Fifth Generation Vehicular Cloud Computing (5G-VCC) systems use heterogeneous network access technologies in order to fulfill the requirements of modern services, including medical services with strict constraints. Therefore, the need for efficient Vertical Handover (VHO) management schemes must be addressed. In this paper, a VHO management scheme for supporting medical services in 5G-VCC systems, is described. It consists of the VHO initiation and the network selection processes, while at the same time, the vehicle’s velocity, its current connection type, as well as the status of the onboard patient’s health, are considered. Specifically, during the VHO initiation process the necessity to perform handover is evaluated. Subsequently, the network selection process selects the appropriate network alternative considering both medical service requirements and patients’ health status. The proposed scheme is applied to a 5G-VCC system which includes Long Term Evolution (LTE) and Worldwide Interoperability Microwave Access (WiMAX) Macrocells and Femtocells, as well as Wireless Access for Vehicular Environment Road Side Units (WAVE RSUs). Performance evaluation shows that the proposed algorithm outperforms existing VHO management schemes.
An analytic network process and trapezoidal interval-valued fuzzy technique f...University of Piraeus
Next generation wireless networks consist of many heterogeneous access technologies that should support various service types with different quality of service (QoS) constraints, as well as user, requirements and provider policies. Therefore, the need for network selection mechanisms that consider multiple factors must be addressed. In this paper, a network selection method is proposed by applying the analytic network process to estimate the weights of the selection criteria, as well as a fuzzy version of technique for order preference by similarity to ideal solution to perform the ranking of network alternatives. The method is applied to a heterogeneous network environment providing different QoS classes and policy characteristics. Each user applies the method to select the most appropriate network, which satisfies his or her requirements in respect of his or her service-level agreement (SLA). Performance evaluation shows that when the user requests only one service, the proposed method performs better compared to the original technique for order preference by similarity to ideal solution, as well as the Fuzzy AHP-ELECTRE method. Moreover, the proposed method can be applied in cases where a user requires multiple services simultaneously on a device. The sensitivity analysis of the proposed method shows that it can be properly adjusted to conform to network environment changes.
An Optimal Route Discovery using Biogeography based Optimization for Vehicula...StevePrice20
Vehicular ad hoc network (VANET) is a subdivision of the mobile ad hoc networks which uses the moving vehicles as mobile nodes to form the mobile network. In conventional vehicular communications, the restricted radio frequency bandwidth affects the network performances. Therefore, Visible Light Communication (VLC) is integrated with the growing vehicular ad hoc network to obtain high data rate and less energy consumption during the communication. In this paper, vehicular communication is integrated with visible light communication to avoid the issues caused by the restricted radio frequency bandwidth. Moreover, the Routing using Biogeography Based Optimization (RBBO) is proposed to develop an optimal route between the source vehicles to the destination. This research performs two different communications such as vehicle to vehicle and vehicle to the infrastructure. The performance of the RBBOVLC-VANET method is analyzed by means of throughput, packet delivery ratio, delay and routing overhead as well as these performances are compared with the existing method namely ant colony optimization based routing protocol. The throughput of the routing using the biogeography based optimization method is 589.763 kbps for 500 nodes which is high when compared to the existing method.
A two Stage Fuzzy Logic Adaptive Traffic Signal Control for an Isolated Inter...ijtsrd
In this paper, a two stage fuzzy logic system has been proposed to control an isolated intersection adaptively. The aim of this work is to minimize the average waiting time for a different traffic flow rates in real time means. In the first stage, the system consists of two modules named next phase selection module and the green phase extension module. In the second stage the system consists of the decision named module. The study was performed using SUMO traffic simulator. A comparison is made between a fuzzy logic controller and a conventional fixed time controller. As a result, fuzzy logic controller has shown better performance. Taha Mahmood | Muzamil Eltejani Mohammed Ali | Akif Durdu ""A two Stage Fuzzy Logic Adaptive Traffic Signal Control for an Isolated Intersection Based on Real Data using SUMO Simulator"" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-3 | Issue-4 , June 2019, URL: https://www.ijtsrd.com/papers/ijtsrd23873.pdf
Paper URL: https://www.ijtsrd.com/engineering/electronics-and-communication-engineering/23873/a-two-stage-fuzzy-logic-adaptive-traffic-signal-control-for-an-isolated-intersection-based-on-real-data-using-sumo-simulator/taha-mahmood
MECC scheduling algorithm in vehicular environment for uplink transmission in...IJECEIAES
Single Carrier Frequency Division Multiple Access (SC-FDMA) is chosen because of the lower peak-to-average power ratio (PAPR) value in uplink transmission. However, the contiguity constraint is one of the major constraint presents in uplink packet scheduling, where all RBs allocated to a single UE must be contiguous in the frequency-domain within each time slot to maintain its single carrier. This paper proposed an uplink-scheduling algorithm namely the Maximum Expansion with Contiguity Constraints (MECC) algorithm, which supports both the RT and NRT services. The MECC algorithm is deployed in two stages. In the first stage, the RBs are allocated fairly among the UEs. The second stage allocates the RBs with the highest metric value and expands the allocation on both sides of the matrix, M with respect to the contiguity constraint. The performance of the MECC algorithm was observed in terms of throughput, fairness, delay, and Packet Loss Ratio (PLR) for VoIP, video and best effort flows. The MECC scheduling algorithm is compared to other algorithms namely the Round Robin (RR), Channel-Dependent First Maximum Expansion (CD-FME), and Proportional Fairness First Maximum Expansion (PF-FME). From here, it can be concluded that the MECC algorithm shows the best results among other algorithms by delivering the highest throughput which is up to 81.29% and 90.04% than CD-FME and RR scheduler for RT and NRT traffic respectively, having low PLR and delay which is up to 93.92% and 56.22% of improvement than CD-FME for the RT traffic flow. The MECC also has a satisfactory level of fairness for the cell-edge users in a vehicular environment of LTE network.
Generalized optimal placement of PMUs considering power system observability,...IJECEIAES
This paper presents a generalized optimal placement of Phasor Measurement Units (PMUs) considering power system observability, reliability, Communication Infrastructure (CI), and latency time associated with this CI. Moreover, the economic study for additional new data transmission paths is considered as well as the availability of predefined locations of some PMUs and the preexisting communication devices (CDs) in some buses. Two cases for the location of the Control Center Base Station (CCBS) are considered; predefined case and free selected case. The PMUs placement and their required communication network topology and channel capacity are co-optimized simultaneously. In this study, two different approaches are applied to optimize the objective function; the first approach is combined from Binary Particle Swarm Optimization-Gravitational Search Algorithm (BPSOGSA) and the Minimum Spanning Tree (MST) algorithm, while the second approach is based only on BPSOGSA. The feasibility of the proposed approaches are examined by applying it to IEEE 14-bus and IEEE 118-bus systems.
MAR SECURITY: IMPROVED SECURITY MECHANISM FOR EMERGENCY MESSAGES OF VANET USI...IJCNCJournal
Vehicular Ad-hoc network (VANET) is one of the emerging technologies for research community to get various research challenges to construct secured framework for autonomous vehicular communication. The prime concern of this technology is to provide efficient data communication among registered vehicle nodes. The several research ideas are implemented practically to improve overall communication in VANETs by considering security and privacy as major aspects of VANETs. Several mechanisms have been implemented using cryptography algorithms and methodologies. However, these mechanisms provide a solution only for some restricted environments and to limited security threats. Hence, the proposed novel mechanism has been introduced, implemented and tested using key management technique. It provides secured network environment for VANET and its components. Later, this mechanism provides security for data packets of emergency messages using cryptography mechanism. Hence, the proposed novel mechanism is named Group Key Management & Cryptography Schemes (GKMC). The experimental analysis shows significant improvements in the network performance to provide security and privacy for emergency messages. This GKMC mechanism will help the VANET user’s to perform secured emergency message communication in network environment.
An analytic network process and trapezoidal interval-valued fuzzy technique f...University of Piraeus
Next generation wireless networks consist of many heterogeneous access technologies that should support various service types with different quality of service (QoS) constraints, as well as user, requirements and provider policies. Therefore, the need for network selection mechanisms that consider multiple factors must be addressed. In this paper, a network selection method is proposed by applying the analytic network process to estimate the weights of the selection criteria, as well as a fuzzy version of technique for order preference by similarity to ideal solution to perform the ranking of network alternatives. The method is applied to a heterogeneous network environment providing different QoS classes and policy characteristics. Each user applies the method to select the most appropriate network, which satisfies his or her requirements in respect of his or her service-level agreement (SLA). Performance evaluation shows that when the user requests only one service, the proposed method performs better compared to the original technique for order preference by similarity to ideal solution, as well as the Fuzzy AHP-ELECTRE method. Moreover, the proposed method can be applied in cases where a user requires multiple services simultaneously on a device. The sensitivity analysis of the proposed method shows that it can be properly adjusted to conform to network environment changes.
An Optimal Route Discovery using Biogeography based Optimization for Vehicula...StevePrice20
Vehicular ad hoc network (VANET) is a subdivision of the mobile ad hoc networks which uses the moving vehicles as mobile nodes to form the mobile network. In conventional vehicular communications, the restricted radio frequency bandwidth affects the network performances. Therefore, Visible Light Communication (VLC) is integrated with the growing vehicular ad hoc network to obtain high data rate and less energy consumption during the communication. In this paper, vehicular communication is integrated with visible light communication to avoid the issues caused by the restricted radio frequency bandwidth. Moreover, the Routing using Biogeography Based Optimization (RBBO) is proposed to develop an optimal route between the source vehicles to the destination. This research performs two different communications such as vehicle to vehicle and vehicle to the infrastructure. The performance of the RBBOVLC-VANET method is analyzed by means of throughput, packet delivery ratio, delay and routing overhead as well as these performances are compared with the existing method namely ant colony optimization based routing protocol. The throughput of the routing using the biogeography based optimization method is 589.763 kbps for 500 nodes which is high when compared to the existing method.
A two Stage Fuzzy Logic Adaptive Traffic Signal Control for an Isolated Inter...ijtsrd
In this paper, a two stage fuzzy logic system has been proposed to control an isolated intersection adaptively. The aim of this work is to minimize the average waiting time for a different traffic flow rates in real time means. In the first stage, the system consists of two modules named next phase selection module and the green phase extension module. In the second stage the system consists of the decision named module. The study was performed using SUMO traffic simulator. A comparison is made between a fuzzy logic controller and a conventional fixed time controller. As a result, fuzzy logic controller has shown better performance. Taha Mahmood | Muzamil Eltejani Mohammed Ali | Akif Durdu ""A two Stage Fuzzy Logic Adaptive Traffic Signal Control for an Isolated Intersection Based on Real Data using SUMO Simulator"" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-3 | Issue-4 , June 2019, URL: https://www.ijtsrd.com/papers/ijtsrd23873.pdf
Paper URL: https://www.ijtsrd.com/engineering/electronics-and-communication-engineering/23873/a-two-stage-fuzzy-logic-adaptive-traffic-signal-control-for-an-isolated-intersection-based-on-real-data-using-sumo-simulator/taha-mahmood
MECC scheduling algorithm in vehicular environment for uplink transmission in...IJECEIAES
Single Carrier Frequency Division Multiple Access (SC-FDMA) is chosen because of the lower peak-to-average power ratio (PAPR) value in uplink transmission. However, the contiguity constraint is one of the major constraint presents in uplink packet scheduling, where all RBs allocated to a single UE must be contiguous in the frequency-domain within each time slot to maintain its single carrier. This paper proposed an uplink-scheduling algorithm namely the Maximum Expansion with Contiguity Constraints (MECC) algorithm, which supports both the RT and NRT services. The MECC algorithm is deployed in two stages. In the first stage, the RBs are allocated fairly among the UEs. The second stage allocates the RBs with the highest metric value and expands the allocation on both sides of the matrix, M with respect to the contiguity constraint. The performance of the MECC algorithm was observed in terms of throughput, fairness, delay, and Packet Loss Ratio (PLR) for VoIP, video and best effort flows. The MECC scheduling algorithm is compared to other algorithms namely the Round Robin (RR), Channel-Dependent First Maximum Expansion (CD-FME), and Proportional Fairness First Maximum Expansion (PF-FME). From here, it can be concluded that the MECC algorithm shows the best results among other algorithms by delivering the highest throughput which is up to 81.29% and 90.04% than CD-FME and RR scheduler for RT and NRT traffic respectively, having low PLR and delay which is up to 93.92% and 56.22% of improvement than CD-FME for the RT traffic flow. The MECC also has a satisfactory level of fairness for the cell-edge users in a vehicular environment of LTE network.
Generalized optimal placement of PMUs considering power system observability,...IJECEIAES
This paper presents a generalized optimal placement of Phasor Measurement Units (PMUs) considering power system observability, reliability, Communication Infrastructure (CI), and latency time associated with this CI. Moreover, the economic study for additional new data transmission paths is considered as well as the availability of predefined locations of some PMUs and the preexisting communication devices (CDs) in some buses. Two cases for the location of the Control Center Base Station (CCBS) are considered; predefined case and free selected case. The PMUs placement and their required communication network topology and channel capacity are co-optimized simultaneously. In this study, two different approaches are applied to optimize the objective function; the first approach is combined from Binary Particle Swarm Optimization-Gravitational Search Algorithm (BPSOGSA) and the Minimum Spanning Tree (MST) algorithm, while the second approach is based only on BPSOGSA. The feasibility of the proposed approaches are examined by applying it to IEEE 14-bus and IEEE 118-bus systems.
MAR SECURITY: IMPROVED SECURITY MECHANISM FOR EMERGENCY MESSAGES OF VANET USI...IJCNCJournal
Vehicular Ad-hoc network (VANET) is one of the emerging technologies for research community to get various research challenges to construct secured framework for autonomous vehicular communication. The prime concern of this technology is to provide efficient data communication among registered vehicle nodes. The several research ideas are implemented practically to improve overall communication in VANETs by considering security and privacy as major aspects of VANETs. Several mechanisms have been implemented using cryptography algorithms and methodologies. However, these mechanisms provide a solution only for some restricted environments and to limited security threats. Hence, the proposed novel mechanism has been introduced, implemented and tested using key management technique. It provides secured network environment for VANET and its components. Later, this mechanism provides security for data packets of emergency messages using cryptography mechanism. Hence, the proposed novel mechanism is named Group Key Management & Cryptography Schemes (GKMC). The experimental analysis shows significant improvements in the network performance to provide security and privacy for emergency messages. This GKMC mechanism will help the VANET user’s to perform secured emergency message communication in network environment.
Improving energy efficiency in manet’s for healthcare environmentsijmnct
Now a day ad hoc mobile networks (MANETs) have lots of routing protocols, but no one can meet
maximum performance. Some are good in a small network; some are suitable in large networks, and some
give better performance in location or global networks. Today modern and innovative applications for
health care environments based on a wireless network are being developed in the commercial sectors. The
emerging wireless networks are rapidly becoming a fundamental part of every single field of life. Our
proposed DEERP framework gives a better performance as compared to other routing protocol.
Throughput in cooperative wireless networksjournalBEEI
Cognitive radio networks emerge as a solution to fixed allocation issues and spectrum scarcity through the dynamic access to spectrum. In cognitive networks, users must make intelligent decisions based on spectrum variation and actions taken by other users. Under this dynamic, cooperative systems can significantly improve quality of service parameters. This article presents the comparative study of the multi-criteria decision-making algorithms SAW and FFAHP through four levels of cooperation (10%, 20%, 50%, 80% y 100%) established between secondary users. The results show the performance evaluation obtained through of simulations and experimental measurements. The analysis is carried out based on throughput, depending on the class of service and the type of traffic.
WARM WELCOME FROM HCL VELACHERY…….
HCL Learning is part of HCL Info Systems Ltd, India’s Premier information enabling company with an annual turnover of 15000 crores Leveraging on the 34 years of industry experience of HCL, with an objective to develop quality IT professionals to meet this ever expanding requirement of Hardware Networking and Software professionals for the IT sector, HCL has launched HCL Career Development Centre.
For any clarification,
contact Person
Mr.Senthilvel.S
9382207007
HCL Velachery -42.
A Mobile Ad hoc Network generally called MANET[1][2] consists of a set of mobile nodes equipped with wireless communication interfaces, forming a network without resorting to any fixed infrastructure or centralized administration, this research topic has attracted increasing interest among researchers given their characteristics and potential applications and subsets (VANET[3], WSN[4]). This paper treats both scientific and technological research aimed at presenting an in-depth study of these networks and evaluating solutions to address their problems, particularly that of routing, in order to facilitate their deployment.
Last mile mobile hybrid optical wireless access network routing enhancementjournalBEEI
This study focuses on mobile ad hoc networks (MANETs) that support Internet routing protocol imposing stringent resource consumption constraints of Quality of service (QoS). The mobile Internet causes the ongoing issue of inefficient use of the MANET resources due to its random nature of wireless environments. In this paper, the new improved architecture of the last mile mobile hybrid optical-wireless access network (adLMMHOWAN) is proposed and designed to tackle the arised issues. The proposed design is based on a unified wireless-wired network solution required the deployment of MANET-based wireless fidelity (WiFi) technology at the wireless front-end and wavelengths division multiplexing passive optical network (WDM PON) at the optical backhaul. The critical performance metrics such as network capacity and energy consumption based on modified AODVUU routing protocol using OMNeT++ software is analyzed with 2 scenarios, namely the number of nodes and mobility speed. This mode of communication results in better QoS network capacity of 47.07% improvement, with 26.85% reduction of lower energy resource consumption for mobile wireless front-end over passive optical network backhaul architecture when compared with the existing work of oRiq scheme that focus on improvement in MANETs.
Integrating device to device network with internet of health things: Towards ...journalBEEI
Among the crucial invention of the 5G is the device to device (D2D) system, whereby cellular gadgets correspond via immediate transfer or by multihop transfer excluding the ground-terminal. It is probable that D2D users are concurrent with human body network. Due to this, we suggested an internet of health things (IoHT) system which enables collaboration work among D2D users and human body indicators. We may regard the power as the most unique source in the wireless body area network (WBAN). The least needed transferring capacity may accomplish a particular degree of function, and minimum capacity for transfer holds a crucial responsibility in decreasing power usage. In this study, we discovered the needed transfer energy of four transferring modes: the straight transferring system, the double-hop transferring system, as well as double increasing coordinated transferring system with Rayleigh medium vanishing in its layout. Besides that, we suggested an energy-competent system named as efficient-power transmission mode selection-based (EPTMS) system. The suggested system chooses suitable transferring system whereby it offers the least needed transferring energy that assures a particular transfer duration. The statistical as well as simulation results shows that the two-master node cooperative protocols (TMNCP), EPTMS may enhance system conduction within the main criteria.
ITA: The Improved Throttled Algorithm of Load Balancing on Cloud ComputingIJCNCJournal
Cloud computing makes the information technology industry boom. It is a great solution for businesses who want to save costs while ensuring the quality of service. One of the key issues that make cloud computing successful is the load balancing technique used in the load balancer to minimize time costs and optimize costs economically. This paper proposes an algorithm to enhance the processing time of tasks so that it can help improve the load balancing capacity on cloud computing. This algorithm, named as Improved Throttled Algorithm (ITA), is an improvement of Throttled Algorithm. The paper uses the Cloud Analyst tool to simulate. The selected algorithms are used to compare: Equally Load, Round Robin, Throttled and TMA. The simulation results show that the proposed algorithm ITA has improved the processing time of tasks, time spent processing requests and reduced the cost of Datacenters compared to the selected popular algorithms as above. The improvement of ITA is because of selecting virtual machines in an index table that is available but in order of priority. It helps response times and processing times remain stable, limits the idling resources, and cloud costs are minimized compared to selected algorithms.
International Journal of Engineering Research and DevelopmentIJERD Editor
Electrical, Electronics and Computer Engineering,
Information Engineering and Technology,
Mechanical, Industrial and Manufacturing Engineering,
Automation and Mechatronics Engineering,
Material and Chemical Engineering,
Civil and Architecture Engineering,
Biotechnology and Bio Engineering,
Environmental Engineering,
Petroleum and Mining Engineering,
Marine and Agriculture engineering,
Aerospace Engineering.
Recent many works have concentrated on
dynamically turning on/off some base stations (BSs) in order to
improve energy efficiency in radio access networks (RANs). In
this survey, we broaden the research over BS switching
operations, which should competition up with traffic load
variations. The proposed method formulate the traffic variations
as a Markov decision process which should differ from dynamic
traffic loads which are still quite challenging to precisely forecast.
A reinforcement learning framework based BS switching
operation scheme was designed in order to minimize the energy
consumption of RANs. Furthermore a transfer actor-critic
algorithm (TACT) is used to speed up the ongoing learning
process, which utilizes the transferred learning expertise in
historical periods or neighboring regions. The proposed TACT
algorithm performs jumpstart and validates the feasibility of
significant energy efficiency increment.
Vehicle detection and tracking techniques a concise reviewsipij
Vehicle detection and tracking applications play an important role for civilian and military applications
such as in highway traffic surveillance control, management and urban traffic planning. Vehicle detection
process on road are used for vehicle tracking, counts, average speed of each individual vehicle, traffic
analysis and vehicle categorizing objectives and may be implemented under different environments
changes. In this review, we present a concise overview of image processing methods and analysis tools
which used in building these previous mentioned applications that involved developing traffic surveillance
systems. More precisely and in contrast with other reviews, we classified the processing methods under
three categories for more clarification to explain the traffic systems.
Fifth generation (5G) Vehicular Cloud Computing (VCC) systems use heterogeneous network access technologies to
fulfill the requirements of modern services. Multiple services with dierent Quality of Service (QoS) constraints could be available in each vehicle, while at the same time, user requirements and provider policies must be addressed. Therefore, the design of ecient Vertical Handover (VHO) management schemes for 5G-VCC infrastructures is needed. In this paper, a novel VHO management scheme for 5G-VCC systems is proposed. Whenever the user satisfaction grade becomes less than a predefined threshold, VHO is initiated and network selection is performed, considering the velocity of the vehicle, network characteristic criteria such as throughput, delay, jitter and packet loss, as well as provider policy criteria such as service reliability, security and price. The proposed scheme uses linguistic values for VHO criteria attributes represented by Interval Valued Pentagonal Fuzzy Numbers (IVPFNs) to express the information using membership intervals. The VHO scheme is applied to a 5G-VCC system which includes 3GPP Long Term Evolution (LTE) and IEEE 802.16 Worldwide Interoperability for Microwave Access (WiMAX) Macrocells and Femtocells, as well as IEEE 802.11p Wireless Access for Vehicular Environment (WAVE) Road Side Units (RSUs). Performance evaluation shows that the suggested method ensures the Always Best Connection (ABC) principle, while at the same time outperforms existing VHO management schemes.
A Vertical Handover Management Scheme for VANET Cloud Computing SystemsUniversity of Piraeus
Vehicular Cloud Computing (VCC) systems use heterogeneous network access technologies in order to fulfill the requirements of modern services. Therefore, the need for efficient Vertical Handover (VHO) management schemes must be addressed. In this paper a VHO management scheme for VCC systems is described. The proposed method takes into account the vehicles velocity as well as its current connection type and applies a two step VHO algorithm to reduce operations’ costs and optimize mobility management. Accordingly, as a first step a VHO initiation process evaluates the necessity to perform handover and subsequently a network selection process selects the appropriate network alternative considering both vehicular service requirements and operators’ policies. The proposed scheme is applied to a VCC system which includes Long Term Evolution (LTE) Macrocells and Femtocells as well as 802.11p Road Side Units (RSUs). Performance evaluation shows that the suggested algorithm ensures the Always Best Connection (ABC) principle, while at the same time outperforms existing VHO management schemes.
HANDOVER OPTIMIZATION BASED ON MEDIA INDEPENDENT HANDOVER IN NEW NETWORKS NGWN IJCNCJournal
One of the challenging issues in Next Generation Wireless Network (NGWN) is achieving seamless Vertical
Handover (VHO) while roaming between different technologies such as Wireless Fidelity (Wi- Fi),
Worldwide Interoperability for Microwave Access (WiMAX), Universal Mobile Telecommunications
System (UMTS) and Long Term Evolution (LTE). F or that the telecommunication operators will be
required to develop a strategy for interoperability of these different types of existing network to give the
best connection anywhere anytime for the Mobile Users (MUs).
To full these requirements we propose a new VHO approach that based on loose coupling internetworking
in conjunction with Mobile IPv4 ( MIPv4) under Media Independent Handover (MIH). Our objective is
develop a strategy for interoperability of different technologies and optimized the VHO decision. Our
proposed approach provides more exhaustive, high accurate and better performance compared with the
approaches proposed in the literature.
A Network Selection Scheme with Adaptive Criteria Weights for 5G Vehicular Sy...University of Piraeus
Fifth Generation Vehicular Cloud Computing (5G-VCC) systems use heterogeneous network access technologies to fulfill the requirements of modern vehicular services. Efficient network selection algorithms are required to satisfy the constraints of Driver Assistance (DA) services, Passengers Entertainment and Information (PEnI) services and Medical (MED) services that provided to vehicular users. The presence of MED services affects the importance of other services in situations where patients with immediate health status exist within the vehicle. This paper proposes a network selection scheme which considers the patient health status to adapt the importance of each service. The scheme consists of two Fuzzy Multi Attribute Decision Making (FMADM) algorithms: the Trapezoidal Fuzzy Adaptive Analytic Network Process (TF-AANP) to calculate the relative importance of each vehicular service and the selection criteria, as well as the Trapezoidal Fuzzy Topsis with Adaptive Criteria Weights (TFT-ACW) to accomplish the ranking of the candidate networks. Both algorithms use Interval-Valued Trapezoidal Fuzzy Numbers (IVTFN). Performance evaluation shows that the suggested method outperforms existing algorithms by satisfying the constraints of MED services when the patient health status becomes immediate.
Performance Analysis and Optimization of Next Generation Wireless NetworksUniversity of Piraeus
The Fifth Generation (5G) networks, including the 5G Vehicular Cloud Computing (5G-VCC) systems, have evolved rapidly offering multiple services to users. The operating principles of vehicular networks, Cloud Computing (CC), Fog Computing (FC), Mobile Edge Computing (MEC) and Software Defined Networks (SDN) are applied to 5G infrastructures. In a 5G-VCC system, the vehicles are equipped with On-Board Units (OBUs) which communicate with each other as well as with Road Side Units (RSUs). Each RSU interacts with a Cloud infrastructure which offers vehicular services with strict Quality of Service (QoS) requirements, including Driver Assistance (DA), Passengers Entertainment and Information (PEnI) and Medical (MED) services. Dense deployments of 5G access networks are also implemented, called Ultra Dense Networks (UDNs), aiming to support high data rates produced by an increased number of vehicular users. In this environment, heterogeneous technologies are used to transfer the network services to vehicles. Optimal manipulation of the communication resources is required, while at the same time vehicular users should always obtain connectivity to the most appropriate network access technology, in order the constraints of the vehicular services to be satisfied. In this thesis, existing schemes for resource allocation as well as for mobility management are studied, while novel solutions are proposed for each topic.
A Survey on Medium Access Control Schemes for 5G Vehicular Cloud Computing Sy...University of Piraeus
Fifth generation (5G) vehicular systems support multiple services with strict Quality of Service (QoS) constraints. To fulfill the increased communication needs, 5G Vehicular Cloud Computing (5G-VCC) architectures with dense deployments of the access network infrastructures have been proposed. In such systems, the network resources manipulation is a critical task that could be addressed by the Medium Access Control (MAC) layer. MAC schemes that have been proposed for vehicular networks, can be applied to 5G-VCC systems in order optimal manipulation of communication resources to be accomplished. This paper makes an overview of available MAC schemes, while a comprehensive discussion about their implementation in 5G-VCC systems is performed leading to useful conclusions.
Improving energy efficiency in manet’s for healthcare environmentsijmnct
Now a day ad hoc mobile networks (MANETs) have lots of routing protocols, but no one can meet
maximum performance. Some are good in a small network; some are suitable in large networks, and some
give better performance in location or global networks. Today modern and innovative applications for
health care environments based on a wireless network are being developed in the commercial sectors. The
emerging wireless networks are rapidly becoming a fundamental part of every single field of life. Our
proposed DEERP framework gives a better performance as compared to other routing protocol.
Throughput in cooperative wireless networksjournalBEEI
Cognitive radio networks emerge as a solution to fixed allocation issues and spectrum scarcity through the dynamic access to spectrum. In cognitive networks, users must make intelligent decisions based on spectrum variation and actions taken by other users. Under this dynamic, cooperative systems can significantly improve quality of service parameters. This article presents the comparative study of the multi-criteria decision-making algorithms SAW and FFAHP through four levels of cooperation (10%, 20%, 50%, 80% y 100%) established between secondary users. The results show the performance evaluation obtained through of simulations and experimental measurements. The analysis is carried out based on throughput, depending on the class of service and the type of traffic.
WARM WELCOME FROM HCL VELACHERY…….
HCL Learning is part of HCL Info Systems Ltd, India’s Premier information enabling company with an annual turnover of 15000 crores Leveraging on the 34 years of industry experience of HCL, with an objective to develop quality IT professionals to meet this ever expanding requirement of Hardware Networking and Software professionals for the IT sector, HCL has launched HCL Career Development Centre.
For any clarification,
contact Person
Mr.Senthilvel.S
9382207007
HCL Velachery -42.
A Mobile Ad hoc Network generally called MANET[1][2] consists of a set of mobile nodes equipped with wireless communication interfaces, forming a network without resorting to any fixed infrastructure or centralized administration, this research topic has attracted increasing interest among researchers given their characteristics and potential applications and subsets (VANET[3], WSN[4]). This paper treats both scientific and technological research aimed at presenting an in-depth study of these networks and evaluating solutions to address their problems, particularly that of routing, in order to facilitate their deployment.
Last mile mobile hybrid optical wireless access network routing enhancementjournalBEEI
This study focuses on mobile ad hoc networks (MANETs) that support Internet routing protocol imposing stringent resource consumption constraints of Quality of service (QoS). The mobile Internet causes the ongoing issue of inefficient use of the MANET resources due to its random nature of wireless environments. In this paper, the new improved architecture of the last mile mobile hybrid optical-wireless access network (adLMMHOWAN) is proposed and designed to tackle the arised issues. The proposed design is based on a unified wireless-wired network solution required the deployment of MANET-based wireless fidelity (WiFi) technology at the wireless front-end and wavelengths division multiplexing passive optical network (WDM PON) at the optical backhaul. The critical performance metrics such as network capacity and energy consumption based on modified AODVUU routing protocol using OMNeT++ software is analyzed with 2 scenarios, namely the number of nodes and mobility speed. This mode of communication results in better QoS network capacity of 47.07% improvement, with 26.85% reduction of lower energy resource consumption for mobile wireless front-end over passive optical network backhaul architecture when compared with the existing work of oRiq scheme that focus on improvement in MANETs.
Integrating device to device network with internet of health things: Towards ...journalBEEI
Among the crucial invention of the 5G is the device to device (D2D) system, whereby cellular gadgets correspond via immediate transfer or by multihop transfer excluding the ground-terminal. It is probable that D2D users are concurrent with human body network. Due to this, we suggested an internet of health things (IoHT) system which enables collaboration work among D2D users and human body indicators. We may regard the power as the most unique source in the wireless body area network (WBAN). The least needed transferring capacity may accomplish a particular degree of function, and minimum capacity for transfer holds a crucial responsibility in decreasing power usage. In this study, we discovered the needed transfer energy of four transferring modes: the straight transferring system, the double-hop transferring system, as well as double increasing coordinated transferring system with Rayleigh medium vanishing in its layout. Besides that, we suggested an energy-competent system named as efficient-power transmission mode selection-based (EPTMS) system. The suggested system chooses suitable transferring system whereby it offers the least needed transferring energy that assures a particular transfer duration. The statistical as well as simulation results shows that the two-master node cooperative protocols (TMNCP), EPTMS may enhance system conduction within the main criteria.
ITA: The Improved Throttled Algorithm of Load Balancing on Cloud ComputingIJCNCJournal
Cloud computing makes the information technology industry boom. It is a great solution for businesses who want to save costs while ensuring the quality of service. One of the key issues that make cloud computing successful is the load balancing technique used in the load balancer to minimize time costs and optimize costs economically. This paper proposes an algorithm to enhance the processing time of tasks so that it can help improve the load balancing capacity on cloud computing. This algorithm, named as Improved Throttled Algorithm (ITA), is an improvement of Throttled Algorithm. The paper uses the Cloud Analyst tool to simulate. The selected algorithms are used to compare: Equally Load, Round Robin, Throttled and TMA. The simulation results show that the proposed algorithm ITA has improved the processing time of tasks, time spent processing requests and reduced the cost of Datacenters compared to the selected popular algorithms as above. The improvement of ITA is because of selecting virtual machines in an index table that is available but in order of priority. It helps response times and processing times remain stable, limits the idling resources, and cloud costs are minimized compared to selected algorithms.
International Journal of Engineering Research and DevelopmentIJERD Editor
Electrical, Electronics and Computer Engineering,
Information Engineering and Technology,
Mechanical, Industrial and Manufacturing Engineering,
Automation and Mechatronics Engineering,
Material and Chemical Engineering,
Civil and Architecture Engineering,
Biotechnology and Bio Engineering,
Environmental Engineering,
Petroleum and Mining Engineering,
Marine and Agriculture engineering,
Aerospace Engineering.
Recent many works have concentrated on
dynamically turning on/off some base stations (BSs) in order to
improve energy efficiency in radio access networks (RANs). In
this survey, we broaden the research over BS switching
operations, which should competition up with traffic load
variations. The proposed method formulate the traffic variations
as a Markov decision process which should differ from dynamic
traffic loads which are still quite challenging to precisely forecast.
A reinforcement learning framework based BS switching
operation scheme was designed in order to minimize the energy
consumption of RANs. Furthermore a transfer actor-critic
algorithm (TACT) is used to speed up the ongoing learning
process, which utilizes the transferred learning expertise in
historical periods or neighboring regions. The proposed TACT
algorithm performs jumpstart and validates the feasibility of
significant energy efficiency increment.
Vehicle detection and tracking techniques a concise reviewsipij
Vehicle detection and tracking applications play an important role for civilian and military applications
such as in highway traffic surveillance control, management and urban traffic planning. Vehicle detection
process on road are used for vehicle tracking, counts, average speed of each individual vehicle, traffic
analysis and vehicle categorizing objectives and may be implemented under different environments
changes. In this review, we present a concise overview of image processing methods and analysis tools
which used in building these previous mentioned applications that involved developing traffic surveillance
systems. More precisely and in contrast with other reviews, we classified the processing methods under
three categories for more clarification to explain the traffic systems.
Fifth generation (5G) Vehicular Cloud Computing (VCC) systems use heterogeneous network access technologies to
fulfill the requirements of modern services. Multiple services with dierent Quality of Service (QoS) constraints could be available in each vehicle, while at the same time, user requirements and provider policies must be addressed. Therefore, the design of ecient Vertical Handover (VHO) management schemes for 5G-VCC infrastructures is needed. In this paper, a novel VHO management scheme for 5G-VCC systems is proposed. Whenever the user satisfaction grade becomes less than a predefined threshold, VHO is initiated and network selection is performed, considering the velocity of the vehicle, network characteristic criteria such as throughput, delay, jitter and packet loss, as well as provider policy criteria such as service reliability, security and price. The proposed scheme uses linguistic values for VHO criteria attributes represented by Interval Valued Pentagonal Fuzzy Numbers (IVPFNs) to express the information using membership intervals. The VHO scheme is applied to a 5G-VCC system which includes 3GPP Long Term Evolution (LTE) and IEEE 802.16 Worldwide Interoperability for Microwave Access (WiMAX) Macrocells and Femtocells, as well as IEEE 802.11p Wireless Access for Vehicular Environment (WAVE) Road Side Units (RSUs). Performance evaluation shows that the suggested method ensures the Always Best Connection (ABC) principle, while at the same time outperforms existing VHO management schemes.
A Vertical Handover Management Scheme for VANET Cloud Computing SystemsUniversity of Piraeus
Vehicular Cloud Computing (VCC) systems use heterogeneous network access technologies in order to fulfill the requirements of modern services. Therefore, the need for efficient Vertical Handover (VHO) management schemes must be addressed. In this paper a VHO management scheme for VCC systems is described. The proposed method takes into account the vehicles velocity as well as its current connection type and applies a two step VHO algorithm to reduce operations’ costs and optimize mobility management. Accordingly, as a first step a VHO initiation process evaluates the necessity to perform handover and subsequently a network selection process selects the appropriate network alternative considering both vehicular service requirements and operators’ policies. The proposed scheme is applied to a VCC system which includes Long Term Evolution (LTE) Macrocells and Femtocells as well as 802.11p Road Side Units (RSUs). Performance evaluation shows that the suggested algorithm ensures the Always Best Connection (ABC) principle, while at the same time outperforms existing VHO management schemes.
HANDOVER OPTIMIZATION BASED ON MEDIA INDEPENDENT HANDOVER IN NEW NETWORKS NGWN IJCNCJournal
One of the challenging issues in Next Generation Wireless Network (NGWN) is achieving seamless Vertical
Handover (VHO) while roaming between different technologies such as Wireless Fidelity (Wi- Fi),
Worldwide Interoperability for Microwave Access (WiMAX), Universal Mobile Telecommunications
System (UMTS) and Long Term Evolution (LTE). F or that the telecommunication operators will be
required to develop a strategy for interoperability of these different types of existing network to give the
best connection anywhere anytime for the Mobile Users (MUs).
To full these requirements we propose a new VHO approach that based on loose coupling internetworking
in conjunction with Mobile IPv4 ( MIPv4) under Media Independent Handover (MIH). Our objective is
develop a strategy for interoperability of different technologies and optimized the VHO decision. Our
proposed approach provides more exhaustive, high accurate and better performance compared with the
approaches proposed in the literature.
A Network Selection Scheme with Adaptive Criteria Weights for 5G Vehicular Sy...University of Piraeus
Fifth Generation Vehicular Cloud Computing (5G-VCC) systems use heterogeneous network access technologies to fulfill the requirements of modern vehicular services. Efficient network selection algorithms are required to satisfy the constraints of Driver Assistance (DA) services, Passengers Entertainment and Information (PEnI) services and Medical (MED) services that provided to vehicular users. The presence of MED services affects the importance of other services in situations where patients with immediate health status exist within the vehicle. This paper proposes a network selection scheme which considers the patient health status to adapt the importance of each service. The scheme consists of two Fuzzy Multi Attribute Decision Making (FMADM) algorithms: the Trapezoidal Fuzzy Adaptive Analytic Network Process (TF-AANP) to calculate the relative importance of each vehicular service and the selection criteria, as well as the Trapezoidal Fuzzy Topsis with Adaptive Criteria Weights (TFT-ACW) to accomplish the ranking of the candidate networks. Both algorithms use Interval-Valued Trapezoidal Fuzzy Numbers (IVTFN). Performance evaluation shows that the suggested method outperforms existing algorithms by satisfying the constraints of MED services when the patient health status becomes immediate.
Performance Analysis and Optimization of Next Generation Wireless NetworksUniversity of Piraeus
The Fifth Generation (5G) networks, including the 5G Vehicular Cloud Computing (5G-VCC) systems, have evolved rapidly offering multiple services to users. The operating principles of vehicular networks, Cloud Computing (CC), Fog Computing (FC), Mobile Edge Computing (MEC) and Software Defined Networks (SDN) are applied to 5G infrastructures. In a 5G-VCC system, the vehicles are equipped with On-Board Units (OBUs) which communicate with each other as well as with Road Side Units (RSUs). Each RSU interacts with a Cloud infrastructure which offers vehicular services with strict Quality of Service (QoS) requirements, including Driver Assistance (DA), Passengers Entertainment and Information (PEnI) and Medical (MED) services. Dense deployments of 5G access networks are also implemented, called Ultra Dense Networks (UDNs), aiming to support high data rates produced by an increased number of vehicular users. In this environment, heterogeneous technologies are used to transfer the network services to vehicles. Optimal manipulation of the communication resources is required, while at the same time vehicular users should always obtain connectivity to the most appropriate network access technology, in order the constraints of the vehicular services to be satisfied. In this thesis, existing schemes for resource allocation as well as for mobility management are studied, while novel solutions are proposed for each topic.
A Survey on Medium Access Control Schemes for 5G Vehicular Cloud Computing Sy...University of Piraeus
Fifth generation (5G) vehicular systems support multiple services with strict Quality of Service (QoS) constraints. To fulfill the increased communication needs, 5G Vehicular Cloud Computing (5G-VCC) architectures with dense deployments of the access network infrastructures have been proposed. In such systems, the network resources manipulation is a critical task that could be addressed by the Medium Access Control (MAC) layer. MAC schemes that have been proposed for vehicular networks, can be applied to 5G-VCC systems in order optimal manipulation of communication resources to be accomplished. This paper makes an overview of available MAC schemes, while a comprehensive discussion about their implementation in 5G-VCC systems is performed leading to useful conclusions.
Lately, the Wireless Sensors Networks (WSN) have moved to the concept of the hybrids networks in order to get universal platforms in various types of monitoring and information collecting applications. The work presented in this paper aims in designing a hybrid remote monitoring architecture, largely secured by a high availability and resilience WSN. The modeling approach intends to describe the main operation of polling and dispatching between the communications channels with the purpose of ensuring the information availability and reducing the resilience time. To achieve our goal, we have realized an experimental platform of measuring, processing and routing data through hybrid communications technologies. We have illustrated, via curves, the routing of the data measured by a WSN (ZigBee Technology) to a final user through several communication technologies (HTTPS, SMS, ...).
I AM 4 VHO: New Approach to improve Seamless Vertical Handover in Heterogeneo...IJCNCJournal
Two mechanisms have been proposed independently by IEEE and 3GPP; namely, Media Independent
Handover (MIH) and Access Network Discovery and Selection Function (ANDSF), respectively. These
mechanisms enable a seamless Vertical Handover (VHO) between the different types of technologies
(3GPP and non-3GPP), such as GSM (Global System for Mobile Communication), Wireless Fidelity (Wi-
Fi), Worldwide Interoperability for Microwave Access (WiMAX), Universal Mobile Telecommunications
System (UMTS) and Long Term Evolution (LTE). In this paper, we overview these mechanisms and show
their components, benefits and drawbacks. Then we present our Imperative Alternative MIH for Vertical
Handover (I AM 4 VHO) approach based on the approaches that have been studied in the literature with
better performance (packet loss and latency), less connection failure (probability of reject sessions), less
complexity and more exhaustive for enhancing VHO heterogeneous wireless networks environment
An Accurate Performance Analysis of Hybrid Efficient and Reliable MAC Protoco...IJECEIAES
Vehicular Ad Hoc Networks (VANETs) is a technology supporting two types of applications, safety and service applications with higher and lower priorities respectively. Thereby, Medium Access Control (MAC) protocol is designed to provide reliable and efficient data broadcasting based on prioritization. Different from the IEEE 1609.4 (legacy), HER-MAC protocol is a new multi-channel MAC proposed for VANETs, offering remarkable performance with regards to safety applications transmission. This paper focuses on the analysis of packet delivery ratio of the HER-MAC protocol under non-saturated conditions. 1-D and 2-D Markov chains have been developed for safety and non-safety applications respectively, to evaluate mathematically the performance of HER-MAC protocol. The presented work has taken into account the freezing of the backoff timer for both applications and the backoff stages along with short retry limit for non-safety applications in order to meet the IEEE 802.11p specifications. It highlights that taking these elements into consideration are important in modeling the system, to provide an accurate estimation of the channel access, and guarantees that no packet is served indefinitely. More precise results of the system packet delivery ratio have been yield. The probability of successful transmission and collisions were derived and used to compute the packet delivery ratio. The simulation results validate the analytical results of our models and indicate that the performance of our models outperformed the existing models in terms of the packet delivery ratio under different number of vehicles and contention window.
DYNAMIC CURATIVE MECHANISM FOR GEOGRAPHIC ROUTING IN WIRELESS MULTIMEDIA SENS...csandit
Maintaining network stability and extending network lifetime to cope with breaking links and topology changes remain nowadays a unsolved issues in Wireless Multimedia Sensor Networks (WMSNs), which aim to ensure flow delivery while guaranteeing QoS requirements, particularly, during data transmission phase. Therefore, in this paper, we jointly consider multipath transmission, load balancing and fault tolerance, to enhance the reliability of transmitted data. We propose a Dynamic Curative Mechanism for Geographic Routing in WMSNs. Theoricals results and those obtained from simulation study demonstrate the validity and efficiency of our proposed mechanism, and indicate that it is highly advised for multimedia transmission and network stability
A SURVEY ON CALL ADMISSION CONTROL SCHEMES IN LTEIJCSES Journal
The growing number of mobile users with diverse applications such as VoIP, video, internet surfing etc. has made LTE networks to adopt a CAC strategy in order to ensure the quality of service (QoS) requirements of these applications. Over the years, several CAC schemes have been proposed to either accept or reject service requests. This paper presents a survey of these schemes under four different classes. The classes are: Bandwidth Reservation (BR), Bandwidth Degradation (BD), BR and BD and Non-BR and Non-BD (NBR-NBD). In each of the classification, the operation procedure, strengths and weaknesses of each scheme has been discussed. Furthermore, a comparative analysis of these schemes is also presented. The analysis provides insight into the challenges in the design of CAC by highlighting open research issues for future directions.
Quality of experience aware network selection model for service provisioning...IJECEIAES
Heterogeneous wireless networks (HWNs) are capable of integrating the different radio access technologies that make it possible to connect mobile users based on the performance parameters. Further quality of service (QoS) is one of the major topics for HWNs, moreover existing radio access technology (RAT) methodology are designed to provide network QoS criteria. However, limited work has been carried out for the RAT selection mechanism considering user QoS preference and existing models are developed based on the multi-mode terminal under a given minimal density network. For overcoming research issues this paper present quality of experience (QoE) RAT (QOE-RAT) selection methodology, incorporating both network performance criteria and user preference considering multiple call and multi-mode HWNs environment. First, this paper presents fuzzy preference aware weight (FPAW) and multi-mode terminal preference aware TOPSIS (MMTPA-TOPSIS) for choosing the best RAT for gaining multiservices. Experiment outcomes show the QOE-RAT selection method achieves much superior packet transmission outcomes when compared with state-of-art Rat selection methodologies.
MULTI-CRITERIA HANDOVER DECISION FOR HETEROGENEOUS NETWORKS: CARRIER AGGREGAT...IJCNCJournal
Carrier aggregation and integration of heterogeneous networks allow the mobile user equipment to benefit from wider bandwidth and radio coverage of different access technologies. However, these technologies have increased handoff scenario probability through user equipment’s mobility, leading to high outage probability and low throughput. Handover is an important aspect of mobility management which allows users to migrate from one cell to another without losing connections. But no lone access technology meets the requirements of providing seamless communication without loss and delay. Therefore, high-quality service continuity and reliable user equipment access to network anywhere and at any time require the
design of an appropriate handover decision algorithm. In this paper, a multi-criteria based handover decision-making algorithm is proposed to evade loss of communication and provide better performance to the system. It adaptively makes handover decisions based on different decision criteria (load, availability of resources, and the handover scenario type) in addition to signal interference to noise ratio. The multicriteria handover decision making algorithm-based method chooses among the cells that satisfy the requirements for the handover. As compared to some existing handover decision algorithms, simulation result shows that this algorithm improves system performance in terms of handover failure by 93%, 72%,
and 58%; radio link failure reduction by 77%, 43%, and 22%; and handover ping–pong by 81%, 59%, and 36% over the conventional received signal strength, received wireless transmission line, and multiinfluence factor hand over decisions respectively.
MULTI-CRITERIA HANDOVER DECISION FOR HETEROGENEOUS NETWORKS: CARRIER AGGREGAT...IJCNCJournal
Carrier aggregation and integration of heterogeneous networks allow the mobile user equipment to benefit from wider bandwidth and radio coverage of different access technologies. However, these technologies have increased handoff scenario probability through user equipment’s mobility, leading to high outage probability and low throughput. Handover is an important aspect of mobility management which allows users to migrate from one cell to another without losing connections. But no lone access technology meets the requirements of providing seamless communication without loss and delay. Therefore, high-quality service continuity and reliable user equipment access to network anywhere and at any time require the
design of an appropriate handover decision algorithm. In this paper, a multi-criteria based handover decision-making algorithm is proposed to evade loss of communication and provide better performance to the system. It adaptively makes handover decisions based on different decision criteria (load, availability of resources, and the handover scenario type) in addition to signal interference to noise ratio. The multicriteria handover decision making algorithm-based method chooses among the cells that satisfy the requirements for the handover. As compared to some existing handover decision algorithms, simulation result shows that this algorithm improves system performance in terms of handover failure by 93%, 72%,
and 58%; radio link failure reduction by 77%, 43%, and 22%; and handover ping–pong by 81%, 59%, and 36% over the conventional received signal strength, received wireless transmission line, and multiinfluence factor hand over decisions respectively.
A novel k-means powered algorithm for an efficient clustering in vehicular ad...IJECEIAES
Considerable attention has recently been given to the routing issue in vehicular ad-hoc networks (VANET). Indeed, the repetitive communication failures and high velocity of vehicles reduce the efficacy of routing protocols in VANET. The clustering technique is considered an important solution to overcome these difficulties. In this paper, an efficient clustering approach using an adapted k-means algorithm for VANET has been introduced to enhance network stability in a highway environment. Our approach relies on a clustering scheme that accounts for the network characteristics and the number of connected vehicles. The simulation indicates that the proposed approach is more efficient than similar schemes. The results obtained appear an overall increase in constancy, proven by an increase in cluster head lifetime by 66%, and an improvement in robustness clear in the overall reduction of the end-to-end delay by 46% as well as an increase in throughput by 74%.
Similar to A VHO Scheme for supporting Healthcare Services in 5G Vehicular Cloud Computing Systems (20)
A Route Selection Scheme for supporting Virtual Tours in Sites with Cultural ...University of Piraeus
Virtual tourism is a novel trend that enhances the experience the users perceive from touristic places, such as archaeological sites. Drones are equipped with 360o video cameras and used for video capturing of the heritage sites. The video material is streamed to the users in real time, enriched with additional 3D, Augmented Reality (AR) or Mixed Reality (MR) material. Furthermore, the selection of the appropriate flying route for each drone should be performed, in order to provide a satisfactory tour experience to the user, considering his preferences about specific monuments. To address this issue, this paper describes a heritage route selection scheme for supporting real-time virtual tours in sites with cultural interest using drones. The proposed scheme applies a Fuzzy Multiple Attribute Decision Making (FMADM) algorithm, the Trapezoidal Fuzzy Topsis for Heritage Route Selection (TFT-HRS), to accomplish the ranking of the candidate heritage routes. The algorithm uses Interval-Valued Trapezoidal Fuzzy Numbers (IVTFN) for the representation of heritage routes evaluation values. Performance evaluation shows that the suggested method produces better results compared to the Fuzzy Topsis (FTOPSIS) by selecting the most appropriate flying route for the drone.
A Route Selection Scheme for supporting Virtual Tours in Sites with Cultural ...University of Piraeus
Virtual tourism is a novel trend that enhances the experience the users perceive from touristic places, such as archaeological sites. Drones are equipped with 360o video cameras and used for video capturing of the heritage sites. The video material is streamed to the users in real time, enriched with additional 3D, Augmented Reality (AR) or Mixed Reality (MR) material. Furthermore, the selection of the appropriate flying route for each drone should be performed, in order to provide a satisfactory tour experience to the user, considering his preferences about specific monuments. To address this issue, this paper describes a heritage route selection scheme for supporting real-time virtual tours in sites with cultural interest using drones. The proposed scheme applies a Fuzzy Multiple Attribute Decision Making (FMADM) algorithm, the Trapezoidal Fuzzy Topsis for Heritage Route Selection (TFT-HRS), to accomplish the ranking of the candidate heritage routes. The algorithm uses Interval-Valued Trapezoidal Fuzzy Numbers (IVTFN) for the representation of heritage routes evaluation values. Performance evaluation shows that the suggested method produces better results compared to the Fuzzy Topsis (FTOPSIS) by selecting the most appropriate flying route for the drone.
A Network Selection Algorithm for supporting Drone Services in 5G Network Arc...University of Piraeus
Flying Ad-hoc Networks (FANETs) use 5G network access technologies to fulfill the requirements of their services. In this environment, Drone to Infrastructure (D2I) communication is supported, while each drone could use both Disaster Management (DM) and non-Disaster Management (nDM) services. Efficient network selection algorithms are required to satisfy the constraints of the used services, since the presence of DM services affects the importance of nDM services in situations where a natural disaster occurs. This paper proposes a network selection algorithm which is called Dynamic Trapezoidal Fuzzy Topsis with Adaptive Criteria Weights (DTFT-ACW). DTFT-ACW accomplishes the ranking of the candidate networks considering the importance of each service, as well as the weights of the corresponding selection criteria, as they are obtained with respect to the severity level of a natural disaster occurred. Interval-Valued Trapezoidal Fuzzy Numbers (IVTFN) are used for the criteria evaluation. Experimental results show that the suggested method outperforms existing algorithms by satisfying the constraints of DM services when a disaster becomes severe. Furthermore, DTFT-ACW eliminates the computational complexity of the network selection by considering past decisions.
A Network Selection Algorithm for supporting Drone Services in 5G Network Arc...University of Piraeus
Flying Ad-hoc Networks (FANETs) use 5G network access technologies to fulfill the requirements of their services. In this environment, Drone to Infrastructure (D2I) communication is supported, while each drone could use both Disaster Management (DM) and non-Disaster Management (nDM) services. Efficient network selection algorithms are required to satisfy the constraints of the used services, since the presence of DM services affects the importance of nDM services in situations where a natural disaster occurs. This paper proposes a network selection algorithm which is called Dynamic Trapezoidal Fuzzy Topsis with Adaptive Criteria Weights (DTFT-ACW). DTFT-ACW accomplishes the ranking of the candidate networks considering the importance of each service, as well as the weights of the corresponding selection criteria, as they are obtained with respect to the severity level of a natural disaster occurred. Interval-Valued Trapezoidal Fuzzy Numbers (IVTFN) are used for the criteria evaluation. Experimental results show that the suggested method outperforms existing algorithms by satisfying the constraints of DM services when a disaster becomes severe. Furthermore, DTFT-ACW eliminates the computational complexity of the network selection by considering past decisions.
A Survey on Medium Access Control Schemes for 5G Vehicular Cloud Computing Sy...University of Piraeus
Fifth generation (5G) vehicular systems support multiple services with strict Quality of Service (QoS) constraints. To fulfill the increased communication needs, 5G Vehicular Cloud Computing (5G-VCC) architectures with dense deployments of the access network infrastructures have been proposed. In such systems, the network resources manipulation is a critical task that could be addressed by the Medium Access Control (MAC) layer. MAC schemes that have been proposed for vehicular networks, can be applied to 5G-VCC systems in order optimal manipulation of communication resources to be accomplished. This paper makes an overview of available MAC schemes, while a comprehensive discussion about their implementation in 5G-VCC systems is performed leading to useful conclusions.
The enhancement of Underwater Cultural Heritage Assets using Augmented Realit...University of Piraeus
Τhe development in the fields of Underwater Cultural Heritage (UCH) management and Maritime Archaeology, yields an interdisciplinary and creative academic framework, such as the Information and Communication Technologies (ICT) sector that has been proved to build intelligent systems and applications. However, the ways to fully make use of these technologies are still being explored, as their potential have not been exploited yet. Underwater archaeological sites, semi (/or fully) submerged settlements, ancient ports and shipwrecks, unlike land sites, are not accessible to public due to their special (sub) marine environment and depth. In this paper, an innovative research idea of using Augmented Reality (AR) for maintaining the memory and the information of underwater archaeological sites, is presented. Although the “artificial” visual documentation cannot replace the authentic values of the underwater tangible heritage, the AR technology can contribute to the protection of the intangible properties and the conquered knowledge of the past of a place. This research work will focus, among other case studies, on the (semi) submerged fortifications and their contiguous contents of the acropolis of Halai in east Lokris, Greece. Hence, along with the climate change that may lead more antiquities covered by water during the following years, the advances in the communication field and the up-coming 5G and cloud technologies will make the idea fully applicable, contributing to the enhancement of the coastal and the underwater archaeological remains.
Performance Analysis and Optimization of Next Generation Wireless Networks (P...University of Piraeus
The Fifth Generation (5G) networks, including the 5G Vehicular Cloud Computing (5G-VCC) systems, have evolved rapidly offering multiple services to users. The operating principles of vehicular networks, Cloud Computing (CC), Fog Computing (FC), Mobile Edge Computing (MEC) and Software Defined Networks (SDN) are applied to 5G infrastructures. In a 5G-VCC system, the vehicles are equipped with On-Board Units (OBUs) which communicate with each other as well as with Road Side Units (RSUs). Each RSU interacts with a Cloud infrastructure which offers vehicular services with strict Quality of Service (QoS) requirements, including Driver Assistance (DA), Passengers Entertainment and Information (PEnI) and Medical (MED) services. Dense deployments of 5G access networks are also implemented, called Ultra Dense Networks (UDNs), aiming to support high data rates produced by an increased number of vehicular users. In this environment, heterogeneous technologies are used to transfer the network services to vehicles. Optimal manipulation of the communication resources is required, while at the same time vehicular users should always obtain connectivity to the most appropriate network access technology, in order the constraints of the vehicular services to be satisfied. In this thesis, existing schemes for resource allocation as well as for mobility management are studied, while novel solutions are proposed for each topic.
Personalized Real-Time Virtual Tours in Places with Cultural InterestUniversity of Piraeus
Virtual tours using drones enhance the experience the users perceive from a place with cultural interest. Drones equipped with 360o cameras perform real-time video streaming of the cultural sites. The user preferences about each monument type should be considered in order the appropriate flying route for the drone to be selected. This paper describes a scheme for supporting personalized real-time virtual tours in sites with cultural interest using drones. The user preferences are modeled using the MPEG-21 and the MPEG-7 standards, while Web Ontology Language (OWL) ontologies are used for the description of the metadata structure and semantics. The Metadata-aware Analytic Network Process (MANP) algorithm is proposed in order the weights about the user preferences for each monument type to be estimated. Subsequently, the Trapezoidal Fuzzy Topsis for Heritage Route Selection (TFT-HRS) algorithm accomplishes ranks the candidate heritage routes. Finally, after each virtual tour, the user preferences metadata are updated in order the scheme to continuously learn about the user preferences.
The Convergence of Blockchain, Internet of Things (IoT) and Building Informat...University of Piraeus
The Architecture, Engineering and Construction (AEC) industry has not embraced digital transformation with the same enthusiasm as other industries (e.g. such as manufacture industry). Building Information Modeling (BIM) is a revolutionary technology that is characterized as the opportunity of the AEC industry to move to the digital era and improve the collaboration amongst the partners of this industry by exploiting Information and Communications Technologies (ICT). BIM provides all the necessary tools and automations to achieve end-to-end communication, data exchange and information sharing between project actors. Thus, the virtual 3D models generated in the context of engaging in the BIM process and as-delivered physical assets through Building Management Systems (BMS) could adopt Internet of Things (IoT) architectures and services. However, the orchestration of IoT in a highly modular environment with many moving parts and inter-dependencies between the stakeholders of this environment, lead to many security issues. Therefore, this paper proposes a system architecture that employs the Blockchain technology as a measure to secure and control the BIM technology coupled with IoT. The system architecture under scrutiny is considering the case of a museum building, where efficient security, management and monitoring are of great importance.
The convergence of blockchain, internet of things (io t) and building informa...University of Piraeus
The Architecture, Engineering and Construction (AEC) industry has not embraced digital transformation with the same enthusiasm as other industries (e.g. such as manufacture industry). Building Information Modeling (BIM) is a revolutionary technology that is characterized as the opportunity of the AEC industry to move to the digital era and improve the collaboration amongst the partners of this industry by exploiting Information and Communications Technologies (ICT). BIM provides all the necessary tools and automations to achieve end-to-end communication, data exchange and information sharing between project actors. Thus, the virtual 3D models generated in the context of engaging in the BIM process and as-delivered physical assets through Building Management Systems (BMS) could adopt Internet of Things (IoT) architectures and services. However, the orchestration of IoT in a highly modular environment with many moving parts and inter-dependencies between the stakeholders of this environment, lead to many security issues. Therefore, this paper proposes a system architecture that employs the Blockchain technology as a measure to secure and control the BIM technology coupled with IoT. The system architecture under scrutiny is considering the case of a museum building, where efficient security, management and monitoring are of great importance.
The revival of back-filled monuments through Augmented Reality (AR) (presenta...University of Piraeus
The development of three-dimensional (3D) models and the use of Augmented Reality (AR) in the field of cultural heritage consists an innovative process the recent years that provides the visitors of archaeological sites with additional information. This has been made possible due to achievements in digital technologies, communications, devices and developments in software engineering. Nevertheless, the research to fully make use of these new methods continues, as the potentials of new technologies have not been exploited. In archaeological sites, the production of 3D models for AR is focused on the virtual reconstruction of ruined monuments at their original form, aiming to give visitors the third dimension (height, volume etc.), especially to those who do not have special knowledge of archaeology. This paper describes an innovative approach of using AR for maintaining the memory and the information of monuments, as they have been originally excavated, but that are going to be back -filled due to the particularity of their material or their location. Also, the system architecture of the proposed scheme is described considering two study cases, a Neolithic settlement in the archaeological site of Halai, Lokris and the remains of a Classical Temple on open field of a hill in Thebes, Boeotia. Both mentioned monuments are under the direction of the American School of Classical Studies in Athens (ASCSA).
An analytic network process and trapezoidal interval-valued fuzzy technique f...University of Piraeus
Next generation wireless networks consist of many heterogeneous access technologies that should support various service types with different quality of service (QoS) constraints, as well as user, requirements and provider policies. Therefore, the need for network selection mechanisms that consider multiple factors must be addressed. In this paper, a network selection method is proposed by applying the analytic network process to estimate the weights of the selection criteria, as well as a fuzzy version of technique for order preference by similarity to ideal solution to perform the ranking of network alternatives. The method is applied to a heterogeneous network environment providing different QoS classes and policy characteristics. Each user applies the method to select the most appropriate network, which satisfies his or her requirements in respect of his or her service-level agreement (SLA). Performance evaluation shows that when the user requests only one service, the proposed method performs better compared to the original technique for order preference by similarity to ideal solution, as well as the Fuzzy AHP-ELECTRE method. Moreover, the proposed method can be applied in cases where a user requires multiple services simultaneously on a device. The sensitivity analysis of the proposed method shows that it can be properly adjusted to conform to network environment changes.
A Personalized Audio Web Service using MPEG-7 and MPEG-21 standards (presenta...University of Piraeus
This paper presents a web service which delivers personalized audio information. The personalization process is automated and decentralized. The metadata which support personalization are separated in two categories: the metadata describing user preferences stored at each user and the resource adaptation metadata stored at the web service host. The multimedia models MPEG-21 and MPEG-7 are used to describe metadata information and the Web Ontology Language (OWL) to produce and manipulate ontological descriptions. SPARQL is used for querying the OWL ontologies. The MPEG Query Format (MPQF) is also used, providing a wellknown framework for applying queries to the metadata and to the ontologies.
A Personalized Audio Server using MPEG-7 and MPEG-21 standards (presentation)University of Piraeus
This paper presents a semantic model which delivers personalized audio information. The personalization process is automated and decentralized. The metadata which support personalization are separated in two categories: the metadata describing user preferences stored at each user and the resource adaptation metadata stored at the server. The multimedia models MPEG-21 and MPEG-7 are used to describe metadata information. The Web Ontology Language (OWL) language is used to produce and manipulate the relative ontological descriptions.
A downlink scheduler supporting real time services in LTE cellular networks (...University of Piraeus
The wide spread of real-time services in wireless networks demands scheduling mechanisms supporting strict Quality of Service (QoS) requirements. Nevertheless, the specifications of the LTE standard for mobile connectivity defined by the 3rd Generation Partnership Project (3GPP) does not impose any specific scheduler for the proper allocation of resources to services. Therefore, several LTE schedulers have been proposed in the literature meeting the QoS requirements of modern services. In this paper a QoS aware scheduler for the LTE downlink is proposed namely the FLS-Advanced (FLSA) aiming at prioritizing real-time traffic. The proposed scheduler has been built on three distinct levels assigning the available radio resources to services according to their requirements. Based on simulation results, the FLSA outperforms in terms of packet loss ratio, attainable throughput and fairness the performance of existing schedulers including PF, MLWDF, EXP/PF, FLS, EXP RULE and LOG RULE.
QoS-aware scheduling in LTE-A networks with SDN control (presentation)University of Piraeus
The 3GPP Long Term Evolution Advanced (LTE-A) standard specifies a set of pioneer features such as relay nodes and carrier aggregation. At the same time, the Software Defined Networks (SDN) have become an emerging technology which provides centralized control and programmability to modern networks. In the current communication environment, cloud computing could combine the advantages of both technologies in order to create a novel cloud assisted Software Defined LTEA architecture with relay nodes. Moreover, due to the increased requirements of modern services, the optimal resource allocation is a necessity. In such a context, this paper describes a QoS aware cross carrier scheduler for downlink flows, aiming at the optimization of system resources allocation. The proposed scheduler is evaluated against the PF, MLWDF, EXP/PF, EXP RULE, LOG RULE, FLS and FLSA schedulers in a cloud assisted Software Defined LTE-A topology with relay nodes. Simulation results show that the proposed scheduler improves the real time services performance while at the same time maintains an acceptable performance for best effort flows.
The 3GPP Long Term Evolution Advanced (LTE-A) standard specifies a set of pioneer features such as relay nodes and carrier aggregation. At the same time, the Software Defined Networks (SDN) have become an emerging technology which provides centralized control and programmability to modern networks. In the current communication environment, cloud computing could combine the advantages of both technologies in order to create a novel cloud assisted Software Defined LTEA architecture with relay nodes. Moreover, due to the increased requirements of modern services, the optimal resource allocation is a necessity. In such a context, this paper describes a QoS aware cross carrier scheduler for downlink flows, aiming at the optimization of system resources allocation. The proposed scheduler is evaluated against the PF, MLWDF, EXP/PF, EXP RULE, LOG RULE, FLS and FLSA schedulers in a cloud assisted Software Defined LTE-A topology with relay nodes. Simulation results show that the proposed scheduler improves the real time services performance while at the same time maintains an acceptable performance for best effort flows.
A downlink scheduler supporting real time services in LTE cellular networksUniversity of Piraeus
The wide spread of real-time services in wireless networks demands scheduling mechanisms supporting strict Quality of Service (QoS) requirements. Nevertheless, the specifications of the LTE standard for mobile connectivity defined by the 3rd Generation Partnership Project (3GPP) does not impose any specific scheduler for the proper allocation of resources to services. Therefore, several LTE schedulers have been proposed in the literature meeting the QoS requirements of modern services. In this paper a QoS aware scheduler for the LTE downlink is proposed namely the FLS-Advanced (FLSA) aiming at prioritizing real-time traffic. The proposed scheduler has been built on three distinct levels assigning the available radio resources to services according to their requirements. Based on simulation results, the FLSA outperforms in terms of packet loss ratio, attainable throughput and fairness the performance of existing schedulers including PF, MLWDF, EXP/PF, FLS, EXP RULE and LOG RULE.
A QoS aware scheduler, the FLS-Advanced (FLSA), a modified version of FLS, for the LTE downlink transmission is proposed.
The main idea is to prioritize the real-time type traffic against the other types.
FLSA has been built on three distinct levels which cooperate each other to allocate the network resources to users.
A Network and Position Proposal Scheme using a Link-16 based C3I SystemUniversity of Piraeus
The smart usage of hi-end military technological solutions in daily activities makes people life better. This paper describes a network and position proposal scheme in respect of technical networking and positioning information. A Link-16 based Command, Control, Communication and Intelligence (C3I) system is established among the mobile devices. Each device knows its geographical position using its GPS. A network along with a possible good position for user’s service is proposed, fulfilling his/her requirements for comfortable work.
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
Guy Korland, CEO and Co-founder of FalkorDB, will review two articles on the integration of language models with knowledge graphs.
1. Unifying Large Language Models and Knowledge Graphs: A Roadmap.
https://arxiv.org/abs/2306.08302
2. Microsoft Research's GraphRAG paper and a review paper on various uses of knowledge graphs:
https://www.microsoft.com/en-us/research/blog/graphrag-unlocking-llm-discovery-on-narrative-private-data/
Accelerate your Kubernetes clusters with Varnish CachingThijs Feryn
A presentation about the usage and availability of Varnish on Kubernetes. This talk explores the capabilities of Varnish caching and shows how to use the Varnish Helm chart to deploy it to Kubernetes.
This presentation was delivered at K8SUG Singapore. See https://feryn.eu/presentations/accelerate-your-kubernetes-clusters-with-varnish-caching-k8sug-singapore-28-2024 for more details.
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Ramesh Iyer
In today's fast-changing business world, Companies that adapt and embrace new ideas often need help to keep up with the competition. However, fostering a culture of innovation takes much work. It takes vision, leadership and willingness to take risks in the right proportion. Sachin Dev Duggal, co-founder of Builder.ai, has perfected the art of this balance, creating a company culture where creativity and growth are nurtured at each stage.
Key Trends Shaping the Future of Infrastructure.pdfCheryl Hung
Keynote at DIGIT West Expo, Glasgow on 29 May 2024.
Cheryl Hung, ochery.com
Sr Director, Infrastructure Ecosystem, Arm.
The key trends across hardware, cloud and open-source; exploring how these areas are likely to mature and develop over the short and long-term, and then considering how organisations can position themselves to adapt and thrive.
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualityInflectra
In this insightful webinar, Inflectra explores how artificial intelligence (AI) is transforming software development and testing. Discover how AI-powered tools are revolutionizing every stage of the software development lifecycle (SDLC), from design and prototyping to testing, deployment, and monitoring.
Learn about:
• The Future of Testing: How AI is shifting testing towards verification, analysis, and higher-level skills, while reducing repetitive tasks.
• Test Automation: How AI-powered test case generation, optimization, and self-healing tests are making testing more efficient and effective.
• Visual Testing: Explore the emerging capabilities of AI in visual testing and how it's set to revolutionize UI verification.
• Inflectra's AI Solutions: See demonstrations of Inflectra's cutting-edge AI tools like the ChatGPT plugin and Azure Open AI platform, designed to streamline your testing process.
Whether you're a developer, tester, or QA professional, this webinar will give you valuable insights into how AI is shaping the future of software delivery.
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Tobias Schneck
As AI technology is pushing into IT I was wondering myself, as an “infrastructure container kubernetes guy”, how get this fancy AI technology get managed from an infrastructure operational view? Is it possible to apply our lovely cloud native principals as well? What benefit’s both technologies could bring to each other?
Let me take this questions and provide you a short journey through existing deployment models and use cases for AI software. On practical examples, we discuss what cloud/on-premise strategy we may need for applying it to our own infrastructure to get it to work from an enterprise perspective. I want to give an overview about infrastructure requirements and technologies, what could be beneficial or limiting your AI use cases in an enterprise environment. An interactive Demo will give you some insides, what approaches I got already working for real.
Securing your Kubernetes cluster_ a step-by-step guide to success !KatiaHIMEUR1
Today, after several years of existence, an extremely active community and an ultra-dynamic ecosystem, Kubernetes has established itself as the de facto standard in container orchestration. Thanks to a wide range of managed services, it has never been so easy to set up a ready-to-use Kubernetes cluster.
However, this ease of use means that the subject of security in Kubernetes is often left for later, or even neglected. This exposes companies to significant risks.
In this talk, I'll show you step-by-step how to secure your Kubernetes cluster for greater peace of mind and reliability.
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
A VHO Scheme for supporting Healthcare Services in 5G Vehicular Cloud Computing Systems
1. A VHO Scheme for supporting Healthcare Services
in 5G Vehicular Cloud Computing Systems
Emmanouil Skondras1, Angelos Michalas2, Nikolaos Tsolis1, Dimitrios D. Vergados1
1
Department of Informatics, University of Piraeus, Piraeus, Greece, Email: {skondras, tsolis, vergados}@unipi.gr
2
Department of Informatics Engineering, Technological Educational Institute of Western Macedonia,
Kastoria, Greece, Email: amichalas@kastoria.teiwm.gr
Abstract—Fifth Generation Vehicular Cloud Computing (5G-
VCC) systems use heterogeneous network access technologies in
order to fulfill the requirements of modern services, including
medical services with strict constraints. Therefore, the need for
efficient Vertical Handover (VHO) management schemes must
be addressed. In this paper, a VHO management scheme for
supporting medical services in 5G-VCC systems, is described.
It consists of the VHO initiation and the network selection
processes, while at the same time, the vehicle’s velocity, its
current connection type, as well as the status of the onboard
patient’s health, are considered. Specifically, during the VHO
initiation process the necessity to perform handover is eval-
uated. Subsequently, the network selection process selects the
appropriate network alternative considering both medical service
requirements and patients’ health status. The proposed scheme
is applied to a 5G-VCC system which includes Long Term
Evolution (LTE) and Worldwide Interoperability Microwave
Access (WiMAX) Macrocells and Femtocells, as well as Wireless
Access for Vehicular Environment Road Side Units (WAVE
RSUs). Performance evaluation shows that the proposed algo-
rithm outperforms existing VHO management schemes.
I. INTRODUCTION
Cloud Computing (CC) [1] and Software Defined Network-
ing (SDN) [2] are considered as the key enabling technologies
for the fifth generation (5G) networks. In addition, Vehicu-
lar Cloud Computing (VCC), which combines the operating
principles of both Vehicular Networks and Cloud computing,
has emerged widely, occurring in the further development
of the 5G approach. In a typical VCC system, vehicles are
equipped with On-Board Units (OBUs) with computational,
storage and communication resources. Vehicles communicate
with each other, as well as with a Cloud infrastructure through
the available Access Networks. The Cloud infrastructure of-
fers vehicular services, including medical services with strict
Quality of Service (QoS) requirements. Indicatively, vehicles
serve patients with different medical services, including Live
Healthcare Video (LVideo) [3], Medical Images (MedImgs)
[4], Health Monitoring (HMonitoring) [5] and Clinical Data
Transmission (CData) [6] services.
Heterogeneous network access technologies, such as the
3GPP Long Term Evolution (LTE) [7], the Worldwide Inter-
operability Microwave Access (WiMAX) [8] and the Wireless
Access for Vehicular Environment (WAVE) [9], are used
for the interconnection between the vehicles and the Cloud
infrastructure. Furthermore, the durability and the response
latency of the 5G architecture could be improved by applying
the operating principles of the Mobile Edge Computing (MEC)
[10], resulting to the creation of a Fog infrastructure at the
edge of the network. In particular, LTE and WiMAX Base
Stations (BSs), as well as WAVE Road Side Units (RSUs) are
equipped with additional computational and storage resources
and thus they are referred as micro-datacenter BSs (md-BSs)
and micro-datacenter RSUs (md-RSUs), respectively.
The vehicles should always obtain connectivity to the best
network, in order the requirements of their services to be
fulfilled. Therefore, the design of efficient Vertical Handover
(VHO) management schemes is required. In general, Multi
Attribute Decision Making (MADM) methods are used to
select the best alternative among candidate networks given
a set of criteria with different importance weights. Widely
used methods include the Analytic Hierarchy Process (AHP)
[11], the Simple Additive Weighting (SAW) [11] [12], the
Fuzzy AHP - SAW (FAS) [13], the Technique for Order
Preference by Similarity to Ideal Solution (TOPSIS) [14] and
the Analytic network process (ANP) [15]. Furthermore, in [16]
an algorithm called User Centric Context Aware (UCCA) is
proposed. It considers the estimated time that a vehicle will
remain connected to its current network, in order to decide
whether a VHO must be performed. Accordingly, in [17] a
two-step VHO algorithm is proposed. During the first step,
the user’s current network is evaluated to verify whether it
satisfies the minimum requirements of user services. In case
the performance of the user’s network lies above a predefined
threshold, the algorithm progresses to the second step, where
network selection is performed using a MADM method. Also,
several research studies evaluate network access technologies
supporting medical services. Indicatively, in [18] the Adaptive
Network Selection for Telecardiology (ANST) method is pro-
posed, which considers the throughput of each candidate net-
work to select the best alternative for supporting telecardiology
services. Furthermore, in [19] a network selection algorithm
for supporting telecardiology services, is proposed, while in
[20] a fuzzy based network selection scheme for supporting
healthcare services is described.
This paper describes a VHO management scheme for sup-
porting medical services in 5G-VCC systems, which considers
978-1-5386-3395-3/18/$31.00 c 2018 IEEE
2. the vehicle’s velocity, its current connection type, as well as
the health status of onboard patients. Initially, the fact that
a vehicle with high velocity will remain for a limited time
inside the communication range of a femtocell, is considered.
Furthermore, the health status of each patient is evaluated
using the Manchester Triage System (MTS) [21] classification
system, while at the same time network evaluation criteria such
as throughput, delay, jitter, packet loss ratio, service reliability,
security and price, are considered. Accordingly, the network
evaluation criteria are mapped to patient’s health status in a
way similar to [20]. Thus, the importance of each criterion is
adjusted with respect to the criticality of the medical status
of each vehicular user. Following, the VHO initiation and
the network selection processes are applied. During the VHO
initiation process the vehicle’s necessity to perform handover
is evaluated, while during the network selection process the
appropriate network alternative is selected, considering both
medical service requirements and patient’s health status.
The remainder of the paper is as follows: Section II de-
scribes the proposed scheme, while Section III presents the
simulation setup and the evaluation results. Finally, section
IV concludes the discussed work.
II. THE PROPOSED VHO MANAGEMENT SCHEME
During the entire vehicle movement, its velocity, as well
as its current connection type (ctype), are monitored. More
specifically, in a way similar to [22], the following states are
defined (Figure 1):
• If velocity > 30kmh and ctype = femtocell: Since the
vehicle will remain for a limited time inside the femtocell
coverage, the VHO initiation process is bypassed and
network selection is executed, while no femtocells are
considered as alternatives.
• If velocity > 30kmh and ctype = femtocelll: The
VHO initiation will be executed, while no femtocells are
considered as alternatives.
• If velocity ≤ 30kmh: The VHO initiation will be exe-
cuted, while all the available networks will be considered
as alternatives.
Interval Valued Trapezoidal Fuzzy Numbers (IVTFN) [23]
are used in both VHO initiation and network selection
processes. In particular, an IVTFN can be represented as:
˜a = [˜aL
, ˜aU
] = [(aL
1 , aL
2 , aL
3 , aL
4 , vL
), (aU
1 , aU
2 , aU
3 , aU
4 , vU
))]
where: 0 ≤ aL
1 ≤ aL
2 ≤ aL
3 ≤ aL
4 ≤ 1, 0 ≤ aU
1 ≤
aU
2 ≤ aU
3 ≤ aU
4 ≤ 1, 0 ≤ vL
≤ vU
≤ 1 and ˜aL
⊂ ˜aU
.
Furthermore, the corresponding Membership Functions (MFs)
are created using the Equalized Universe Method (EUM) [24]
[25]. Specifically, the EUM method creates MFs in such a way
that their centroids to be equally spaced along a predefined
domain of values. The values of each ith
MF are calculated
using formula 1, where Umin and Umax are the minimum and
Result=Handover_not_required
Vehicle uVehicle u
Cloud
SDN Controller
Cloud
SDN Controller
Result
Execute TFT for
Available_Networks_except_Femtocellsu
Obtain offered characteristics of
Available_Networks_except_Femtocellsu
(Patient_Health_Status)
If Su,i < Sth:
Else:
Result=Selected_Network
Fog
Current
Network i
Fog
Current
Network i
If velocity > 30 kmh
and ctype = femtocell:
If velocity > 30 kmh
and ctype femtocell:
If velocity kmh:
Status_Information
(Velocityu,
Available_Networks_except_Femtocellsu,
Patient_Health_Status)
Obtain Su,i (Qu,i, RSSu,I)
Obtain Su,i (Qu,i, RSSu,I)
If Su,i < Sth:
Execute TFT for
Available_Networks_except_Femtocellsu
Obtain offered characteristics of
Available_Networks_except_Femtocellsu
(Patient_Health_Status)
Execute TFT for Available_Networksu
Obtain offered characteristics of
Available_Networksu
(Patient_Health_Status)
Result=Selected_Network
Result=Selected_Network
Result=Handover_not_required
Else:
Result
Result
VHO initiation
Network selection
VHO initiation
Network selection
Network selection
Fig. 1. The proposed methodology.
maximum value of the domain and c is the count of the MFs.
MFi =
aU
i,1 = aU
i,2 −
Umax−Umin
4·(c−1)
aL
i,1 = aU
i,1 · (uL/uU )
aU
i,2 = (Umin +
Umax−Umin
c−1
· (i − 1)) −
Umax−Umin
2·(c−1)
aL
i,2 = aU
i,2 · (uL/uU )
aU
i,3 = (Umin +
Umax−Umin
c−1
· (i − 1)) +
Umax−Umin
2·(c−1)
aL
i,4 = aU
i,3 · (uL/uU )
aU
i,4 = aU
i,3 +
Umax−Umin
4·(c−1)
aL
i,5 = aU
i,4 · (uL/uU )
(1)
A. VHO initiation
The satisfaction grade Su,i of vehicle u from its current
network i, is defined. Whenever the Su,i becomes less than a
predefined Sth threshold, the network selection is executed.
More specifically, the Su,i is estimated as a function of
the RSSu,i and Qu,i parameters, using the Mamdani Fuzzy
Inference System (FIS) described in [26]. RSSu,i represents
the Received Signal Strength (RSS) of vehicle u from its
current network i. Accordingly, Qu,i represents the quality
of vehicle’s u services, offered from its current network i.
Specifically, Qu,i is calculated using formula 2, where N
represents the number of the parameters considered and K the
number of the available services. Also, thu,i,k, du,i,k, ju,i,k
and plu,i,k represent the throughput, the delay, the jitter and the
packet loss ratio respectively, obtained by user u for the service
3. Fig. 2. The S values range as obtained using the FIS.
k. Furthermore, the wth,k, wd,k ,wj,k and wp,kl represent the
weights of the aforementioned parameters, estimated using the
Trapezoidal Fuzzy Analytic Network Process (TF-ANP) [27]
method. Table I presents the linguistic terms, which are created
using the EUM method and used for the TF-ANP pairwise
comparisons.
TABLE I
THE LINGUSTIC TERMS THAT USED FOR CRITERIA PAIRWISE
COMPARISONS.
Linguistic term Interval-valued trapezoidal fuzzy number
Equally Important (EI) [(0.0, 0.0, 0.2, 0.25, 0.8), (0.0, 0.02, 0.18, 0.22, 1.0)]
Moderately More Important (MMI) [(0.15, 0.2, 0.4, 0.45, 0.8), (0.18, 0.22, 0.38, 0.42, 1.0)]
Strongly More Important (SMI) [(0.35, 0.4, 0.6, 0.65, 0.8), (0.38, 0.42, 0.58, 0.62, 1.0)]
Very Strongly More Important (VSMI) [(0.55, 0.6, 0.8, 0.85, 0.8), (0.58, 0.62, 0.78, 0.82, 1.0)]
Extremely More Important (EMI) [(0.75, 0.8, 1.0, 1.0, 0.8), (0.78, 0.82, 0.98, 1.0, 1.0)]
Qu,i =
K
k=1
(wth,k · thu,i,k + wd,k ·
1
du,i,k
+
wj,k ·
1
ju,i,k
+ wpl,k ·
1
plu,i,k
)/N /K
(2)
Both RSSu,i and Qu,i are normalized in order to have values
within the range [0, 1].
Based on the Mamdani FIS, the MFRSS, MFQ, MFS
membership functions are defined, indicating the linguistic
terms and the corresponding IVTFNs for the fuzzy represen-
tation of the RSSu,i, Qu,i and Su,i respectively (Table II).
These membership functions are equally distributed inside the
domain [Umin, Umax] = [0, 1] according to the EUM method.
Subsequently, the satisfaction chart presented in figure 2 is
constructed using the Mamdani FIS [26]. The chart contains
the entire possible values of Su,i as a function of the entire
possible values of RSSu,i and Qu,i. Indicatively, when the
RSSu,i and Qu,i values are too low, the produced Su,i value
is too low as well. On the contrary, when the RSSu,i and
Qu,i values are close to 1, the produced Su,i value is also
high, indicating that the user is fully satisfied. Furthermore,
when only one of the RSSu,i or the Qu,i values is close to
0, the user satisfaction is in quite low levels.
TABLE II
LINGUISTIC TERMS AND THE CORRESPONDING INTERVAL-VALUED
TRAPEZOIDAL FUZZY NUMBERS USED FOR RSSu,i, Qu,i AND Su,i.
RSSu,i membership functions.
Linguistic term Interval-valued trapezoidal fuzzy number
Too Bad (TB) [(0.0, 0.0, 0.1, 0.15, 0.8), (0.0, 0.0, 0.12, 0.18, 1.0)]
Bad (B) [(0.1, 0.15, 0.35, 0.4, 0.8), (0.06, 0.12, 0.37, 0.43, 1.0)]
Enough (EN) [(0.35, 0.4, 0.6, 0.65, 0.8), (0.31, 0.37, 0.62, 0.68, 1.0)]
More than Enough (ME) [(0.6, 0.65, 0.85, 0.9, 0.8), (0.56, 0.62, 0.87, 0.93, 1.0)]
Excellent (EX) [(0.85, 0.9, 1.0, 1.0, 0.8), (0.81, 0.87, 1.0, 1.0, 1.0)]
Qu,i membership functions.
Linguistic term Interval-valued trapezoidal fuzzy number
Absolutely Poor (AP) [(0.0, 0.0, 0.05, 0.07, 0.8), (0.0, 0.0, 0.06, 0.09, 1.0)]
Very Poor (VP) [(0.05, 0.07, 0.17, 0.2, 0.8), (0.03, 0.06, 0.18, 0.21, 1.0)]
Poor (P) [(0.17, 0.2, 0.3, 0.32, 0.8), (0.15, 0.18, 0.31, 0.34, 1.0)]
Medium Poor (MP) [(0.3, 0.32, 0.42, 0.45, 0.8), (0.28, 0.31, 0.43, 0.46, 1.0)]
Medium (M) [(0.42, 0.45, 0.55, 0.57, 0.8), (0.4, 0.43, 0.56, 0.59, 1.0)]
Medium Good (MG) [(0.55, 0.57, 0.67, 0.7, 0.8), (0.53, 0.56, 0.68, 0.71, 1.0)]
Good (G) [(0.67, 0.7, 0.8, 0.82, 0.8), (0.65, 0.68, 0.81, 0.84, 1.0)]
Very Good (VG) [(0.8, 0.82, 0.92, 0.95, 0.8), (0.78, 0.81, 0.93, 0.96, 1.0)]
Absolutely Good (AG) [(0.92, 0.95, 1.0, 1.0, 0.8), (0.9, 0.93, 1.0, 1.0, 1.0)]
Su,i membership functions.
Linguistic term Interval-valued trapezoidal fuzzy number
Absolute Unsatisfactory (AU) [(0.0, 0.0, 0.03, 0.05, 0.8), (0.0, 0.0, 0.04, 0.06, 1.0)]
Very Unsatisfactory (VU) [(0.03, 0.05, 0.12, 0.14, 0.8), (0.02, 0.04, 0.13, 0.15, 1.0)]
Unsatisfactory (U) [(0.12, 0.14, 0.21, 0.23, 0.8), (0.11, 0.13, 0.22, 0.25, 1.0)]
Slightly Unsatisfactory (SU) [(0.21, 0.23, 0.3, 0.32, 0.8), (0.2, 0.22, 0.31, 0.34, 1.0)]
Less than Acceptable (LA) [(0.3, 0.32, 0.4, 0.41, 0.8), (0.29, 0.31, 0.4, 0.43, 1.0)]
Slightly Acceptable (SA) [(0.4, 0.41, 0.49, 0.5, 0.8), (0.38, 0.4, 0.5, 0.52, 1.0)]
Acceptable (A) [(0.49, 0.5, 0.58, 0.6, 0.8), (0.47, 0.5, 0.59, 0.61, 1.0)]
More than Acceptable (MA) [(0.58, 0.6, 0.67, 0.69, 0.8), (0.56, 0.59, 0.68, 0.7, 1.0)]
Slightly Satisfactory (SS) [(0.67, 0.69, 0.76, 0.78, 0.8), (0.65, 0.68, 0.77, 0.79, 1.0)]
Satisfactory (S) [(0.76, 0.78, 0.85, 0.87, 0.8), (0.75, 0.77, 0.86, 0.88, 1.0)]
Very Satisfactory (VS) [(0.85, 0.87, 0.94, 0.96, 0.8), (0.84, 0.86, 0.95, 0.97, 1.0)]
Absolute Satisfactory (AS) [(0.94, 0.96, 1.0, 1.0, 0.8), (0.93, 0.95, 1.0, 1.0, 1.0)]
B. Network selection
The network selection is performed using the Trapezoidal
Fuzzy Topsis (TFT) [28] algorithm, which accomplishes the
ranking of the candidate networks. IVTFNs [23] are used for
the representation of both criteria values and their importance
weights, while at the same time, the corresponding MFs,
created using the EUM method (Table II), are considered.
Additionally, the TF-ANP method is applied in order to
estimate the decision weights per service type and patient
health status, considering the ANP network model proposed in
[28]. The criteria used include throughput, delay, jitter, packet
loss, price, service reliability and security.
III. SIMULATION SETUP AND RESULTS
In our experiments, we consider a 5G-VCC system con-
sisting of a Fog and a Cloud infrastructure (figure 3), while
the Network Simulator 3 (NS3) simulator [29] is used for the
simulation setup. The Fog infrastructure includes a number
of LTE and WiMAX Macrocells and Femtocells, as well as
of WAVE RSUs, with additional computational and storage
resources (Table III). Additionally, the Cloud infrastructure
includes a set of Virtual Machines (VMs) providing medical
services such as LVideo, MedImgs, HMonitoring and CData.
Furthermore, a Software Defined Network (SDN) controller
provides centralized control of the entire system.
The case where 10 vehicles with patients are moving
inside the 5G-VCC environment is considered (Table IV).
Each vehicle needs to be connected to a network which
satisfies the requirements of its services and at the same time
comply with its patient health status. The health status of
each patient is evaluated using the Manchester Triage System
(MTS) [21] healthcare classification system, which defines 5
4. Cloud
SDN
controller
VM
Medical Services
VM
Medical Services
VM
Medical Services
VM
Medical Services
VM
Medical Services
VM
Medical Services
...
...
...
...
LTE Macro
WAVE1WAVE1 WAVE2WAVE2
WiMAX
Femto1
WiMAX
Femto1
WiMAX
Femto1
WiMAX
Femto2
WiMAX
Femto2
WiMAX
Femto2
LTE
Femto1
LTE
Femto1
LTE
Femto1
LTE
Femto2
LTE
Femto2
LTE
Femto2
WiMAX Macro
Fog
Fig. 3. The simulated topology.
0
0,1
0,2
0,3
0,4
0,5
0,6
Live Healthcare Video Medical Images Health Monitoring Clinical Data Transmission
Weight
VHO initiation weights
Throughput Delay Jitter Packet loss
Fig. 4. Criteria weights per service for the VHO initiation.
health statuses, called Non-Urgent, Standard, Urgent, Very-
Urgent and Immediate. The Non-Urgent status has the lower
risk about patient’s life, while the Immediate status has the
higher one. Table IV presents the services of each vehicle, as
well as the MTS classification of the corresponding patient.
A. VHO initiation
Figure 4 depicts the estimated VHO initiation weights for
each service, including Live Healthcare Video (LVideo), Med-
ical Images (MedImgs), Health Monitoring (HMonitoring) and
Clinical Data Transmission (CData), which are proportional to
the corresponding service constraints, obtained from the TF-
ANP method.
The minimum acceptable values for RSSMT S and QMT S
per MTS patient health status, as well as the evaluated
Sth,MT S thresholds, obtained from the Mamdani satisfaction
chart, are presented in tableV. Similarly, the RSSu,i and the
Qu,i are obtained and inserted as inputs to the Mamdani
satisfaction chart, in order the Su,i satisfaction grade of vehicle
u from its current network i to be estimated. Accordingly, table
VI presents the VHO initiation results based on each vehicle’s
velocity, connection type, as well as the respective estimated
Su,i and Sth,MT S values. As it can be observed, the VHO
initiation process is ignored for the vehicle 3, due to the fact
TABLE III
THE AVAILABLE NETWORKS.
Service Network Throughput Delay Jitter
Packet
Loss
Service
Reliability
Security Price
LiveHealthcareVideo
(LVideo)
LTE
Macro
AG
(9.5 Mbps)
AG
(45 ms)
AG
(25 ms)
VG
(10−4)
VG AG G
LTE
Femto 1
MP
(8 Mbps)
MG
(60 ms)
VG
(35 ms)
AG
(10−5)
AG VG AP
LTE
Femto 2
G
(9 Mbps)
VG
(50 ms)
AG
(25 ms)
AG
(10−5)
VG G MG
WiMAX
Macro
MP
(8 Mbps)
M
(65 ms)
MG
(45 ms)
G
(10−3)
G G MP
WiMAX
Femto 1
G
(9 Mbps)
G
(55 ms)
VG
(35 ms)
VG
(10−4)
G G M
WiMAX
Femto 2
MG
(8.5 Mbps)
MG
(60 ms)
AG
(30 ms)
VG
(10−4)
G MG AG
WAVE 1
MG
(8.5 Mbps)
MG
(60 ms)
G
(40 ms)
AG
(10−5)
MG VG MP
WAVE 2
MP
(8 Mbps)
MP
(70 ms)
MG
(45 ms)
AG
(10−5)
MG G P
MedicalImages
(MedImgs)
LTE
Macro
VG
(9 Mbps)
VG
(55 ms)
AG
(35 ms)
AG
(10−7)
VG AG AP
LTE
Femto 1
M
(8 Mbps)
G
(60 ms)
VG
(40 ms)
VG
(10−6)
AG VG G
LTE
Femto 2
G
(8.5 Mbps)
G
(60 ms)
VG
(40 ms)
AG
(10−7)
VG G MP
WiMAX
Macro
M
(8 Mbps)
G
(60 ms)
MG
(50 ms)
VG
(10−6)
G G M
WiMAX
Femto 1
M
(8 Mbps)
MG
(65 ms)
AG
(35 ms)
AG
(10−7)
G G VG
WiMAX
Femto 2
MG
(8.2 Mbps)
M
(70 ms)
VG
(40 ms)
AG
(10−7)
MG M M
WAVE 1
VG
(9 Mbps)
AG
(50 ms)
VG
(40 ms)
AG
(10−7)
MG VG G
WAVE 2
G
(8.7 Mbps)
VG
(55 ms)
G
(45 ms)
AG
(10−7)
MG G MP
HealthMonitoring
(HMonitoring)
LTE
Macro
G
(290 Kbps)
MG
(40 ms)
VG
(25 ms)
AG
(10−4)
VG AG VG
LTE
Femto 1
VG
(300 Kbps)
AG
(25 ms)
AG
(15 ms)
VG
(10−3)
AG VG P
LTE
Femto 2
AG
(305 Kbps)
AG
(25 ms)
VG
(22 ms)
VG
(10−3)
G G AG
WiMAX
Macro
G
(290 Kbps)
AG
(26 ms)
G
(30 ms)
VG
(10−3)
AG VG VP
WiMAX
Femto 1
VG
(300 Kbps)
MG
(40 ms)
VG
(23 ms)
AG
(10−4)
VG AG G
WiMAX
Femto 2
MG
(282 Kbps)
MG
(39 ms)
VG
(25 ms)
VG
(10−3)
G G AP
WAVE 1
MG
(280 Kbps)
MG
(40 ms)
G
(30 ms)
VG
(10−3)
MG MG M
WAVE 2
M
(270 Kbps)
M
(45 ms)
MG
(35 ms)
VG
(10−3)
MG MG MP
ClinicalDataTransmission
(CData)
LTE
Macro
MG
(2.5 Mbps)
M
(190ms)
G
(90 ms)
VG
(10−4)
VG AG MP
LTE
Femto 1
AG
(3.2 Mbps)
AG
(150ms)
AG
(80 ms)
AG
(10−5)
AG VG G
LTE
Femto 2
VG
(3 Mbps)
G
(170ms)
M
(100ms)
AG
(10−5)
VG G MG
WiMAX
Macro
G
(2.8 Mbps)
M
(190ms)
M
(100ms)
AG
(10−5)
MG M MP
WiMAX
Femto 1
M
(2.3 Mbps)
MP
(200ms)
MG
(95 ms)
VG
(10−4)
G G VG
WiMAX
Femto 2
MG
(2.5 Mbps)
M
(190ms)
M
(100ms)
AG
(10−5)
M M M
WAVE 1
AG
(3.2 Mbps)
G
(170ms)
G
(90 ms)
AG
(10−5)
MG MG P
WAVE 2
G
(2.8 Mbps)
M
(190ms)
AG
(80 ms)
AG
(10−5)
MG G G
that it moves with high velocity while at the same time it
is connected to a femtocell. Furthermore, vehicle 5 will not
handover to another network, while at the same time, the rest
of vehicles will proceed to the network selection.
B. Network selection
The decision weights per service and patient health status
are obtained from the TF-ANP method, as presented in figure
5. As illustrated the weights are proportional to the constraints
of each service as well as to the patient health status. In
particular, in Live Healthcare Video the weights for the delay
and jitter criteria are more important than throughput. On the
contrary, in the Clinical Data Transmission case the delay and
jitter criteria obtain low values. Furthermore, the price criterion
obtains high values for the Non-Urgent health status, while its
values are minimized in case of the Immediate health status.
Subsequently, the TFT algorithm selects the best network
5. TABLE IV
THE SIMULATED VEHICLES.
Vehicle Velocity
Medical
Services
Patient Health
Status
Current Network
(RSS)
Candidate
Networks
Next
process
1 20 kmh LVideo Urgent
WAVE 2
(-80 dBm)
All
VHO
initiation
2 15 kmh MedImgs Immediate
WiMAX Femto 2
(-75 dBm)
All
VHO
initiation
3 40 kmh HMonitoring Very urgent
WiMAX Femto 1
(-65 dBm)
All except
femtocells
Network
selection
4 25 kmh CData Standard
WAVE 1
(-94 dBm)
All
VHO
initiation
5 80 kmh
LVideo
& HMonitoring
Non urgent
LTE Macro
(-63 dBm)
All except
femtocells
VHO
initiation
6 20 kmh
MedImgs
& HMonitoring
Standard
WAVE 2
(-88 dBm)
All
VHO
initiation
7 5 kmh
MedImgs
& CData
Urgent
LTE Femto 1
(-95 dBm)
All
VHO
initiation
8 60 kmh
LVideo
& CData
Immediate
WiMAX Macro
(-89 dBm)
All except
femtocells
VHO
initiation
9 10 kmh
HMonitoring
& CData
Standard
WiMAX Femto 2
(-80 dBm)
All
VHO
initiation
10 35 kmh
LVideo
& MedImgs
& HMonitoring
Very urgent
WAVE 1
(-92 dBm)
All except
femtocells
VHO
initiation
TABLE V
THE RSSMT S , QMT S AND Sth,MT S THRESHOLDS PER PATIENT
HEALTH STATUS.
MTS classification RSSMT S QMT S Sth,MT S
Non-Urgent 0.5 0.5 0.35768
Standard 0.6 0.6 0.48583
Urgent 0.7 0.7 0.67242
Very-Urgent 0.8 0.8 0.75838
Immediate 0.9 0.9 0.87452
for each vehicle considering the vehicle service requirements
(Table IV).
Figure 6 compares the results of the proposed scheme
with the ones obtained using the ANST [18], the FAS [13],
the UCCA [16] and the Two-step [17] VHO management
schemes. In this figure, for each vehicle the current network as
well as the target network connection estimated by each of the
five schemes are presented. Additionally, the TFT ranking of
each network is given. From the obtained results it is clear that
the proposed algorithm outperforms the existing schemes since
it selects as target networks for vehicles the ones with the best
TFT ranks. In contrast, for the target networks selected by the
ANST and UCCA algorithms high TFT ranks are obtained
only for four vehicles, whereas the rest of the algorithms
perform worse. Also, in special cases where the velocity of
vehicles is high (eg. for vehicles 3, 8 and 10) the proposed
scheme considers only the wide coverage candidate networks
as alternatives avoiding the handovers to femtocell networks.
TABLE VI
VHO INITIATION RESULTS.
Vehicle RSSu,i Qu,i Su,i Sth,MT S VHO required
1 0.540541 0.733822 0.54232 0.67242 Yes
2 0.675676 0.935882 0.85552 0.87452 Yes
3 - - - - Yes (due to high velocity)
4 0.162162 0.968061 0.23509 0.48583 Yes
5 1.000000 0.795331 0.84589 0.35768 No
6 0.324324 0.699189 0.22980 0.48583 Yes
7 0.135135 0.732698 0.13617 0.67242 Yes
8 0.297297 0.690775 0.14245 0.87452 Yes
9 0.540541 0.658957 0.47013 0.48583 Yes
10 0.216216 0.753302 0.17768 0.75838 Yes
Fig. 5. Criteria weights per service and patient health status for the Network
Selection.
WAVE2
WiMAXFemto2
WiMAXFemto1
WAVE1
LTEMacro
WAVE2
LTEFemto1
WiMAXMacro
WiMAXFemto2
WAVE1
LTEMacro
WAVE1
WiMAXMacro
LTEFemto1
LTEMacro
WiMAXFemto1
LTEFemto1
LTEMacro
LTEFemto1
LTEMacro
WAVE2
WiMAXFemto2
WiMAXFemto1
LTEFemto1
LTEMacro
LTEMacro
WAVE1
LTEMacro
WiMAXFemto2
LTEMacro
WAVE2
WiMAXFemto2
WiMAXFemto1
WiMAXFemto2
LTEMacro
WiMAXFemto2
WiMAXFemto2
LTEFemto2
WiMAXFemto2
LTEFemto2
WiMAXMacro
LTEFemto1
WiMAXFemto2
LTEMacro
LTEMacro
WiMAXMacro
WiMAXMacro
LTEMacro
LTEFemto1
LTEMacro
WiMAXMacro
WAVE1
WiMAXFemto2
LTEMacro
WiMAXMacro
WiMAXMacro
WiMAXMacro
WiMAXMacro
LTEFemto1
WiMAXMacro
0
5
10
15
Vehicle 1
v=20kmh
Vehicle 2
v=15kmh
Vehicle 3
v=40kmh
Vehicle 4
v=25kmh
Vehicle 5
v=80kmh
Vehicle 6
v=20kmh
Vehicle 7
v=5kmh
Vehicle 8
v=60kmh
Vehicle 9
v=10kmh
Vehicle 10
v=35kmh
TFTrank
TFT ranking of each VHO scheme
Current Network Proposed Scheme ANST FAS UCCA Two-step
Fig. 6. Proposed VHO management scheme’s results.
IV. CONCLUSION
This paper proposes a VHO management scheme for sup-
porting medical services in 5G-VCC systems. The discussed
scheme consists of the VHO initiation and the network
selection processes. The vehicle’s velocity, its current con-
nection type, as well as the status of patient’s health, are
considered. Specifically, during the VHO initiation process the
necessity to perform handover is evaluated and, subsequently,
the network selection process selects the appropriate network
alternative. The proposed scheme is applied to a 5G-VCC
6. system. Performance evaluation showed that the proposed
scheme outperforms existing network selection methods by
satisfying multiple groups of criteria and medical services per
user.
ACKNOWLEDGEMENTS
The publication of this paper has been partly supported by
the University of Piraeus Research Center (UPRC).
REFERENCES
[1] R. Vilalta et al., “Telcofog: A unified flexible fog and cloud computing
architecture for 5g networks,” IEEE Communications Magazine, vol. 55,
no. 8, pp. 36–43, 2017.
[2] F. Z. Yousaf, M. Bredel, S. Schaller, and F. Schneider, “Nfv and sdn-key
technology enablers for 5g networks,” IEEE Journal on Selected Areas
in Communications, 2017.
[3] T. A. et al, “Real time injecting device with automated robust vein
detection using near infrared camera and live video,” in IEEE Global
Humanitarian Technology Conference (GHTC), San Jose, CA, USA,
October 19-22. IEEE, 2017.
[4] L. F. Lucas, N. M. Rodrigues, L. A. da Silva Cruz, and S. M. de Faria,
“Lossless compression of medical images using 3-d predictors,” IEEE
transactions on medical imaging, vol. 36, no. 11, pp. 2250–2260, 2017.
[5] G. K. Garge, C. Balakrishna, and S. K. Datta, “Consumer health
care: Current trends in consumer health monitoring,” IEEE Consumer
Electronics Magazine, vol. 7, no. 1, pp. 38–46, 2018.
[6] Q. Xue and M. C. Chuah, “Incentivising high quality crowdsourcing
clinical data for disease prediction,” in Connected Health: Applications,
Systems and Engineering Technologies (CHASE), 2017 IEEE/ACM
International Conference on. IEEE, 2017, pp. 185–194.
[7] “TS 36.300 (V13.2.0): Evolved Universal Terrestrial Radio Access
Network (E-UTRAN) (Rel.13),” Technical Specification, 3GPP, 2016.
[8] “802.16q-2015 - ieee standard for air interface for broadband wireless
access systems– amendment 3 multi-tier networks,” IEEE, 2015.
[9] “1609.3-2016 - ieee standard for wireless access in vehicular environ-
ments (wave) – networking services,” IEEE, 2016.
[10] K. Zhang, Y. Mao, S. Leng, Y. He, and Y. Zhang, “Mobile-edge
computing for vehicular networks: A promising network paradigm with
predictive off-loading,” IEEE Vehicular Technology Magazine, vol. 12,
no. 2, pp. 36–44, 2017.
[11] M. Lahby, C. Leghris, and A. Adib, “New multi access selection method
based on mahalanobis distance,” Applied Mathematical Sciences, vol. 6,
no. 53-56, pp. 2745–2760, 2012.
[12] I. Lassoued, J.-M. Bonnin, Z. Ben Hamouda, and A. Belghith, “A
methodology for evaluating vertical handoff decision mechanisms,” in
Networking, 2008. ICN 2008. Seventh International Conference on.
IEEE, 2008, pp. 377–384.
[13] D. A. Maroua Drissi, Mohammed Oumsis, “A fuzzy ahp approach to
network selection improvement in heterogeneous wireless networks,”
Networked Systems, pp. 169–182.
[14] S. Kaur, S. K. Sehra, and S. S. Sehra, “A framework for software quality
model selection using topsis,” in Recent Trends in Electronics, Infor-
mation & Communication Technology (RTEICT), IEEE International
Conference on. IEEE, 2016, pp. 736–739.
[15] I. Martinez and V. Ramos, “Netanpi: A network selection mechanism for
lte traffic offloading based on the analytic network process,” in Sarnoff
Symposium, 2015 36th IEEE. IEEE, 2015, pp. 117–122.
[16] Q.-T. Nguyen-Vuong, N. Agoulmine, and Y. Ghamri-Doudane, “A user-
centric and context-aware solution to interface management and access
network selection in heterogeneous wireless environments,” Computer
Networks, vol. 52, no. 18, pp. 3358–3372, 2008.
[17] C. Liu, Y. Sun, P. Yang, Z. Liu, H. Zhang, and X. Wen, “A two-step
vertical handoff decision algorithm based on dynamic weight compen-
sation,” in Communications Workshops (ICC), 2013 IEEE International
Conference on. IEEE, 2013, pp. 1031–1035.
[18] H. T. Yew, E. Supriyanto, M. H. Satria, and Y. Hau, “Adaptive network
selection mechanism for telecardiology system in developing countries,”
in Biomedical and Health Informatics (BHI), 2016 IEEE-EMBS Inter-
national Conference on. IEEE, 2016, pp. 94–97.
[19] H. T. Yewa, E. Supriyantoa, M. H. Satriaa, and Y. Wen, “Autonomous
network selection strategy for telecardiology application in heteroge-
neous wireless networks,” pp. 147–153, 2015.
[20] R. Agrawal and A. Sehgal, “Network selection for remote healthcare
systems through mapping between clinical and network parameter,”
in International Conference on Heterogeneous Networking for Quality,
Reliability, Security and Robustness. Springer, 2013, pp. 31–41.
[21] T. R. M. Azeredo, H. M. Guedes, R. A. R. de Almeida, T. C. M.
Chianca, and J. C. A. Martins, “Efficacy of the manchester triage system:
a systematic review,” International emergency nursing, Elsevier, vol. 23,
no. 2, pp. 47–52, 2015.
[22] H. Zhang, X. Wen, B. Wang, W. Zheng, and Y. Sun, “A novel handover
mechanism between femtocell and macrocell for lte based networks,”
in Communication Software and Networks, 2010. ICCSN’10. Second
International Conference on. IEEE, 2010, pp. 228–231.
[23] S.-H. Wei and S.-M. Chen, “Fuzzy risk analysis based on interval-valued
fuzzy numbers,” Expert Systems with Applications, vol. 36, no. 2, pp.
2285–2299, 2009.
[24] M.-S. Chen and S.-W. Wang, “Fuzzy clustering analysis for optimizing
fuzzy membership functions,” Fuzzy sets and systems, Elsevier, vol. 103,
no. 2, pp. 239–254, 1999.
[25] M. E. Cintra, H. A. Camargo, and M. C. Monard, “Genetic generation
of fuzzy systems with rule extraction using formal concept analysis,”
Information Sciences, Elsevier, vol. 349, pp. 199–215, 2016.
[26] E. Skondras, A. Michalas, A. Sgora, and D. D. Vergados, “A vertical
handover management scheme for vanet cloud computing systems,” in
Computers and Communications (ISCC), 2017 IEEE Symposium on.
IEEE, 2017, pp. 371–376.
[27] E. Skondras, A. Michalas, N. Tsolis, A. Sgora, and D. D. Vergados,
“A network selection scheme for healthcare vehicular cloud computing
systems,” in Information Intelligence Systems and Applications (IISA),
2017 IEEE International Conference on. IEEE, 2017.
[28] E. Skondras, A. Sgora, A. Michalas, and D. D. Vergados, “An analytic
network process and trapezoidal interval-valued fuzzy technique for
order preference by similarity to ideal solution network access selection
method,” International Journal of Communication Systems, vol. 29,
no. 2, pp. 307–329, 2016.
[29] Network Simulator 3 (NS3): https://www.nsnam.org/.