately two types of applications have gain popularity: Road safety and Driving comfort. Reliable data transformation in the city environment is hard to accomplish due to presence of noise and obstacles. In
addition transient or permanent faults of vehicles or roadside routers (road components) are unavoidable, so we need a fault tolerant algorithm to overcome such failures. Although utilizing faulttolerant techniques cause to more efficiency and reliability in service discovery for vehicle networks, there are many few service discovery algorithms that have considered fault- tolerant techniques. In this paper we have improved one of these algorithms which is named Fault-Tolerant Location-Based
Vehicular Service Discovery Protocol (FLocVSD) in order to being more reliable.
New adaptation method based on cross layer and TCP over protocols to improve ...IJECEIAES
Due to rapid growth of multimedia traffic used over the mobile ad-hoc networks (MANETs), to keep up with the progress of this constraint MANETs protocols becoming increasingly concerned with the quality of service. In view of the random mobility nodes in MANET, TCP becomes more unreliability in case of higher energy consumption and packet loss. In this paper we proposed a new optimization approach to enhance decision making of TCP based on some changes of IEEE 802.11 MAC uses cross layer approach. The aim is to minimize the impact of retransmissions of packet lost and energy consumption in order to analyse and chose the appropriate routing protocol for TCP that can be enhance QoS MANET. Our simulation results based QoS study using NS3 show that, our proposal achieved better performance of TCP in MANETs significantly, and also improved the throughput, energy consumption and facilitates the traffic transmission over routing protocol.
Joint Routing and Congestion Control in Multipath Channel based on Signal to ...IJECEIAES
Routing protocol and congestion control in Transmission Control Protocol (TCP) have important roles in wireless mobile network performance. In wireless communication, the stability of the path and successful data transmission will be influenced by the channel condition. This channel condition constraints come from path loss and the multipath channel fading. With these constraints, the algorithm in the routing protocol and congestion control is confronted with the uncertainty of connection quality and probability of successful packet transmission, respectively. It is important to investigate the reliability and robustness of routing protocol and congestion control algorithms in dealing with such situation. In this paper, we develop a detailed approach and analytical throughput performance with a cross layer scheme (CLS) between routing and congestion control mechanism based on signal to noise ratio (SNR) in Rician and Rayleigh as multipath fading channel. We proposed joint routing and congestion control TCP with a cross layer scheme model based on SNR (RTCP-SNR). We compare the performance of RTCP-SNR with conventional routing-TCP and routing-TCP that used CLS with routing aware (RTCP-RA) model. The analyses and the simulation results showed that RTCP-SNR in a multipath channel outperforms conventional routing-TCP and RTCP-RA.
A MAC PROTOCOL WITH DYNAMIC ALLOCATION OF TIME SLOTS BASED ON TRAFFIC PRIORIT...ijaia
In a wireless body area network (WBAN), wireless biomedical sensors are placed around, on, or inside the human body. Given specific requirements, WBANs can significantly improve healthcare, diagnostic monitoring, and other medical services. However, the existing standards such as IEEE 802.11 and IEEE 802.15.4 have some limitations to meet all the requirements of WBANs. Many medium access control (MAC) protocols have been studied so far, most of which are derived from the IEEE 802.15.4 superframe structure with some improvements and adjustments. However, the MAC protocols do not provide the required quality of service (QoS) for various types of traffic in a WBAN. In this paper, a traffic-aware MAC (TA-MAC) protocol for WBANs is proposed, in which time slots are dynamically allocated on the basis of traffic priority, providing the required QoS. According to the performance evaluation results, the proposed TA-MAC is better than IEEE 802.15.4 MAC and the conventional priority-based MAC in terms of transmission time, system throughput, energy efficiency, and collision ratio.
CROSS LAYER DESIGN APPROACH FOR EFFICIENT DATA DELIVERY BASED ON IEEE 802.11P...pijans
Intelligent Transportation Systems (ITS) have been one of the promising technology that has a great interest attention from many researchers over the world. Vehicular Ad-hoc Network (VANET) communications environment as a part of ITS opens the way for a wide range of applications such as safety applications, mobility and connectivity for both driver and passengers to exploit the transport systems in a smoothly, efficiently and safer way. Several challenging tasks facing adopting VANET functionality for ITS such as modelling of wireless transmission and routing issues. These research issues have become more critical due to the high mobility of vehicles nodes (transmitters and receivers) and unexpected network topology due to the high speed of nodes. In fact, modelling radio propagation channel in VANET environment which considers as one of a stringent communications environment is a challenging task. The selection of a suitable transmission model plays a key role in the routing decisions for VANET. Different propagation models allow calculating the Received Signal Strength (RSS) based on key environmental properties such as the distance between transmitter vehicle and a receiver vehicle, the gain and antenna height of transmitter and a receiver vehicles. Hence, it is useful to calculate RSS and SNR values for a specific propagation model and then these values can be used later for routing decision in order to find the best path with high SNR. This paper evaluates the performance of different transmission models (freespace, two-ray and log-normal) in terms of Receive Signal Strength (RSS). In addition, the performance of such wireless transmission models for vehicular communication in terms of PDR, throughput and delay is evaluated by applying the proposed cross layer routing approach based on IEEE 802.11p. By using MATLAB, the obtained results confirm the best packet delivery ratio for our proposed approach, where it indicates poor quality of DSSS PHY with high number vehicles. The minimum delay achieved when traffic density is decreased.
CROSS LAYER DESIGN APPROACH FOR EFFICIENT DATA DELIVERY BASED ON IEEE 802.11P...pijans
Intelligent Transportation Systems (ITS) have been one of the promising technology that has a great
interest attention from many researchers over the world. Vehicular Ad-hoc Network (VANET)
communications environment as a part of ITS opens the way for a wide range of applications such as safety
applications, mobility and connectivity for both driver and passengers to exploit the transport systems in a
smoothly, efficiently and safer way. Several challenging tasks facing adopting VANET functionality for ITS
such as modelling of wireless transmission and routing issues. These research issues have become more
critical due to the high mobility of vehicles nodes (transmitters and receivers) and unexpected network
topology due to the high speed of nodes. In fact, modelling radio propagation channel in VANET
environment which considers as one of a stringent communications environment is a challenging task. The
selection of a suitable transmission model plays a key role in the routing decisions for VANET. Different
propagation models allow calculating the Received Signal Strength (RSS) based on key environmental
properties such as the distance between transmitter vehicle and a receiver vehicle, the gain and antenna
height of transmitter and a receiver vehicles. Hence, it is useful to calculate RSS and SNR values for a
specific propagation model and then these values can be used later for routing decision in order to find the
best path with high SNR. This paper evaluates the performance of different transmission models (free-
space, two-ray and log-normal) in terms of Receive Signal Strength (RSS). In addition, the performance of
such wireless transmission models for vehicular communication in terms of PDR, throughput and delay is
evaluated by applying the proposed cross layer routing approach based on IEEE 802.11p. By using
MATLAB, the obtained results confirm the best packet delivery ratio for our proposed approach, where it
indicates poor quality of DSSS PHY with high number vehicles. The minimum delay achieved when traffic
density is decreased
CONTROLLING ADAPTIVE CONTENTION WINDOW TO IMPROVE SAFE MESSAGE RECEIVED RATE ...IJCNCJournal
The primary goal of Vehicular Ad Hoc Networks (VANETs) is to support the secure transmission of applications via vehicles. Broadcasting is an important form of communication in the VANET network. Since there is no recovery for broadcast frames in the VANET network, the rate of receiving safe messages can become very low, especially in dense network conditions. In this paper, we present a new broadcast coordination mechanism with the aim of adaptive control of CW size to improve the received rate of safety messages. Each vehicle in the VANET can identify current local conditions of the network such as collisions or congestion by analyzing recently successfully sent and received frames. Based on the analysis of the received frame rate at each vehicle, the proposed mechanism controls the CW size and uses the EDCA mechanism to prioritize the important data flows. Using a combination of simulation tools in VANET, we build simulation scenarios in different network conditions to evaluate the received rate of safety messages compared to the default mechanism in the 802.11p standard. Simulation results have demonstrated that the proposed mechanism improves the received rate of safety messages better than the default mechanism in the 802.11p standard in all cases.
Controlling Adaptive Contention Window to Improve Safe Message Received Rate ...IJCNCJournal
The primary goal of Vehicular Ad Hoc Networks (VANETs) is to support the secure transmission of applications via vehicles. Broadcasting is an important form of communication in the VANET network. Since there is no recovery for broadcast frames in the VANET network, the rate of receiving safe messages can become very low, especially in dense network conditions. In this paper, we present a new broadcast coordination mechanism with the aim of adaptive control of CW size to improve the received rate of safety messages. Each vehicle in the VANET can identify current local conditions of the network such as collisions or congestion by analyzing recently successfully sent and received frames. Based on the analysis of the received frame rate at each vehicle, the proposed mechanism controls the CW size and uses the EDCA mechanism to prioritize the important data flows. Using a combination of simulation tools in VANET, we build simulation scenarios in different network conditions to evaluate the received rate of safety messages compared to the default mechanism in the 802.11p standard. Simulation results have demonstrated that the proposed mechanism improves the received rate of safety messages better than the default mechanism in the 802.11p standard in all cases.
A Cross Layer Based Scalable Channel Slot Re-Utilization Technique for Wirele...csandit
Due to tremendous growth of the wireless based application services are increasing the demand
for wireless communication techniques that use bandwidth more effectively. Channel slot reutilization
in multi-radio wireless mesh networks is a very challenging problem. WMNs have
been adopted as back haul to connect various networks such as Wi-Fi (802.11), WI-MAX
(802.16e) etc. to the internet. The slot re-utilization technique proposed so far suffer due to high
collision due to improper channel slot usage approximation error. To overcome this here the
author propose the cross layer optimization technique by designing a device classification
based channel slot re-utilization routing strategy which considers the channel slot and node
information from various layers and use some of these parameters to approximate the risk
involve in channel slot re-utilization in order to improve the QoS of the network. The simulation
and analytical results show the effectiveness of our proposed approach in term of channel slot
re-utilization efficiency and thus helps in reducing latency for data transmission and reduce
channel slot collision.
A CROSS-LAYER BASED SCALABLE CHANNEL SLOT RE-UTILIZATION TECHNIQUE FOR WIRELE...cscpconf
Due to tremendous growth of the wireless based application services are increasing the demand for wireless communication techniques that use bandwidth more effectively. Channel slot reutilization in multi-radio wireless mesh networks is a very challenging problem. WMNs have been adopted as back haul to connect various networks such as Wi-Fi (802.11), WI-MAX (802.16e) etc. to the internet. The slot re-utilization technique proposed so far suffer due to high collision due to improper channel slot usage approximation error. To overcome this here the author propose the cross layer optimization technique by designing a device classification based channel slot re-utilization routing strategy which considers the channel slot and node information from various layers and use some of these parameters to approximate the risk involve in channel slot re-utilization in order to improve the QoS of the network. The simulation and analytical results show the effectiveness of our proposed approach in term of channel slot re-utilization efficiency and thus helps in reducing latency for data transmission and reduce
channel slot collision.
ECA MODEL BASED QOS AODV ROUTING FOR MANETSIJCNCJournal
Applications like banking, interactive multimedia, movie on demand, VOIP, etc., are delay sensitive by
nature. The QoS given to users will be affected by network delay, which can be mitigated by employing
QoS routing and efficient data transfer. To build routing table, normal AODV routing uses flooding
technique, which will not consider QoS requirements. Hence QoS based routing which is stable for the
entire application is essential, which understands the dynamic nature of the MANET and establishes the
required route, in minimum possible time. We have proposed an intelligent routing protocol based ECA
model and AODV for establishing QoS route.
The simulation results shows that the ECA model gives better results, while considering the local
connectivity time, source to destination connectivity time, number of data packets successfully delivered to
the destination, local and global error correction time, compared to AODV.
Elastic hybrid MAC protocol for wireless sensor networks IJECEIAES
The future is moving towards offering multiples services based on the same technology. Then, billions of sensors will be needed to satisfy the diversity of these services. Such considerable amount of connected devices must insure efficient data transmission for diverse applications. Wireless sensor network (WSN) represents the most preferred technology for the majority of applications. Researches in medium access control (MAC) mechanism have been of significant impact to the application growth because the MAC layer plays a major role in resource allocation in WSNs. We propose to enhance a MAC protocol of WSN to overcome traffic changes constraints. To achieve focused goal, we use elastic hybrid MAC scheme. The main interest of the developed MAC protocol is to design a medium access scheme that respect different quality of services (QoS) parameters needed by various established traffic. Simulation results show good improvement in measured parameters compared to typical protocol.
Reliable and efficient data dissemination scheme in VANET: a review IJECEIAES
Vehicular ad-hoc network (VANET), identified as a mobile ad hoc network MANETs with several added constraints. Basically, in VANETs, the network is established on the fly based on the availability of vehicles on roads and supporting infrastructures along the roads, such as base stations. Vehicles and road-side infrastructures are required to provide communication facilities, particularly when enough vehicles are not available on the roads for effective communication. VANETs are crucial for providing a wide range of safety and non-safety applications to road users. However, the specific fundamental problem in VANET is the challenge of creating effective communication between two fast-moving vehicles. Therefore, message routing is an issue for many safety and non-safety of VANETs applications. The challenge in designing a robust but reliable message dissemination technique is primarily due to the stringent QoS requirements of the VANETs safety applications. This paper investigated various methods and conducted literature on an idea to develop a model for efficient and reliable message dissemination routing techniques in VANET.
GPSFR: GPS-Free Routing Protocol for Vehicular Networks with Directional Ante...ijwmn
Efficient and practical communications between large numbers of vehicles are critical in providing high level of safety and convenience to drivers. Crucial real-time information on road hazard, traffic conditions and driver services must be communicated to vehicles rapidly even in adverse environments, such as “urban canyons” and tunnels. We propose a novel routing protocol in vehicular networks that does not require position information (e.g. from GPS) but instead rely on relative position that can be determined dynamically. This GPS-Free Geographic Routing (GPSFR) protocol uses the estimated relative position of vehicles and greedily chooses the best next hop neighbor based on a Balance Advance (BADV) metric which balances between proximity and link stability in order to improve routing performance. In this paper, we focuses primarily on the complexity of routing in highways and solves routing problems that arise when vehicles are near interchanges, curves, and merge or exit lanes of highways. Our simulation results show that by taking relative velocity into account, GPSFR reduces link breakage to only 27% that of GPSR in the dense network. Consequently, GPSFR outperforms GPSR in terms of higher data delivery ratio, lower delay, less sensitivity of the network density and route paths’length
Multicast routing protocol for advanced vehicular ad hoc networksTELKOMNIKA JOURNAL
Transport sector has great impact on our daily life. Despite the huge number of vehicular models, driving process still faces many challenges due to the lack information about the roads and the surrounding sudden events, which can result in high number of accidents globally and especially in Saudi Arabia. A new technology, vehicular ad hoc networks (VANETs), has emerged to support Intelligent Transport System (ITS) and to offer advanced solutions for drivers to avoid different hazard events that occur on the road. In this paper, we discuss the multicast and broadcast communications in VANETs, Quality of Sevice (QoS) awaregroup addressing/managing solutions to VANETs which help inclassifying different application that explore and design a new cross-layer framework, aware of high mobility and efficiency.
Cross Layer based Congestion Free Route Selection in Vehicular Ad Hoc NetworksIJCNCJournal
For creating a mobile network, the moving cars consider as nodes in the Vehicular Ad-Hoc Networks (VANETs). Each participating car is turned into a wireless router in the VANETs that allows the connecting and creating a network. To improve the comfort and safety of driving of automotive users, the vehicular environment system develops in the vehicular environment systems using the wireless access. The channel congestion causes the degradation of quality of service in such cases with higher vehicle density. The real-time and reliable communication is required for various safety applications of VANETs. The dense traffic network has included one of the major challenges as avoiding the communication channels’ degradation. To provide the network with efficient operation, most of the studies are recommended to use the appropriate congestion control methods. It’s important to note that many congestion control mechanisms are not implemented for event-driven real-time safety messages. Based on the congestion probability approach estimation, CFRS-CP-Congestion free route selection is introduced for minimizing the total number of data flow packets that passing through the congested nodes. At each node, the congestion probability is estimated using the proposed technique of CFRS-CP based on link quality, MAC overhead, neighbour density & vehicle velocity. Then, the estimated congestion probability is used for route assessment. The estimated probability value is appended to the control packets for comparison. All the available routes are assessed based on the estimated congestion probability which results in congestion free routing path for every round of data communication. The simulation results prove that the proposed method decreases end to end delay by 32% and improves PDR up to 30% and throughput up to 45% compared to the existing protocols.
CROSS LAYER BASED CONGESTION FREE ROUTE SELECTION IN VEHICULAR AD HOC NETWORKSIJCNCJournal
For creating a mobile network, the moving cars consider as nodes in the Vehicular Ad-Hoc Networks
(VANETs). Each participating car is turned into a wireless router in the VANETs that allows the
connecting and creating a network. To improve the comfort and safety of driving of automotive users, the
vehicular environment system develops in the vehicular environment systems using the wireless access. The
channel congestion causes the degradation of quality of service in such cases with higher vehicle density.
The real-time and reliable communication is required for various safety applications of VANETs. The
dense traffic network has included one of the major challenges as avoiding the communication channels’
degradation. To provide the network with efficient operation, most of the studies are recommended to use
the appropriate congestion control methods. It’s important to note that many congestion control
mechanisms are not implemented for event-driven real-time safety messages. Based on the congestion
probability approach estimation, CFRS-CP-Congestion free route selection is introduced for minimizing
the total number of data flow packets that passing through the congested nodes. At each node, the
congestion probability is estimated using the proposed technique of CFRS-CP based on link quality, MAC
overhead, neighbour density & vehicle velocity. Then, the estimated congestion probability is used for
route assessment. The estimated probability value is appended to the control packets for comparison. All
the available routes are assessed based on the estimated congestion probability which results in congestion
free routing path for every round of data communication. The simulation results prove that the proposed
method decreases end to end delay by 32% and improves PDR up to 30% and throughput up to 45%
compared to the existing protocols.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
ASSESSING PERCEPTUAL VIDEO QUALITY IN WIMAX NETWORKS AEIJjournal2
This paper presents an approach for assessing the perceptual quality of wireless video networking
applications transmitted via WiMAX, the Worldwide Interoperability for Microwave Access air interface
standard. The Video Quality Model developed by Information Administration’s Video Quality Expert
Group is used to benchmark perceptual video quality.
ASSESSING PERCEPTUAL VIDEO QUALITY IN WIMAX NETWORKS ijujournal
This paper presents an approach for assessing the perceptual quality of wireless video networking
applications transmitted via WiMAX, the Worldwide Interoperability for Microwave Access air interface
standard. The Video Quality Model developed by Information Administration’s Video Quality Expert
Group is used to benchmark perceptual video quality
Assessing perceptual video quality in wimax networksijujournal
This paper presents an approach for assessing the perceptual quality of wireless video networking applications transmitted via WiMAX, the Worldwide Interoperability for Microwave Access air interface
standard. The Video Quality Model developed by Information Administration’s Video Quality Expert Group is used to benchmark perceptual video quality.
Similar to 14 27 may17 12mar 7266 7192-1-sm edit septian (20)
In our homes or offices, security has been a vital issue. Control of home security system remotely always offers huge advantages like the arming or disarming of the alarms, video monitoring, and energy management control apart from safeguarding the home free up intruders. Considering the oldest simple methods of security that is the mechanical lock system that has a key as the authentication element, then an upgrade to a universal type, and now unique codes for the lock. The recent advancement in the communication system has brought the tremendous application of communication gadgets into our various areas of life. This work is a real-time smart doorbell notification system for home Security as opposes of the traditional security methods, it is composed of the doorbell interfaced with GSM Module, a GSM module would be triggered to send an SMS to the house owner by pressing the doorbell, the owner will respond to the guest by pressing a button to open the door, otherwise, a message would be displayed to the guest for appropriate action. Then, the keypad is provided for an authorized person for the provision of password for door unlocking, if multiple wrong password attempts were made to unlock, a message of burglary attempt would be sent to the house owner for prompt action. The main benefit of this system is the uniqueness of the incorporation of the password and messaging systems which denies access to any unauthorized personality and owner's awareness method.
Augmented reality, the new age technology, has widespread applications in every field imaginable. This technology has proven to be an inflection point in numerous verticals, improving lives and improving performance. In this paper, we explore the various possible applications of Augmented Reality (AR) in the field of Medicine. The objective of using AR in medicine or generally in any field is the fact that, AR helps in motivating the user, making sessions interactive and assist in faster learning. In this paper, we discuss about the applicability of AR in the field of medical diagnosis. Augmented reality technology reinforces remote collaboration, allowing doctors to diagnose patients from a different locality. Additionally, we believe that a much more pronounced effect can be achieved by bringing together the cutting edge technology of AR and the lifesaving field of Medical sciences. AR is a mechanism that could be applied in the learning process too. Similarly, virtual reality could be used in the field where more of practical experience is needed such as driving, sports, neonatal care training.
Image fusion is a sub field of image processing in which more than one images are fused to create an image where all the objects are in focus. The process of image fusion is performed for multi-sensor and multi-focus images of the same scene. Multi-sensor images of the same scene are captured by different sensors whereas multi-focus images are captured by the same sensor. In multi-focus images, the objects in the scene which are closer to the camera are in focus and the farther objects get blurred. Contrary to it, when the farther objects are focused then closer objects get blurred in the image. To achieve an image where all the objects are in focus, the process of images fusion is performed either in spatial domain or in transformed domain. In recent times, the applications of image processing have grown immensely. Usually due to limited depth of field of optical lenses especially with greater focal length, it becomes impossible to obtain an image where all the objects are in focus. Thus, it plays an important role to perform other tasks of image processing such as image segmentation, edge detection, stereo matching and image enhancement. Hence, a novel feature-level multi-focus image fusion technique has been proposed which fuses multi-focus images. Thus, the results of extensive experimentation performed to highlight the efficiency and utility of the proposed technique is presented. The proposed work further explores comparison between fuzzy based image fusion and neuro fuzzy fusion technique along with quality evaluation indices.
Graphs have become the dominant life-form of many tasks as they advance a
structure to represent many tasks and the corresponding relations. A powerful
role of networks/graphs is to bridge local feats that exist in vertices as they
blossom into patterns that help explain how nodal relations and their edges
impacts a complex effect that ripple via a graph. User cluster are formed as a
result of interactions between entities. Many users can hardly categorize their
contact into groups today such as “family”, “friends”, “colleagues” etc. Thus,
the need to analyze such user social graph via implicit clusters, enables the
dynamism in contact management. Study seeks to implement this dynamism
via a comparative study of deep neural network and friend suggest algorithm.
We analyze a user’s implicit social graph and seek to automatically create
custom contact groups using metrics that classify such contacts based on a
user’s affinity to contacts. Experimental results demonstrate the importance
of both the implicit group relationships and the interaction-based affinity in
suggesting friends.
This paper projects Gryllidae Optimization Algorithm (GOA) has been applied to solve optimal reactive power problem. Proposed GOA approach is based on the chirping characteristics of Gryllidae. In common, male Gryllidae chirp, on the other hand some female Gryllidae also do as well. Male Gryllidae draw the females by this sound which they produce. Moreover, they caution the other Gryllidae against dangers with this sound. The hearing organs of the Gryllidae are housed in an expansion of their forelegs. Through this, they bias to the produced fluttering sounds. Proposed Gryllidae Optimization Algorithm (GOA) has been tested in standard IEEE 14, 30 bus test systems and simulation results show that the projected algorithms reduced the real power loss considerably.
In the wake of the sudden replacement of wood and kerosene by gas cookers for several purposes in Nigeria, gas leakage has caused several damages in our homes, Laboratories among others. installation of a gas leakage detection device was globally inspired to eliminate accidents related to gas leakage. We present an alternative approach to developing a device that can automatically detect and control gas leakages and also monitor temperature. The system detects the leakage of the LPG (Liquefied Petroleum Gas) using a gas sensor, then triggred the control system response which employs ventilator system, Mobile phone alert and alarm when the LPG concentration in the air exceeds a certain level. The performance of two gas sensors (MQ5 and MQ6) were tested for a guided decision. Also, when the temperature of the environment poses a danger, LED (indicator), buzzer and LCD (16x2) display was used to indicate temperature and gas leakage status in degree Celsius and PPM respectively. Attension was given to the response time of the control system, which was ascertained that this system significantly increases the chances and efficiency of eliminating gas leakage related accident.
Feature selection problem is one of the main important problems in the text and data mining domain. This paper presents a comparative study of feature selection methods for Arabic text classification. Five of the feature selection methods were selected: ICHI square, CHI square, Information Gain, Mutual Information and Wrapper. It was tested with five classification algorithms: Bayes Net, Naive Bayes, Random Forest, Decision Tree and Artificial Neural Networks. In addition, Data Collection was used in Arabic consisting of 9055 documents, which were compared by four criteria: Precision, Recall, F-measure and Time to build model. The results showed that the improved ICHI feature selection got almost all the best results in comparison with other methods.
In this paper Gentoo Penguin Algorithm (GPA) is proposed to solve optimal reactive power problem. Gentoo Penguins preliminary population possesses heat radiation and magnetizes each other by absorption coefficient. Gentoo Penguins will move towards further penguins which possesses low cost (elevated heat concentration) of absorption. Cost is defined by the heat concentration, distance. Gentoo Penguins penguin attraction value is calculated by the amount of heat prevailed between two Gentoo penguins. Gentoo Penguins heat radiation is measured as linear. Less heat is received in longer distance, in little distance, huge heat is received. Gentoo Penguin Algorithm has been tested in standard IEEE 57 bus test system and simulation results show the projected algorithm reduced the real power loss considerably.
08 20272 academic insight on applicationIAESIJEECS
This research has thrown up many questions in need of further investigation.There was an expressive quantitative-qualitative research, which a common investigation form was used in.The dialogue item was also applied to discover if the contributors asserted the media-based attitude supplements their learning of academic English writing classes or not.Data recounted academic” insights toward using Skype as a sustaining implement for lessons releasing based on chosen variables: their occupation, year of education, and knowledge with Skype discovered that there were no important statistical differences in the use of Skype units because of medical academics major knowledge. There are statistically important differences in using Skype units. The findings also, disclosed that there are statistically significant differences in using Skype units due to the practice with Skype variable, in favors of academics with no Skype use practice. Skype instrument as an instructive media is a positive medium to be employed to supply academic medical writing data and assist education. Academics who do not have enough time to contribute in classes believe comfortable using the Skype-based attitude in scientific writing. They who took part in the course claimed that their approval of this media is due to learning academic innovative medical writing.
Cloud computing has sweeping impact on the human productivity. Today it’s used for Computing, Storage, Predictions and Intelligent Decision Making, among others. Intelligent Decision-Making using Machine Learning has pushed for the Cloud Services to be even more fast, robust and accurate. Security remains one of the major concerns which affect the cloud computing growth however there exist various research challenges in cloud computing adoption such as lack of well managed service level agreement (SLA), frequent disconnections, resource scarcity, interoperability, privacy, and reliability. Tremendous amount of work still needs to be done to explore the security challenges arising due to widespread usage of cloud deployment using Containers. We also discuss Impact of Cloud Computing and Cloud Standards. Hence in this research paper, a detailed survey of cloud computing, concepts, architectural principles, key services, and implementation, design and deployment challenges of cloud computing are discussed in detail and important future research directions in the era of Machine Learning and Data Science have been identified.
Notary is an official authorized to make an authentic deed regarding all deeds, agreements and stipulations required by a general rule. Activities carried out at the notary office such as recording client data and file data still use traditional systems that tend to be manual. The problem that occurs is the inefficiency in data processing and providing information to clients. Clients have difficulty getting information related to the progress of documents that are being taken care of at the notary's office. The client must take the time to arrive to the notary's office repeatedly to check the progress of the work of the document file. The purpose of this study is to facilitate clients in obtaining information about the progress of the work in progress, and make it easier for employees to process incoming documents by implementing an administrative system. This system was developed with the waterfall system development method and uses the Multi-Channel Access Technology integrated in the website to simplify the process of delivering information and requesting information from clients and to clients with Telegram and SMS Gateway. Clients will come to the office only when there is a notification from the system via Telegram or SMS notifying that the client must come directly to the notary's office, thus leading to an efficient time and avoiding excessive transportation costs. The overall functional system can function properly based on the results of alpha testing. The results of beta testing conducted by distributing the system feasibility test questionnaire to end users, get a percentage of 96% of users agree the system is feasible to be implemented.
In this work Tundra wolf algorithm (TWA) is proposed to solve the optimal reactive power problem. In the projected Tundra wolf algorithm (TWA) in order to avoid the searching agents from trapping into the local optimal the converging towards global optimal is divided based on two different conditions. In the proposed Tundra wolf algorithm (TWA) omega tundra wolf has been taken as searching agent as an alternative of indebted to pursue the first three most excellent candidates. Escalating the searching agents’ numbers will perk up the exploration capability of the Tundra wolf wolves in an extensive range. Proposed Tundra wolf algorithm (TWA) has been tested in standard IEEE 14, 30 bus test systems and simulation results show the proposed algorithm reduced the real power loss effectively.
In this work Predestination of Particles Wavering Search (PPS) algorithm has been applied to solve optimal reactive power problem. PPS algorithm has been modeled based on the motion of the particles in the exploration space. Normally the movement of the particle is based on gradient and swarming motion. Particles are permitted to progress in steady velocity in gradient-based progress, but when the outcome is poor when compared to previous upshot, immediately particle rapidity will be upturned with semi of the magnitude and it will help to reach local optimal solution and it is expressed as wavering movement. In standard IEEE 14, 30, 57,118,300 bus systems Proposed Predestination of Particles Wavering Search (PPS) algorithm is evaluated and simulation results show the PPS reduced the power loss efficiently.
In this paper, Mine Blast Algorithm (MBA) has been intermingled with Harmony Search (HS) algorithm for solving optimal reactive power dispatch problem. MBA is based on explosion of landmines and HS is based on Creativeness progression of musicians-both are hybridized to solve the problem. In MBA Initial distance of shrapnel pieces are reduced gradually to allow the mine bombs search the probable global minimum location in order to amplify the global explore capability. Harmony search (HS) imitates the music creativity process where the musicians supervise their instruments’ pitch by searching for a best state of harmony. Hybridization of Mine Blast Algorithm with Harmony Search algorithm (MH) improves the search effectively in the solution space. Mine blast algorithm improves the exploration and harmony search algorithm augments the exploitation. At first the proposed algorithm starts with exploration & gradually it moves to the phase of exploitation. Proposed Hybridized Mine Blast Algorithm with Harmony Search algorithm (MH) has been tested on standard IEEE 14, 300 bus test systems. Real power loss has been reduced considerably by the proposed algorithm. Then Hybridized Mine Blast Algorithm with Harmony Search algorithm (MH) tested in IEEE 30, bus system (with considering voltage stability index)- real power loss minimization, voltage deviation minimization, and voltage stability index enhancement has been attained.
Artificial Neural Networks have proved their efficiency in a large number of research domains. In this paper, we have applied Artificial Neural Networks on Arabic text to prove correct language modeling, text generation, and missing text prediction. In one hand, we have adapted Recurrent Neural Networks architectures to model Arabic language in order to generate correct Arabic sequences. In the other hand, Convolutional Neural Networks have been parameterized, basing on some specific features of Arabic, to predict missing text in Arabic documents. We have demonstrated the power of our adapted models in generating and predicting correct Arabic text comparing to the standard model. The model had been trained and tested on known free Arabic datasets. Results have been promising with sufficient accuracy.
In the present-day communications speech signals get contaminated due to
various sorts of noises that degrade the speech quality and adversely impacts
speech recognition performance. To overcome these issues, a novel approach
for speech enhancement using Modified Wiener filtering is developed and
power spectrum computation is applied for degraded signal to obtain the
noise characteristics from a noisy spectrum. In next phase, MMSE technique
is applied where Gaussian distribution of each signal i.e. original and noisy
signal is analyzed. The Gaussian distribution provides spectrum estimation
and spectral coefficient parameters which can be used for probabilistic model
formulation. Moreover, a-priori-SNR computation is also incorporated for
coefficient updation and noise presence estimation which operates similar to
the conventional VAD. However, conventional VAD scheme is based on the
hard threshold which is not capable to derive satisfactory performance and a
soft-decision based threshold is developed for improving the performance of
speech enhancement. An extensive simulation study is carried out using
MATLAB simulation tool on NOIZEUS speech database and a comparative
study is presented where proposed approach is proved better in comparison
with existing technique.
Previous research work has highlighted that neuro-signals of Alzheimer’s disease patients are least complex and have low synchronization as compared to that of healthy and normal subjects. The changes in EEG signals of Alzheimer’s subjects start at early stage but are not clinically observed and detected. To detect these abnormalities, three synchrony measures and wavelet-based features have been computed and studied on experimental database. After computing these synchrony measures and wavelet features, it is observed that Phase Synchrony and Coherence based features are able to distinguish between Alzheimer’s disease patients and healthy subjects. Support Vector Machine classifier is used for classification giving 94% accuracy on experimental database used. Combining, these synchrony features and other such relevant features can yield a reliable system for diagnosing the Alzheimer’s disease.
Attenuation correction designed for PET/MR hybrid imaging frameworks along with portion making arrangements used for MR-based radiation treatment remain testing because of lacking high-energy photon weakening data. We present a new method so as to uses the learned nonlinear neighborhood descriptors also highlight coordinating toward foresee pseudo-CT pictures starting T1w along with T2w MRI information. The nonlinear neighborhood descriptors are acquired through anticipating the direct descriptors interested in the nonlinear high-dimensional space utilizing an unequivocal constituent guide also low-position guess through regulated complex regularization. The nearby neighbors of every near descriptor inside the data MR pictures are looked during an obliged spatial extent of the MR pictures among the training dataset. By that point, the pseudo-CT patches are evaluated through k-closest neighbor relapse. The planned procedure designed for pseudo-CT forecast is quantitatively broke downward on top of a dataset comprising of coordinated mind MRI along with CT pictures on or after 13 subjects.
The cognitive radio prototype performance is to alleviate the scarcity of spectral resources for wireless communication through intelligent sensing and quick resource allocation techniques. Secondary users (SU’s) actively obtain the spectrum access opportunity by supporting primary users (PU’s) in cognitive radio networks (CRNs). In present generation, spectrum access is endowed through cooperative communication-based link-level frame-based cooperative (LLC) principle. In this SUs independently act as conveyors for PUs to achieve spectrum access opportunities. Unfortunately, this LLC approach cannot fully exploit spectrum access opportunities to enhance the throughput of CRNs and fails to motivate PUs to join the spectrum sharing processes. Therefore, to overcome this con, network level cooperative (NLC) principle was used, where SUs are integrated mutually to collaborate with PUs session by session, instead of frame based cooperation for spectrum access opportunities. NLC approach has justified the challenges facing in LLC approach. In this paper we make a survey of some models that have been proposed to tackle the problem of LLC. We show the relevant aspects of each model, in order to characterize the parameters that we should take in account to achieve a spectrum access opportunity.
In this paper, the author provides insights and lessons that can be learned from colleagues at American universities about their online education experiences. The literature review and previous studies of online educations gains are explored and summarized in this research. Emerging trends in online education are discussed in detail, and strategies to implement these trends are explained. The author provides several tools and strategies that enable universities to ensure the quality of online education. At the end of this research paper, the researcher provides examples from Arab universities who have successfully implemented online education and expanded their impact on the society. This research provides a strategy and a model that can be used by universities in the Middle East as a roadmap to implement online education in their regions.
Cosmetic shop management system project report.pdfKamal Acharya
Buying new cosmetic products is difficult. It can even be scary for those who have sensitive skin and are prone to skin trouble. The information needed to alleviate this problem is on the back of each product, but it's thought to interpret those ingredient lists unless you have a background in chemistry.
Instead of buying and hoping for the best, we can use data science to help us predict which products may be good fits for us. It includes various function programs to do the above mentioned tasks.
Data file handling has been effectively used in the program.
The automated cosmetic shop management system should deal with the automation of general workflow and administration process of the shop. The main processes of the system focus on customer's request where the system is able to search the most appropriate products and deliver it to the customers. It should help the employees to quickly identify the list of cosmetic product that have reached the minimum quantity and also keep a track of expired date for each cosmetic product. It should help the employees to find the rack number in which the product is placed.It is also Faster and more efficient way.
TECHNICAL TRAINING MANUAL GENERAL FAMILIARIZATION COURSEDuvanRamosGarzon1
AIRCRAFT GENERAL
The Single Aisle is the most advanced family aircraft in service today, with fly-by-wire flight controls.
The A318, A319, A320 and A321 are twin-engine subsonic medium range aircraft.
The family offers a choice of engines
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...Dr.Costas Sachpazis
Terzaghi's soil bearing capacity theory, developed by Karl Terzaghi, is a fundamental principle in geotechnical engineering used to determine the bearing capacity of shallow foundations. This theory provides a method to calculate the ultimate bearing capacity of soil, which is the maximum load per unit area that the soil can support without undergoing shear failure. The Calculation HTML Code included.
Welcome to WIPAC Monthly the magazine brought to you by the LinkedIn Group Water Industry Process Automation & Control.
In this month's edition, along with this month's industry news to celebrate the 13 years since the group was created we have articles including
A case study of the used of Advanced Process Control at the Wastewater Treatment works at Lleida in Spain
A look back on an article on smart wastewater networks in order to see how the industry has measured up in the interim around the adoption of Digital Transformation in the Water Industry.
Quality defects in TMT Bars, Possible causes and Potential Solutions.PrashantGoswami42
Maintaining high-quality standards in the production of TMT bars is crucial for ensuring structural integrity in construction. Addressing common defects through careful monitoring, standardized processes, and advanced technology can significantly improve the quality of TMT bars. Continuous training and adherence to quality control measures will also play a pivotal role in minimizing these defects.
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdffxintegritypublishin
Advancements in technology unveil a myriad of electrical and electronic breakthroughs geared towards efficiently harnessing limited resources to meet human energy demands. The optimization of hybrid solar PV panels and pumped hydro energy supply systems plays a pivotal role in utilizing natural resources effectively. This initiative not only benefits humanity but also fosters environmental sustainability. The study investigated the design optimization of these hybrid systems, focusing on understanding solar radiation patterns, identifying geographical influences on solar radiation, formulating a mathematical model for system optimization, and determining the optimal configuration of PV panels and pumped hydro storage. Through a comparative analysis approach and eight weeks of data collection, the study addressed key research questions related to solar radiation patterns and optimal system design. The findings highlighted regions with heightened solar radiation levels, showcasing substantial potential for power generation and emphasizing the system's efficiency. Optimizing system design significantly boosted power generation, promoted renewable energy utilization, and enhanced energy storage capacity. The study underscored the benefits of optimizing hybrid solar PV panels and pumped hydro energy supply systems for sustainable energy usage. Optimizing the design of solar PV panels and pumped hydro energy supply systems as examined across diverse climatic conditions in a developing country, not only enhances power generation but also improves the integration of renewable energy sources and boosts energy storage capacities, particularly beneficial for less economically prosperous regions. Additionally, the study provides valuable insights for advancing energy research in economically viable areas. Recommendations included conducting site-specific assessments, utilizing advanced modeling tools, implementing regular maintenance protocols, and enhancing communication among system components.
Event Management System Vb Net Project Report.pdfKamal Acharya
In present era, the scopes of information technology growing with a very fast .We do not see any are untouched from this industry. The scope of information technology has become wider includes: Business and industry. Household Business, Communication, Education, Entertainment, Science, Medicine, Engineering, Distance Learning, Weather Forecasting. Carrier Searching and so on.
My project named “Event Management System” is software that store and maintained all events coordinated in college. It also helpful to print related reports. My project will help to record the events coordinated by faculties with their Name, Event subject, date & details in an efficient & effective ways.
In my system we have to make a system by which a user can record all events coordinated by a particular faculty. In our proposed system some more featured are added which differs it from the existing system such as security.
Forklift Classes Overview by Intella PartsIntella Parts
Discover the different forklift classes and their specific applications. Learn how to choose the right forklift for your needs to ensure safety, efficiency, and compliance in your operations.
For more technical information, visit our website https://intellaparts.com
Explore the innovative world of trenchless pipe repair with our comprehensive guide, "The Benefits and Techniques of Trenchless Pipe Repair." This document delves into the modern methods of repairing underground pipes without the need for extensive excavation, highlighting the numerous advantages and the latest techniques used in the industry.
Learn about the cost savings, reduced environmental impact, and minimal disruption associated with trenchless technology. Discover detailed explanations of popular techniques such as pipe bursting, cured-in-place pipe (CIPP) lining, and directional drilling. Understand how these methods can be applied to various types of infrastructure, from residential plumbing to large-scale municipal systems.
Ideal for homeowners, contractors, engineers, and anyone interested in modern plumbing solutions, this guide provides valuable insights into why trenchless pipe repair is becoming the preferred choice for pipe rehabilitation. Stay informed about the latest advancements and best practices in the field.
Water scarcity is the lack of fresh water resources to meet the standard water demand. There are two type of water scarcity. One is physical. The other is economic water scarcity.
2. IJEECS ISSN: 2502-4752
Selective MAC for Obstacle Aware CEV Environmental Model for V2V (Usha Rani B)
725
Figure 1. Architecture of V2V communication
The IEEE 802.11p standard was established by modifying the present IEEE 802.11a to
offer the QoS assurance for the VANET based app services related to SITS, route assistance
services, driver’s safety and assistance and speed control administration etc. The IEEE 802.11p
operates on the 5.9 GHz bands and channel bandwidth of 10MHz [2]. The IEEE 802.11p adopts
physical layer as association interface amid the MAC layer and the wireless links which work
using OFDM (Orthogonal frequency division multiplexing) modulation. The OFDM offers
channel contention access mechanism that allow devices to segment or slots the common
channel [3]. The IEEE 802.11p is modulated using BPSK, QPSK, 16-QAM and 64-QAM
modulation structures and the physical layer employs the 64 subcarriers and can be modulated
under the constraints of channel quality [4].
Designing a MAC layer play an important role in VANET automobile wireless
communication. The existing work presented so far consider use of the default parameters and
ideal channel conditions. The MAC can be generally classified in to following things considering
the purpose of SITS based application services requirement [5]. MAC protocol is generally are
nondeterministic in nature. Namely they are as follows Aloha,Slotted-Aloha,CSMA/CA and
CSMA.
The IEEE 802.11p adopts CSMA/CA as its MAC mechanism. In [6] they have used
EDCA (Enhanced Distributed Channel Access) in order to enhance the QoS for SITS
application services. To improve the QoS considering SITS they classified the traffic in to four
kinds of priorities as a result the MAC becomes contention based not the deterministic because
admittance to the medium can’t be assured within a stipulated time or limit time bound [7], due
to this it cannot guarantee deterministic access delay. The effectiveness or impact of EDCA is
influenced by priority level assigned to the data in VANET [6, 8]. Due to this priority the
effectiveness of EDCA is reduced. Due to this it not efficient for SITS application which requires
reliable, low-delay, reliable and real-time association is mandatory.
Considering the contention free based convention such as TDMA. Here the shared
resources are separated into time slots which are assigned to every automobile or users for
communication, thus helps in avoiding transmission collision. The decentralized approach such
as STDMA [9] where the VANET user participant are themselves accountable for sharing the
association or transmission channel and the synchronization between the devices is done
through a global navigation satellite network, such as GPS (Global positioning system) due to
the decentralized network topology adopted here. The prototype presented here requires
devices in the network regularly need send the information about their own position in the
network. The STDMA methodologies will use the information of devices position for choosing
slots in the frame. This protocol is designed considering localization of automobile and tracking
based warning system. The drawback of this is that it needs time synchronization and also the
channel access schedules are reconfigured in a periodic manner even when a scenario of
satisfactory balance has been reached. To address this time synchronization problem in [10]
VeSOMAC is prototyped by having bounded maximum delay with the cost of requiring periodic
signalling. The applications are designed based on vehicle localization as in STDMA [9]
although here it does not require time synchronization thus eliminating the likelihood of
3. ISSN: 2502-4752
IJEECS Vol. 7, No. 3, September 2017 : 724 – 736
726
collisions and schedules are reconfigured only when the VANET infrastructure detects a conflict
between automobile users over the slot selected.
The other contention-based convention is Slotted-Aloha [11] though this protocol
employs conceptions from TDMA prototype but they differ in the situation of collision i.e. the
selection of association times is based on a random process which means that maximum delay
is not bounded for all situations. When considering topology changes for CSMA/CA the Slotted-
Aloha prototype doesn’t need signalling or reconfiguration, the drawback of this protocol is that
collision level is high and it is not suitable for high priority services. In order to guarantee
bounded medium access delay for SITS based application services there a several cognitive
radio CR base MAC model that have been proposed such as NCCMA [12], here by applying CR
techniques every automobile user stores information about the occupancy estimation of each
slot. This info was then adopted to find the best slot to perform the data communication needs
for various application services. Consequently that info was updated depends on the outcome
of every individual communications by applying a bonuses-and-penalties procedure or
methodology and this approach was a non-deterministic mechanism that enabled each
individual to learn and adapt to rapid changes in that exist in VANET atmospheres. The NCCMA
prototype has been designed in response to the necessities for an enhancement in the
application of Dynamic Spectrum Access (DSA) and CR techniques to enhance the
performance of SITS. Though this protocol has reduced the collision in the VANET they did not
consider the environment factor such as path loss and shadowing, Doppler effects etc… and its
impact on the network throughput.
To address these here in this work the author consider on all these issues like
environment condition, traffic density or limited bandwidth, different condition of city,
expressway or village area author proposed a model which includes all these things. Here
author first propose a dynamic environmental model for varied environmental condition such as
City (C),Express-Way (E) and Village (V), for V2V environment considering the geographical
and environmental factor. Secondly the author proposes an adaptive MAC Scheduler by
optimizing the beaconing scheduling and wave service advertisement in control channel for
prioritized multi-channel DSRC based V2V communication in IEEE 802.11p MAC protocol
considering the CEV environment model.
Every technology has some strength and weakness in terms of reliability, effectiveness,
efficiency, cost, maintenance and ease of use. The primary objective of almost all the vehicular
wireless technology is to provide safety and reliable service to its end user. Some of the existing
methodology that has been proposed to addresses various issues pertaining to such as
routing, environment factor, link status; based routing protocol etc is researched below.
In [13] they did the performance evaluation considering different routing protocol of
various categories of proactive ( ), reactive ( ), and hybrid ( ). They considered
various constraints such by varying the size of packet, density of mobile devices and considered
various modulation schemes and used Nakagami propagation model, with the mobility of device
equal to 10m/s for each scenario. The back-off time for all case is kept as a default constant that
exists in . The simulation outcome is obtained by them shows that had
overall achieved a significant performance when compared to and assuming the
adopted conditions. This paper is an extension of our previous work.
In [14] they have analysed the significance of modulation in wireless networks. They
have used and modulation for evaluation. Moreover to check the impact of error
rate, SNR, data rate by adopting different modulation scheme here they have done compared
the performance among between and modulation schemes and there result
obtained shows considering the different types of topology the appeared to be performing
better but they have not used modulation scheme for their simulation. The will not
guarantee a QOS for high throughput application which is need of hour to address this can
offer to obtain for high throughput application services.
In [15] they evaluated some of the path loss model that has been used for VANET
environment. The evaluated path loss model of their work is Nakagami and Two Ray Ground
model. They have used and as their routing protocol and they have considered a
case of city model. The simulation performance parameter considered in their work is packet
transmission end to end delay and packet delivery ratio. The performance of these two
simulation metric are evaluated by varying number of connection and number of devices or
automobiles for both Nakagami and Two Ray Ground model. The simulation result obtained by
4. IJEECS ISSN: 2502-4752
Selective MAC for Obstacle Aware CEV Environmental Model for V2V (Usha Rani B)
727
them shows that the Nakagami is dynamic, more realistic and it work well for
environment.
In [1] they addressed the issue related to broadcasting of message delay in control
channel to cater this they proposed a methodology that adopts the mechanism of both
and for simultaneous channel switching and scheduling. Their methodology adopted will
provide efficient broadcasting due to fact they are modelled to share the service control and the
intervals channel control intervals. The simulation conducted by them and their outcome shows
that its performance better some of the existing based scheduling protocol such as
, and etc in terms of maximum throughput, collision rate and
minimum. Their work that they have presented for can be extended to infrastructure
service environment.
In [16] they have used proposed a back-off methodology to improve the throughput and
channel usage efficiency and to overcome issues related to packet of packet in . In [17]
they have discovered various issues and challenges that exist and affect the layer
performance in based application services. Each application services require
necessities and as a result different class of application services is impacted due to the
inefficiency of modelling the performance of Layer. To study the impact performance of
layer for different application services here they studied various based protocol such
as contention free, contention based and Hybrid protocol which is a combination of both
contention free and contention based protocol.
In [18] they adopted an agent based model was the (periodic broadcast) agents
propagate the safety information or packet over VANET. They conducted simulation study and
the outcome shows that it could not able to satisfy the QoS requirement of VANET application
service. The QoS parameter considered here are Load, delay, jitter etc. and their proposed
methodology induces high network overhead for VANET and as a result it is not efficient and
practical for real time VANET based application service and these issues need to be addressed.
Based on the literature review it is clear that the environmental conditions and
optimizing the scheduler for beacon scheduling in control channel in
protocol are critical to achieve an efficient application service for .
The paper organization is as follows: The proposed environmental model considering
environmental factor are presented in Section two. The results and the experimental study are
presented in the section three. The concluding remark is discussed in the last section.
2. Research Method
This work presents an adaptive MAC for CEV environment [19]. The CEV environment
model presented in [19] did not consider the effect of presence of obstacle in CEV radio
propagation environment modelling. The presence of obstacle between transmitter and receiver
affects the signal attenuation among them. This results in drop in network performance. Here
we present an obstacle based radio propagation model. The model compute the additional
attenuation required for transmission between transmitter and receiver in presence of obstacle.
Then we present a selective MAC considering two types of services which is adaptive
considering CEV environment. Likelihood of selectivity for channel contention for positive
transmission considering two types of services is presented.
Let consider that set of vehicle passing through a Vanet environment i.e.
where each vehicle has a radio transmission range . The vehicle can
communicate with each other and no hidden nodes are considered .i.e. each vehicle has
information of all vehicle in network. The vehicle can associate with one vehicle at a time and
the number of adjacent device it can communicate with at a given time can be given as:
{ | } (1)
The neighboring vehicle are separated by distance from each other and the number of
neighbouring vehicle which is set distance apart at instance time is obtained as follows.
{ | } (2)
5. ISSN: 2502-4752
IJEECS Vol. 7, No. 3, September 2017 : 724 – 736
728
where is distance between automobile and . The overall neighbor of a vehicle which is
separated by distance can be computed as follows:
⁄ ∑
| |
∑ | || |
(3)
where | | is the total density of vehicle in the Vanet environment at instance .
The experimental model is designed in such way any vehicle in network can
communicate with each other and transmit packet of size . Each vehicle gain access to
channel and access channel for stipulated session. The bandwidth of channel varies with
respect to time and the user has to decide when to transmit packet based on channel
availability. The channel bandwidth depends on mobility of vehicles and its environmental
characteristics and the radio propagation model. The average arrival rate of vehicle in CEV
environment can be obtained as follows:
| | (4)
where is the speed of vehicle. The speed of vehicle in CEV environment depends on density
of vehicle and can be expressed as follows:
| |
| |
(5)
where is a free flow speed of vehicle in CHR environment without presence of other vehicle in
the network.
The maximum neighbor a particular vehicle b can accommodate is obtained as follows:
⌊ | | ⌋ (6)
The bandwith of a channel at time instance can be obtained as follows:
( ) (7)
where is power required for transmission, is the spectral density power, is distance
between transmitter and the receiver where γ is the path loss parameter and is the bandwith
of channel.
The radio propagation signal attenuation are affected by environmental factors such
shadowing, path loss and fading. The outcome obtained in [20] shows the log-normal path loss
is efficient and is easy to implement which is adopted in model presented in [19]. However these
models are not efficient, since these models do not estimate effects of signal attenuation in
presence of obstacle in Line of Sight (LOS) between transmitter and the receiver. In [21]
showed that the presence of obstacle in LOS between transmitter and receiver affect the signal
attenuation at the receiver. To address the addition attenuation requirement for effective
transmission, here we model the obstacle in our modelling to evaluate the in eq. (4). To
compute the likelihood of LOS ( ) between transmitting ( ) vehicle a and receiving ( ) vehicle
, with one nodes as probable obstacle between and (of altitude and , respectively),
we obtain:
| ( ⁄ ) (8)
Where:
(9)
where represent real altitude of straight line that connects and considering the obstacle is
in first Fresnel ellipsoid. The α depicts the mean altitude of obstructing device, represent
6. IJEECS ISSN: 2502-4752
Selective MAC for Obstacle Aware CEV Environmental Model for V2V (Usha Rani B)
729
the Q-function and δ is the standard deviation of the obstructing device, distance between
sender and the obstructing device, is the distance among and d , the antenna
altitude and is the first Fresnel ellipsoid zone radius which is computed as follows:
√ ⁄ (10)
where λ represent the wavelength as defined in DSRC operating in 5.9 GHz frequency bands. If
the intermediate device obstructs the first Fresnel ellipsoid by less than forty percent then the
LOS is considered to be unobstructed. The additional attenuation required due to presence of
obstacle is computed using [22] which modelled in our simulator.
The Vanet application requires different QoS for different application service. To
support these requirements a selective MAC need to be designed which provides different
selectivity to different services. The selective MAC is designed considering following
environmental setup. Let consider that each vehicle is equipped with single radio which access
channel every 50 milliseconds i.e. switching between control and service channels. Each vehicle
transmit packet in a periodic manner which is represented as Wave short message,
advertisement and beaconing message. The radio status of vehicle can be one of the following
states such as idle, positive or negative. Let consider two frame type of service and . The
service and is distinguished in modelling as follows, and is the length of frame of
service and respectively, and is the minimum size of contention window of service
and service respectively, and is the number of vehicle of service and service
respectively and and is the Random Interframe Delay ) of service and
respectively. The service is consider to have higher channel access selectivity and at the
same time if service want to access channel it has wait for certain time which is computed as
follows;
(11)
where is the number of slot after busy medium and it is retrieved and used for both positive
and negative transmission. To cater selectivity based on frame size the back off time of service
is reduced only after waiting for slots and then it tries to reattempt for transmission.
The slot duration required for positive transmission of service belong to service
is obtained as follows:
⁄ (12)
where is the frame size of service , is data rate and is time taken for convergence of
physical layer.
In similar way the collision or negative transmission for service is determined as
follows;
⁄ (13)
The maximum time duration of collision event for service, if both and transmit is obtained
as follow:
[ ] (14)
The time period of eq. (10), (13) and (14) are estimated in slots (ω) which is as follows
and . The individual time of each event can be computed by adding in
the above equation since it is computed in slots at the service services.
Let consider that the as an important parameter for each service type in defining control
channel slot duration which can be expressed as follows:
⁄ ⁄ (15)
7. ISSN: 2502-4752
IJEECS Vol. 7, No. 3, September 2017 : 724 – 736
730
where is the control channel time period and is the guard interval time. In no
transmission of frame is permitted or if frame transmission is greater than
remaining time duration of control channel.
The main objective of proposed selective MAC is to find the likelihood of positive
transmission considering two service and . The likelihood of positive transmission when
there are unallocated slots and h_cnodes of service c communicates in slot, where
[ ] and , i.e. at least one node from service or communicates is computed
as follow:
( ⁄ ) ( ⁄ )
( ) ( ⁄ ) ( ⁄ )
( ) ( ⁄ ) ( ⁄ ) (16)
where , and is the available window size of and , and are
nodes of service and respectively, is the available slots, and and is a node that that
transmit, and belong to node and respectively.
Let consider ( ) is the likelihood of available slots from . If
or is equal to zero then the likelihood of Eq. (16) can be re-modeled by applying Bernoulli
process as follows:
{( ⁄ ) ( ⁄ ) ( ) ( ⁄ ) ( ⁄ ) (
⁄ ) ( ⁄ ) ( ) ( ⁄ ) ( ⁄ ) (17)
The likelihood that a node of service does not select one of first slots of service out of
slot and slot is selected by service to transmit can be assured by term ( )
when and ( ) when
Now let’s define the likelihood that device in CEV environment select the contention
window of slot out of available slots in beginning of transmission attempt and only
device communicates in slot is obtained as follows;
( ⁄ ) ( ) ( ⁄ ) ( ⁄ ) (18)
Where . The average positive transmission if vehicles of service with
window size and slots available in control channel is computed as follows:
∑ { [ ]
∑ } (19)
Where 1 is the average positive transmission in
the available slots. The term one in above equation shows the likelihood that
out of v device only one vehicle will positively transmit data in slot by picking up back-off
from i slots and is the average positive transmission in the available slot.
The second term defines the likelihood of packet failure due to presence of noise and third term
defines the collision likelihood in the slot when of vehicles communicates. Similar
to eq. (19) the average positive transmission service is computed below.
∑ { [ ]
∑
8. IJEECS ISSN: 2502-4752
Selective MAC for Obstacle Aware CEV Environmental Model for V2V (Usha Rani B)
731
} (20)
The eq. (19) and (20) defines the likelihood of mean positive transmission and
of service and respectively. The likelihood parameter depends on service back off time
after busy medium as defined in eq. (11) and the average positive transmission during control
channel is computed as follow:
{ (21)
Where and {
( )
is the likelihood that no vehicle of
service in selective slots .
Similarly likelihood of cumulative positive transmission for class , )can be
computed. Based on this the likelihood of positive transmission for vehicle of service c, with
, can be computed a:
(22)
Here the likelihood of positive transmission considering two types of services is modelled. In our
model the frame is considered to be dropped when vehicle back off counter does not decrease
to zero at the end of control channel interval. Our model can also be used to compute the frame
loss due to Collison and noise. In next section the experiment are conducted to evaluate the
performance of Proposed CEV-AMACand the results are compared with exiting MAC [12], [23-
25]. A comparison table of this existing model is show in Table 1
Table 1. Comparison with other works
Proposed
Adaptive
Selective
MAC
ENCCM
A
[12]
ZCOR [23] EDF-CSMA [24] CCVC [25]
Medium Access
Control adopted
802.11p
MAC
802.11p
MAC
802.11e MAC 802.11p MAC 802.11p MAC
Medium Access
Control
scheduling
adopted
A-MAC
ENCCM
A
RR-ALOHA EDF-CSMA Slotted aloha
Environment
Modelling
CEV
freely
flowing
vehicles
Monte Carlo No access
realistic
vehicular
communication
Simulator
adopted
SIMITS
[12]
SIMITS NS-2 simulation NS-3 YES (no access)
3. Results and Analysis
The system environment used is windows 10, 64-bit quad core operating system with
16GB of ram and 2GB dedicated. The author have used dot net framework 4.0 and C# 6.0
programming language for the proposed work and conducted experimental study on following
parameter for Packet transmission positively, packet collision and throughput efficiency for
number of vehicle users and evaluate the performance of the proposed adaptive MAC for varied
environmental model. The authors have considered IEEE 802.11p also known as DSRC/WAVE
which has six services channel and one control channel and CEV-AMAC as MAC scheduling
algorithm. The modulation scheme used is QAM-64 which has as a transfer rate of 27 Mbps
(Megabits per seconds) with coding rate of 0.75 and the experiment is conducted by varying the
number of vehicle is to 20, 40 and 80 and simulation is conducted for Village (V), Expressway
(E) and City (C) environmental model and the result of proposed MAC is evaluated with existing
algorithm as shown in Table 1.
9. ISSN: 2502-4752
IJEECS Vol. 7, No. 3, September 2017 : 724 – 736
732
3.1. Throughput Performance Analysis
Figure 2 it shows the throughput efficiency for varied vehicle in city environmental
model. Figure 3 shows the throughput efficiency for varied vehicle in expressway environmental
model. Figure 4 shows the throughput efficiency for varied vehicle in village environmental
model. From all three environment model in Figure 2-4 it can be seen that throughput achieved
is increased with increasing number of vehicle for both the proposed AMAC and existing
NCCMA algorithm [12] and the simulation value obtained in Mbps is tabulated in Table 2.
Figure 5 represent the achieved throughput for the different user (20, 40 and 80) for our
CEV environmental model and from analysis we observed that the achieved throughput in case
of city is high as compared to village and expressway. While achieved throughput for village
environment is low in all. Achieved throughput for city environment is 19.876Mbpsfor proposed
AMAC while for existing NCCMA it is 18.653Mbps. Improved throughput percentage for AMAC
is 6.16% over existingNCCMA. Similarly we analysed the throughput performance for
expressway and village for AMAC and NCCMA and find the throughput for expressway and
village considering AMAC is 18.776 and 16.094Mbps respectively. While for NCCMA throughput
for expressway is 16.094 Mbps and for village it is 15.208 Mbps. Improved throughput
percentage for AMAC over NCCMA for expressway is 9.96% and for village it is 5.62%. For all
CEV environments the proposed AMAC perform better than Existing NCCMA in term of
throughput achieved.
Table 2. Comparison with other works
AMAC-C NCCMA-C AMAC-E NCCMA-E AMAC-V NCCMA-V
20 Vehicle 17.78958 15.49534 17.11671 13.07007 14.79598 13.56419
40 Vehicle 20.78539 19.50812 18.79185 18.52814 15.9719 15.82289
80 vehicle 21.05513 20.95618 20.42226 19.3504 17.5152 16.23841
Figure 2. Throughput achieved for City
environment considering varied vehicles
Figure 3. Throughput achieved for Expressway
environment considering varied vehicles
Figure 4. Throughput achieved for Village
environment considering varied vehicles
Figure 5. Average throughput achieved for CEV
environment
10. IJEECS ISSN: 2502-4752
Selective MAC for Obstacle Aware CEV Environmental Model for V2V (Usha Rani B)
733
3.2. Collision Performance Analysis
For city, expressway and village environmental model, packet collision performance
analysis is done and it is presented in Figure 6, 7 and 8 respectively.
Analysis of packet collision shows that as number of vehicle increased in the network,
packet collision also increased for both the existing NCCMA and proposedAMAC. Average
packet collision in the network is represented in the Figure 9. Form above analysis we can
observed that the collision of packet is high for the village environment as compared to
expressway and city environment. While collision of data packet observed low for the city
environment as compared to other. From analysis we can also say that with increased number
of user collision also get increased in the network. Packet collision reduced 2.8% for AMAC in
case of city environment as compared to MA . similarly reduced packet collision for expressway
is observed as 5.02% and for village environment it is 3.05% as compared with existing
NCCMA. Now we are in position to tell that for all environmental model (city, expressway and
village) proposed AMAC performed better than existing NCCMA in terms of packet collision
performance analysis.
Figure 6. Packet collision analysis for City
environment
Figure 7. Packet collision analysis for
Expressway environment
Figure 8. Packet collision analysis for Village
environment
Figure 9. Packet collision analysis for
CEVenvironment
3.3. Packet Transmission Successful Analysis
Figure 10 it shows the packet transmission performance analysis for varied vehicle in
city environmental model. Figure 11 shows the packet transmission performance analysis for
varied vehicle in expressway environmental model. Figure 12 shows the packet transmission
performance analysis for varied vehicle in village environmental model. From all three
environment model in Figure 10-12 it can be seen that positive or successful packet
transmission is increased with increasing number of vehicle for both the proposed AMAC and
existing NCCMA algorithm.
11. ISSN: 2502-4752
IJEECS Vol. 7, No. 3, September 2017 : 724 – 736
734
In figure 13 it show the average packet transmission in V2V. The packet transmission is
high in city model when compared to expressway and village model and packet transmission is
low in village model when compared to expressway and village model and also we can see that
the packet transmission positively increases with increasing number of vehicles. The successful
transmission of packet of the proposed AMAC for city environment is improved by 2.76% over
the existing NCCMA. The successful transmission of packet of the proposed AMAC for
expressway environment is improved by 8.74% over the existing NCCMA. The successful
transmission of packet of the proposed AMAC for village environment is improved by 4.43%
over the existing NCCMA. For all CEV environments the proposed AMAC perform better than
Existing NCCMA in term of packet transmission performance achieved.
Figure 10. Packet transmission successful
analysis for City environment
Figure 11. Packet transmission successful
analysis for Expressway environment
Figure 12. Packet transmission successful
analysis for Village environment
Figure 13. Average Packet transmission
successful analysis for CEV environment
4. Conclusion
VANET has great potential of achieving objectives of Smart intelligent transport system
(SITS) for improving transport and road safety efficiency. As more and more services is been
provided for V2V based VANET network it is a challenging task to provide QoS to end user due
to wireless medium that has limited channel availability for transmission. Different application
service requires different QoS. Various prioritized MAC has been designed to provision different
QoS for different services. These models radio propagation are designed by adopting mean
attenuation model. The mean attenuation model is not efficient considering the presence of
obstacle in LOS and also considering different environment. As a result of this the channel
availability, network performance and QoS is affected. To address this work present a selective
MAC, obstacle based radio propagation model and CEV environment model. Experiments are
conducted to evaluate the performance proposed AMAC in term of packet collision, succesfull
12. IJEECS ISSN: 2502-4752
Selective MAC for Obstacle Aware CEV Environmental Model for V2V (Usha Rani B)
735
transmission and throughput efficiency. The experiments are conducted by varying the devices
and under different environment such as city, expressway and village. The experimental result
shows the proposed AMAC performs better than exiting NCCMA for CEV environment model in
term of packet collision, positive packet transmission and throughput efficiency and thus helps in
aiding improving QoS for VANET application. In future work we would evaluate the performance
of proposed AMAC considering varied mobility speed and varied packet load for CEV
environmental model and evaluate the performance considering various OFDM modulation
scheme such BPSK,QPSK and QAM that are available for IEEE 802.11p DSRC Protocol and
find which modulation scheme is good for VANET based SITS. Security is another factor that
need be consider in designing secure Vanet model. Therefore the future MAC would consider
provisioning of security into MAC design.
References
[1] L. Zhang, Z. Liu, R. Zou, J. Guo and Y. Liu, “A Scalable CSMA and Self-Organizing TDMA MAC for
IEEE 802.11 p/1609.x in VANETs”, Wireless Pers Comm., Springer, (2014), pp. 1197-1212.
[2] N. Bouchema, R. Naja and A. Tohme1, “Traffic Modeling and Performance Evaluation in Vehicle to
Infrastructure 802.11p Network”, Ad Hoc Networks Lecture Notes of the Institute for Computer
Sciences, Social Informatics and Telecommunications Engineering, Springer, vol. 129, (2014), pp.
82-99.
[3] M. M. Shurman, M. F. Al-Mistarihi, and Z. A. Almori, “MAC Layer Back-off Algorithm for Ad-Hoc
Networks”, MIPRO, OPATIJA, CROATIA, (2013).
[4] N. Bouchema, R. Naja and A. Tohme1, “Traffic Modeling and Performance Evaluation in Vehicle to
Infrastructure 802.11p Network”, Ad Hoc Networks Lecture Notes of the Institute for Computer
Sciences, Social Informatics and Telecommunications Engineering, Springer, vol. 129, (2014), pp.
82-99.
[5] R. A. Saeed, A. B. HjNaemat, A. B. Aris, I.M. Khamis, and M. K. Bin-Awang, “Evaluation of the IEEE
802.11p-based TDMA MAC method for road side-to-vehicle communications,” International Journal
of Network and Mobile Technologies, vol. 1, no. 2, pp. 81–87, 2010.
[6] S. Sehrawat, R. P. Bora, and D. Harihar, “Performance analysis of QoS supported by Enhanced
Distributed Channel Access (EDCA) mechanism in IEEE 802.11e,” IAENG International Journal of
Computer Science, vol. 33, article 1, 2007
[7] K. Bilstrup, E. Uhlemann, E. G. Strom, and U. Bilstrup, “On the ability of the 802.11p MAC method
and STDMA to support real-time vehicle-to-vehicle communication,” EURASIP Journal on Wireless
Communications and Networking, vol. 2009, Article ID 902414, pp. 1687–1472, 2009.
[8] S. Eichler, “Performance evaluation of the IEEE 802.11p WAVE communication standard,” IEEE
Vehicular Technology Conference (VTC '07), pp. 2199–2203, 2007.
[9] K. Bilstrup, E. Uhlemann, E. G. Strom, and U. Bilstrup, “On the ability of the 802.11pMACmethod and
STDMA to support real-time vehicle-to-vehicle communication,” EURASIP Journal on Wireless
Communications and Networking, vol. 2009,Article ID 902414, pp. 1687–1472, 2009.
[10] F. Yu and S. Biswas, “Self-configuring TDMA protocols for enhancing vehicle safety with DSRC
based vehicle-to-vehicle communications,” IEEE Journal on Selected Areas in Communications, vol.
25, no. 8, pp. 1526–1537, 2007.
[11] L. Roberts, “Aloha packet system with and without slots and capture,” ACM SIGCOMM Computer
Communication Review, vol. 5, no. 2, pp. 28–42, 1975.
[12] Mario Manzano, Felipe Espinosa; Ning Lu; Xuemin Shen; Mark, J.W.; Fuqiang Liu, " Cognitive Self-
Scheduled Mechanism for Access Control in Noisy Vehicular Ad Hoc Networks," 2015.
[13] A. Kaur and J. Malhotra, “On the Selection of QoS Provisioned Routing Protocol through Realistic
Channel for VANET”, International Journal of Scientific and Technology Research, ISSN 2277-8616,
vol. 4, no. 07, (2015) July.
[14] A. U. Haque, M. Saeed and F. A. Siddiqui, “Comparative Study of BPSK and QPSK for Wireless
Networks over NS2”, International Journal of Computer Applications (0975 – 8887), vol. 41, no. 19,
(2012) March.
[15] P. K. Singh, “Influences of TwoRayGround and Nakagami Propagation model for the Performance of
Adhoc Routing Protocol in VANET”, International Journal of Computer Applications (0975 – 8887),
vol. 45, no. 22, (2012) May.
[16] M. M. Shurman, M. F. Al-Mistarihi, and Z. A. Almori, “MAC Layer Back-off Algorithm for Ad-Hoc
Networks”, MIPRO, OPATIJA, CROATIA, (2013).
[17] S. A. Gillani, P. A. Shah, A. Qayyum and H. B. Hasbullah, “MAC Layer Challenges and Proposed
Protocols for Vehicular Ad-hoc Networks”, Vehicular Ad-hoc Networks for Smart Cities Advances in
Intelligent Systems and Computing, Springer, vol. 306, (2015), pp. 3-13.
13. ISSN: 2502-4752
IJEECS Vol. 7, No. 3, September 2017 : 724 – 736
736
[18] Md. H. Rahman and M. Nasiruddin, “Impact of Two Realistic Mobility Models for Vehicular Safety
Applications”, ICIEV, IEEE, (2014), pp. 1-6.
[19] B. U. Rani and S. Tarannum, "A channel modelling considering varied environmental model for
DSRC based V2V application services," 2016 3rd International Conference on Devices, Circuits and
Systems (ICDCS), Coimbatore, 2016, pp. 48-53.
[20] S. A. Vaqar and O. Basir, “Traffic pattern detection in a partially deployed vehicular ad hoc network of
vehicles,” IEEE Wireless Commun., vol. 16, no. 6, pp. 40–46, Dec. 2009.
[21] W. Viriyasitavat, M. Boban, H. M. Tsai and A. Vasilakos, "Vehicular Communications: Survey and
Challenges of Channel and Propagation Models," in IEEE Vehicular Technology Magazine, vol. 10,
no. 2, pp. 55-66, June 2015.
[22] ITU-R, “Propagation by diffraction,” International Telecommunication Union Radio communication
Sector, Geneva, Recommendation P.526, Feb. 2007.
[23] Haiyue Piao, Yongtae Park, Byungjo Kim and Hyogon Kim" Safety Beaconing Rate Control Based on
Vehicle Counting in WAVE," 2015.
[24] Che-Yu Chang, Hsu-Chun Yen, and Der-Jiunn Deng "V2V QoS Guaranteed Channel Access in IEEE
802.11p VANETs," in Vehicular Technology, IEEE Transactions, 2015.
[25] Gruteser, M.; Pompili, D., "Coordination-free Safety Messages Dissemination Protocol for Vehicular
Networks," in Vehicular Technology, IEEE Transactions on , vol.PP, no.99, pp.1-1, 2012.