The problem of localization is a challenging task, and yet extremely crucial for many applications. While GNSS (such as GPS, or Galileo) solves the problem of localization for wide area of applications, the problem persists in many other cases like if satellite coverage is not available (skyscraper, tunnel), or the accuracy level is not sufficient. In such case, Invoking other devices and combining information from multiple sources may be considered as a potential solution.
Video transmission over wireless network requires
link reliability. Videos are having more data to be transmitted
during communication. The criticality and load of the network
increases when some video data is communicated over the
network. Firstly, describes the characteristics of Mobile Ad hoc
Networks and their Routing protocol, and second a mobile ad
hoc network (MANET) which consists of set mobile wireless
nodes and one fixed wireless server are design using ns-2. In this
research we will simulate three MANET routing protocols such
as AODV against three different parameters i.e. delay, network
load, throughput and retransmission.
IJERA (International journal of Engineering Research and Applications) is International online, ... peer reviewed journal. For more detail or submit your article, please visit www.ijera.com
Video transmission over wireless network requires
link reliability. Videos are having more data to be transmitted
during communication. The criticality and load of the network
increases when some video data is communicated over the
network. Firstly, describes the characteristics of Mobile Ad hoc
Networks and their Routing protocol, and second a mobile ad
hoc network (MANET) which consists of set mobile wireless
nodes and one fixed wireless server are design using ns-2. In this
research we will simulate three MANET routing protocols such
as AODV against three different parameters i.e. delay, network
load, throughput and retransmission.
IJERA (International journal of Engineering Research and Applications) is International online, ... peer reviewed journal. For more detail or submit your article, please visit www.ijera.com
Enhancing the Efficiency of Routing Protocols in VANETS by defending Dos Atta...Eswar Publications
Routing in VANETs (pure ad hoc architectures) with dynamic nature of the network becomes a challenging task for finding and maintaining routes. So, detecting the misbehaving vehicles is an important task in for improving the efficiency of the vehicles and to incorporate the reliable and secure routing in the transport system. Due to the self -configure (mobility) characteristic of the VANETS, it is very difficult to the road side and base station units to keep track of the actions happening among the vehicles. Obviously the attackers will have the fraudulent nature that same will persist over time with them that will be effected to the normal vehicles which is travelling in the
network from the non trustworthy vehicles. So detection and proper action is needed to improve the efficient routing of the vehicles in the network. Earlier we have many techniques for detecting and preventing the misbehaving vehicles depending upon the threshold values, mobility factors, power ratios etc., now we are proposing a new technique called Bloom-Filter based IP Choke Mechanism for locating the harmful vehicle. In
this paper we will discuss about the proposed technique on how to identify the malicious vehicle and how to defend the attacked vehicle by blocking it form the routing process.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
MOBILITY AWARE ROUTING PROTOCOL IN AD-HOC NETWORK cscpconf
A Mobile Ad-hoc Network (MANET) is a collection of mobile nodes that communicate and collaborate with each other without reliance on any pre-existing infrastructure. In MANETs, wireless links are subject to frequent breakages due to nodes high mobility. While several routing protocols such AODV and DSR have been designed for MANETs, many of operate efficiently under low network mobility conditions and do not adapt well with high mobility conditions. Therefore, considering mobility is a demanding task that should be performed efficiently and accurately. Here, we proposed novel mobility-aware routing protocol based on the well known Ad-hoc On Demand Distance Vector (AODV) routing protocol called: MA-AODV (Mobility Aware Ad-hoc On Demand Distance Vector) in an attempt to improve the handling of high mobility factor in ad-hoc networks. MA-AODV protocols perform periodic quantification of nodes mobility for the sake of establishing more stable paths between source/destination pairs, hence, avoiding the frequent link breakages associated with using unstable paths that contain high mobile nodes.
Edge device multi-unicasting for video streamingTal Lavian Ph.D.
After a decade of research and development, IP multicast has still not been deployed widely in the global Internet due to many open technical issues: lack of admission control, poorly scaled with large number of groups, and requiring substantial infrastructure modifications. To provide the benefits of IP multicast without requiring direct router support or the presence of a physical broadcast medium, various Application Level Multicast (ALM) models have been attempted. However, there are still several problems with ALM: unnecessary coupling between an application and its multicasting supports, bottleneck problem at network access links and considerable processing power required at the end nodes to support ALM mechanisms. This paper proposes an architecture to address these problems by delegating application-multicasting support mechanisms to smart edge devices associated with the application end nodes. The architecture gives rise to an interesting Edge Device Any-casting technology that lies between the IP-multicasting and the Application Layer Multicasting and enjoys the benefits of both. Furthermore, the architecture may provide sufficient cost-benefit for adoption by service providers. The paper presents initial results obtained from the implementation of a video streaming application over the testbed that implements the proposed architecture.
Back-Bone Assisted HOP Greedy Routing for VANETijsrd.com
Using advanced wireless local area network technologies, vehicular ad hoc networks (VANETs) have become viable and valuable for their wide variety of novel applications, such as road safety, multimedia content sharing, commerce on wheels, etc., currently, geographic routing protocols are widely adopted for VANETs as they do not require route construction and route maintenance phases. Again, with connectivity awareness, they perform well in terms of reliable delivery. Further, in the case of sparse and void regions, frequent use of the recovery strategy elevates hop count. Some geographic routing protocols adopt the minimum weighted algorithm based on distance or connectivity to select intermediate intersections. However, the shortest path or the path with higher connectivity may include numerous intermediate intersections. As a result, these protocols yield routing paths with higher hop count. In this paper, we propose a hop greedy routing scheme that yields a routing path with the minimum number of intermediate intersection nodes while taking connectivity into consideration. Moreover, we introduce back-bone nodes that play a key role in providing connectivity status around an intersection. Apart from this, by tracking the movement of source as well as destination, the back-bone nodes enable a packet to be forwarded in the changed direction. Simulation results signify the benefits of the proposed routing strategy in terms of high packet delivery ratio and shorter end-to-end delay.
Advancement in VANET Routing by Optimize the Centrality with ANT Colony Approachijceronline
In a wireless ad hoc network, an opportunistic routing strategy is a strategy where there is no predefined rule for choosing the next node to destination (as it is the case in conventional schemes such as OLSR, DSR or even Geo-Routing). A popular example of opportunistic routing is the “delay tolerant” forwarding to VANET network when a direct path to destination does not exist. Conventional routing in this case would just “drop” the packet. With opportunistic routing, a node acts upon the available information, In this thesis optimize the routing by centrality information then refine by ant colony metaheuristics. In this method validate our approach on different parameter like overhead, throughput.
International Journal of Computational Engineering Research (IJCER) ijceronline
International Journal of Computational Engineering Research(IJCER) is an intentional online Journal in English monthly publishing journal. This Journal publish original research work that contributes significantly to further the scientific knowledge in engineering and Technology
Lately, the concept of VANETs (Vehicular Ad hoc Networks) has gotten a huge attention as
more wireless communication technologies becoming available. Such networkis expected to be
one of the most valuable technology for improving efficiency and safety of the future
transportation. Vehicular networks are characterized by high mobility nodes which pose many
communication challenging problems. In vehicular networks, routing Collision Avoidance
Messages (CAMs) among vehicles is a key communication problem.Failure in routing CAMs to
their intended destination within the time constraint can render these messages useless. Many
routing protocols have been adapted for VANETs, such as DSDV (Destination Sequenced
Distance Vector), AODV (Ad-hoc On demand Distance Vector), and DSR (Dynamic Source Routing). This work compares the performance of those routing protocols at different driving environments and scenarios created by using the mobility generator (VanetMobiSim) and
network simulator(NS2). The obtained results at different vehicular densities, speeds, road
obstacles, lanes, traffic lights, and transmission ranges showed that on average AODV protocol outperforms DSR and DSDV protocols in packet delivery ratio and end-toend delay. However, at certain circumstances (e.g., at shorter transmission ranges) DSR tends to have better performance than AODV and DSDV protocols.
Performance comparison of aodv and olsr using 802.11 a and dsrc (802.11p) pro...IJCNCJournal
A Vehicular Ad Hoc Network (VANET) is a network formed purely among vehicles without presence of any
communication infrastructure as base stations and/or access point. Frequent topological changes due to
high mobility is one of the main issues in VANETs. In this paper we evaluate Ad-hoc On-Demand Distance
Vector (AODV) and Optimized Link State Routing (OLSR) routing protocols using 802.11a and 802.11p in
a realistic urban scenario. For this comparison, we chose five performance metrics: Path Availability, Endto-
End Delay, Number of Created Paths, Path Length and Path Duration. Simulation results show, that for
most of the metrics evaluated, OLSR outperforms AODV when 802.11p and that 802.11p is more efficient
in urban VANETs.
Master-Slave Clustering Technique for High Density Traffic in Urban VANET Sce...rifat1tasnim
Moving vehicle is never free of traffic congestion especially in the cities. Every day commuters wastes hours in travelling just because of traffic congestion. This has led to the emergence of vehicular management which will be beneficial for Road Transport department to control and manage the traffic flow on congested roads. Thus to support above idea we have Vehicular Ad-Hoc Network, or VANET technology that turns every participating car into a node, allowing cars to connect with each other and in turn create a network. There are wealthy numbers of approaches were highlighted to solve several thriving challenges of VANET. Clustering technique in vehicle is one of them which made a great impact on VANET. But it fails to fulfill a crucial requirement. Several protocols wanted to build a cluster in low density traffic where the numbers of vehicles are less with respect to transmission range & there is a less chance of broadcast storming which is not a practical scenario. So that cluster formation in high density traffic has arisen as an issue where there is a great possibility to broadcast storm. This paper suggests a “Priority Based Master-Slave Cluster Formation Process” in high density traffic for an urban scenario using “fidelity” metric. With the help of this metric it will be easier to find high density traffic & form priority based Master-Slave dynamically by reducing broadcast storm problem.
In this paper CHP function runs on the vehicular environment which carried out to select a vehicle as Master. In this Ad-hoc wireless environment a dataset is assumed which create a proper environment & generate a graph. Graph results can be analyzed to have the highest one selects as a Master. Thus for the final result, real aspects of vehicular traffic is very essential and scenarios play a very crucial role.
Jamming aware traffic allocation for multiple-path routing using portfolio se...Saad Bare
Multiple-path source routing protocols allow a data source node to distribute the total traffic among available paths. we consider the problem of jamming-aware source routing in which the source node performs traffic allocation based on empirical jamming statistics at individual network nodes. We formulate this traffic allocation as a lossy network flow optimization problem using portfolio selection theory from financial statistics. We show that in multisource networks, this centralized optimization problem can be solved using a distributed algorithm based on decomposition in network utility maximization (NUM). We demonstrate the network's ability to estimate the impact of jamming and incorporate these estimates into the traffic allocation problem. Finally, we simulate the achievable throughput using our proposed traffic allocation method in several scenarios.
The Design of a Simulation for the Modeling and Analysis of Public Transporta...CSCJournals
Vehicular ad-hoc networks, when combined with wireless sensor networks, are used in a variety of solutions for commercial, urban, and metropolitan areas, including emergency response, traffic, and environmental monitoring. In this work, we model buses in the Washington, DC Metropolitan Area Transit Authority (WMATA) as a network of vehicular nodes equipped with wireless sensors. A simulation tool was developed, using the actual WMATA schedule, to determine performance metrics such as end-to-end packet delivery delay. In addition, a web-based front-end was developed, using the Google Maps API, to provide a user-friendly display and control of the network map, input parameters, and simulated results. This application will provide users with a simplified method for modifying network parameters to account for a number of parameters and conditions, including inclement weather, traffic congestion, and more.
Multipath routing protocol for effective local route recoveryIJARBEST JOURNAL
In mobile Ad hoc network, frequent mobility during the data transmission of data
causes route failure which results in route discovery. In this we propose multipath routing protocol
for effective local route recovery in mobile Ad hoc networks. In this protocol each source and
destination pair establishes multiple paths in single route discovery and they are cached in their route
caches. The cached routes are sorted on the basis of their bandwidth availability. In case of route
failure in the primary route, a recovery node which is an over heading neighbor, detects it and
establishes a local recovery path with maximum bandwidth from its route cache. This proposed
technique improves network performance and it prevents frequent collision.
Enhancing the Efficiency of Routing Protocols in VANETS by defending Dos Atta...Eswar Publications
Routing in VANETs (pure ad hoc architectures) with dynamic nature of the network becomes a challenging task for finding and maintaining routes. So, detecting the misbehaving vehicles is an important task in for improving the efficiency of the vehicles and to incorporate the reliable and secure routing in the transport system. Due to the self -configure (mobility) characteristic of the VANETS, it is very difficult to the road side and base station units to keep track of the actions happening among the vehicles. Obviously the attackers will have the fraudulent nature that same will persist over time with them that will be effected to the normal vehicles which is travelling in the
network from the non trustworthy vehicles. So detection and proper action is needed to improve the efficient routing of the vehicles in the network. Earlier we have many techniques for detecting and preventing the misbehaving vehicles depending upon the threshold values, mobility factors, power ratios etc., now we are proposing a new technique called Bloom-Filter based IP Choke Mechanism for locating the harmful vehicle. In
this paper we will discuss about the proposed technique on how to identify the malicious vehicle and how to defend the attacked vehicle by blocking it form the routing process.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
MOBILITY AWARE ROUTING PROTOCOL IN AD-HOC NETWORK cscpconf
A Mobile Ad-hoc Network (MANET) is a collection of mobile nodes that communicate and collaborate with each other without reliance on any pre-existing infrastructure. In MANETs, wireless links are subject to frequent breakages due to nodes high mobility. While several routing protocols such AODV and DSR have been designed for MANETs, many of operate efficiently under low network mobility conditions and do not adapt well with high mobility conditions. Therefore, considering mobility is a demanding task that should be performed efficiently and accurately. Here, we proposed novel mobility-aware routing protocol based on the well known Ad-hoc On Demand Distance Vector (AODV) routing protocol called: MA-AODV (Mobility Aware Ad-hoc On Demand Distance Vector) in an attempt to improve the handling of high mobility factor in ad-hoc networks. MA-AODV protocols perform periodic quantification of nodes mobility for the sake of establishing more stable paths between source/destination pairs, hence, avoiding the frequent link breakages associated with using unstable paths that contain high mobile nodes.
Edge device multi-unicasting for video streamingTal Lavian Ph.D.
After a decade of research and development, IP multicast has still not been deployed widely in the global Internet due to many open technical issues: lack of admission control, poorly scaled with large number of groups, and requiring substantial infrastructure modifications. To provide the benefits of IP multicast without requiring direct router support or the presence of a physical broadcast medium, various Application Level Multicast (ALM) models have been attempted. However, there are still several problems with ALM: unnecessary coupling between an application and its multicasting supports, bottleneck problem at network access links and considerable processing power required at the end nodes to support ALM mechanisms. This paper proposes an architecture to address these problems by delegating application-multicasting support mechanisms to smart edge devices associated with the application end nodes. The architecture gives rise to an interesting Edge Device Any-casting technology that lies between the IP-multicasting and the Application Layer Multicasting and enjoys the benefits of both. Furthermore, the architecture may provide sufficient cost-benefit for adoption by service providers. The paper presents initial results obtained from the implementation of a video streaming application over the testbed that implements the proposed architecture.
Back-Bone Assisted HOP Greedy Routing for VANETijsrd.com
Using advanced wireless local area network technologies, vehicular ad hoc networks (VANETs) have become viable and valuable for their wide variety of novel applications, such as road safety, multimedia content sharing, commerce on wheels, etc., currently, geographic routing protocols are widely adopted for VANETs as they do not require route construction and route maintenance phases. Again, with connectivity awareness, they perform well in terms of reliable delivery. Further, in the case of sparse and void regions, frequent use of the recovery strategy elevates hop count. Some geographic routing protocols adopt the minimum weighted algorithm based on distance or connectivity to select intermediate intersections. However, the shortest path or the path with higher connectivity may include numerous intermediate intersections. As a result, these protocols yield routing paths with higher hop count. In this paper, we propose a hop greedy routing scheme that yields a routing path with the minimum number of intermediate intersection nodes while taking connectivity into consideration. Moreover, we introduce back-bone nodes that play a key role in providing connectivity status around an intersection. Apart from this, by tracking the movement of source as well as destination, the back-bone nodes enable a packet to be forwarded in the changed direction. Simulation results signify the benefits of the proposed routing strategy in terms of high packet delivery ratio and shorter end-to-end delay.
Advancement in VANET Routing by Optimize the Centrality with ANT Colony Approachijceronline
In a wireless ad hoc network, an opportunistic routing strategy is a strategy where there is no predefined rule for choosing the next node to destination (as it is the case in conventional schemes such as OLSR, DSR or even Geo-Routing). A popular example of opportunistic routing is the “delay tolerant” forwarding to VANET network when a direct path to destination does not exist. Conventional routing in this case would just “drop” the packet. With opportunistic routing, a node acts upon the available information, In this thesis optimize the routing by centrality information then refine by ant colony metaheuristics. In this method validate our approach on different parameter like overhead, throughput.
International Journal of Computational Engineering Research (IJCER) ijceronline
International Journal of Computational Engineering Research(IJCER) is an intentional online Journal in English monthly publishing journal. This Journal publish original research work that contributes significantly to further the scientific knowledge in engineering and Technology
Lately, the concept of VANETs (Vehicular Ad hoc Networks) has gotten a huge attention as
more wireless communication technologies becoming available. Such networkis expected to be
one of the most valuable technology for improving efficiency and safety of the future
transportation. Vehicular networks are characterized by high mobility nodes which pose many
communication challenging problems. In vehicular networks, routing Collision Avoidance
Messages (CAMs) among vehicles is a key communication problem.Failure in routing CAMs to
their intended destination within the time constraint can render these messages useless. Many
routing protocols have been adapted for VANETs, such as DSDV (Destination Sequenced
Distance Vector), AODV (Ad-hoc On demand Distance Vector), and DSR (Dynamic Source Routing). This work compares the performance of those routing protocols at different driving environments and scenarios created by using the mobility generator (VanetMobiSim) and
network simulator(NS2). The obtained results at different vehicular densities, speeds, road
obstacles, lanes, traffic lights, and transmission ranges showed that on average AODV protocol outperforms DSR and DSDV protocols in packet delivery ratio and end-toend delay. However, at certain circumstances (e.g., at shorter transmission ranges) DSR tends to have better performance than AODV and DSDV protocols.
Performance comparison of aodv and olsr using 802.11 a and dsrc (802.11p) pro...IJCNCJournal
A Vehicular Ad Hoc Network (VANET) is a network formed purely among vehicles without presence of any
communication infrastructure as base stations and/or access point. Frequent topological changes due to
high mobility is one of the main issues in VANETs. In this paper we evaluate Ad-hoc On-Demand Distance
Vector (AODV) and Optimized Link State Routing (OLSR) routing protocols using 802.11a and 802.11p in
a realistic urban scenario. For this comparison, we chose five performance metrics: Path Availability, Endto-
End Delay, Number of Created Paths, Path Length and Path Duration. Simulation results show, that for
most of the metrics evaluated, OLSR outperforms AODV when 802.11p and that 802.11p is more efficient
in urban VANETs.
Master-Slave Clustering Technique for High Density Traffic in Urban VANET Sce...rifat1tasnim
Moving vehicle is never free of traffic congestion especially in the cities. Every day commuters wastes hours in travelling just because of traffic congestion. This has led to the emergence of vehicular management which will be beneficial for Road Transport department to control and manage the traffic flow on congested roads. Thus to support above idea we have Vehicular Ad-Hoc Network, or VANET technology that turns every participating car into a node, allowing cars to connect with each other and in turn create a network. There are wealthy numbers of approaches were highlighted to solve several thriving challenges of VANET. Clustering technique in vehicle is one of them which made a great impact on VANET. But it fails to fulfill a crucial requirement. Several protocols wanted to build a cluster in low density traffic where the numbers of vehicles are less with respect to transmission range & there is a less chance of broadcast storming which is not a practical scenario. So that cluster formation in high density traffic has arisen as an issue where there is a great possibility to broadcast storm. This paper suggests a “Priority Based Master-Slave Cluster Formation Process” in high density traffic for an urban scenario using “fidelity” metric. With the help of this metric it will be easier to find high density traffic & form priority based Master-Slave dynamically by reducing broadcast storm problem.
In this paper CHP function runs on the vehicular environment which carried out to select a vehicle as Master. In this Ad-hoc wireless environment a dataset is assumed which create a proper environment & generate a graph. Graph results can be analyzed to have the highest one selects as a Master. Thus for the final result, real aspects of vehicular traffic is very essential and scenarios play a very crucial role.
Jamming aware traffic allocation for multiple-path routing using portfolio se...Saad Bare
Multiple-path source routing protocols allow a data source node to distribute the total traffic among available paths. we consider the problem of jamming-aware source routing in which the source node performs traffic allocation based on empirical jamming statistics at individual network nodes. We formulate this traffic allocation as a lossy network flow optimization problem using portfolio selection theory from financial statistics. We show that in multisource networks, this centralized optimization problem can be solved using a distributed algorithm based on decomposition in network utility maximization (NUM). We demonstrate the network's ability to estimate the impact of jamming and incorporate these estimates into the traffic allocation problem. Finally, we simulate the achievable throughput using our proposed traffic allocation method in several scenarios.
The Design of a Simulation for the Modeling and Analysis of Public Transporta...CSCJournals
Vehicular ad-hoc networks, when combined with wireless sensor networks, are used in a variety of solutions for commercial, urban, and metropolitan areas, including emergency response, traffic, and environmental monitoring. In this work, we model buses in the Washington, DC Metropolitan Area Transit Authority (WMATA) as a network of vehicular nodes equipped with wireless sensors. A simulation tool was developed, using the actual WMATA schedule, to determine performance metrics such as end-to-end packet delivery delay. In addition, a web-based front-end was developed, using the Google Maps API, to provide a user-friendly display and control of the network map, input parameters, and simulated results. This application will provide users with a simplified method for modifying network parameters to account for a number of parameters and conditions, including inclement weather, traffic congestion, and more.
Multipath routing protocol for effective local route recoveryIJARBEST JOURNAL
In mobile Ad hoc network, frequent mobility during the data transmission of data
causes route failure which results in route discovery. In this we propose multipath routing protocol
for effective local route recovery in mobile Ad hoc networks. In this protocol each source and
destination pair establishes multiple paths in single route discovery and they are cached in their route
caches. The cached routes are sorted on the basis of their bandwidth availability. In case of route
failure in the primary route, a recovery node which is an over heading neighbor, detects it and
establishes a local recovery path with maximum bandwidth from its route cache. This proposed
technique improves network performance and it prevents frequent collision.
Simulation Based Analysis of Bee Swarm Inspired Hybrid Routing Protocol Param...Editor IJCATR
Vehicular Ad-hoc Networks (VANET's) are basically emanated from Mobile Ad hoc networks (MANET's) in which
vehicles act as the mobile nodes, the nodes are vehicles on the road and mobility of these vehicles are very high. The main objective of
VANET is to enhance the safety and amenity of road users. It provides intelligent transportation services in vehicles with the
automobile equipment to communicate and co-ordinates with other vehicles in the same network that informs the driver’s about the
road status, unseen obstacles, internet access and other necessary travel service information’s. The evaluation of vehicular ad hoc
networks applications in based on the simulations. A Realistic Mobility model is a basic component for VANET simulation that
ensures that conclusion drawn from simulation experiments will carry through to real deployments. This paper attempts to evaluate the
performance of a Bee swarm inspired Hybrid routing protocol for vehicular ad hoc network, that protocol should be tested under a
realistic condition including, representative data traffic models, and the realistic movement of the mobile nodes which are the vehicles.
In VANET the simulation of Realistic mobility model has been generated using SUMO and MOVE software and network simulation
has been performed using NS2 simulator, we conducted performance evaluation based on certain metric parameters such as packet
delivery ratio, end-to-end delay and normalized overhead ratio.
Abstract: Vehicular Ad hoc Networks (VANETs), a subclass of mobile ad hoc network (MANET), is a
promising approach for the intelligent transport system (ITS). VANET allows vehicles to form a self-organized
network without the need for a permanent infrastructure. As the VANET has a potential in improving road
safety, real time traffic update and other travel comforts, it turns attention of the researcher. Though VANET
and MANET shares some common characteristics like self-organized network, dynamic topology, ad hoc nature
etc, VANET differs from MANET by challenges, application, architecture, power constraint and mobility
patterns, so routing protocols used in MANET are not applicable with VANET. New routing strategy for VANET
has been proposed by many researchers in recent year. This paper provides focus on the various aspects of
VANET like architecture, characteristic, challenges, glimpse of routing protocols, and simulation models used
for VANET.
Keywords: Vehicular Ad hoc Networks; routing; position based routing; characteristics; transmission strategies
STUDY OF VANET ROUTING PROTOCOLS FOR END TO END DELAYcscpconf
Less than a century since the automobile was made affordable enough for the general public, hundreds of millions of vehicles now travel along highways and streets around the
world. Innovations in safety, comfort, and convenience have made vast improvements in
automobiles during that time, and now new technologies promise to change the face of
vehicular travel once again. Vehicular ad hoc network (VANET) is network which provides the communication between vehicle to vehicle for p r o v i d i n g i n f o r m a t i o n t o travelers with new features and applications that have never previously been possible. This paper focuses
on vehicle to vehicle (V2V) communications in VANET. Lot of research is going on for
determining route between source and destination vehicles for routing the information with
good packet delivery ratio. In this paper we provide a simulation and study of VANET Routing Protocols for end-to-end delay in V2V communication.
Similar to Localization as a service in an Intelligent Transport System (20)
Translation Cache Policies for Dynamic Binary TranslationSaber Ferjani
Our project comes in order to enhance Qemu simulation speed, through the proposal of a new cache algorithm that detect frequently used blocks and improves their reuse ratio.
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Jeffrey Haguewood
Sidekick Solutions uses Bonterra Impact Management (fka Social Solutions Apricot) and automation solutions to integrate data for business workflows.
We believe integration and automation are essential to user experience and the promise of efficient work through technology. Automation is the critical ingredient to realizing that full vision. We develop integration products and services for Bonterra Case Management software to support the deployment of automations for a variety of use cases.
This video focuses on the notifications, alerts, and approval requests using Slack for Bonterra Impact Management. The solutions covered in this webinar can also be deployed for Microsoft Teams.
Interested in deploying notification automations for Bonterra Impact Management? Contact us at sales@sidekicksolutionsllc.com to discuss next steps.
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
Elevating Tactical DDD Patterns Through Object CalisthenicsDorra BARTAGUIZ
After immersing yourself in the blue book and its red counterpart, attending DDD-focused conferences, and applying tactical patterns, you're left with a crucial question: How do I ensure my design is effective? Tactical patterns within Domain-Driven Design (DDD) serve as guiding principles for creating clear and manageable domain models. However, achieving success with these patterns requires additional guidance. Interestingly, we've observed that a set of constraints initially designed for training purposes remarkably aligns with effective pattern implementation, offering a more ‘mechanical’ approach. Let's explore together how Object Calisthenics can elevate the design of your tactical DDD patterns, offering concrete help for those venturing into DDD for the first time!
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf91mobiles
91mobiles recently conducted a Smart TV Buyer Insights Survey in which we asked over 3,000 respondents about the TV they own, aspects they look at on a new TV, and their TV buying preferences.
Transcript: Selling digital books in 2024: Insights from industry leaders - T...BookNet Canada
The publishing industry has been selling digital audiobooks and ebooks for over a decade and has found its groove. What’s changed? What has stayed the same? Where do we go from here? Join a group of leading sales peers from across the industry for a conversation about the lessons learned since the popularization of digital books, best practices, digital book supply chain management, and more.
Link to video recording: https://bnctechforum.ca/sessions/selling-digital-books-in-2024-insights-from-industry-leaders/
Presented by BookNet Canada on May 28, 2024, with support from the Department of Canadian Heritage.
UiPath Test Automation using UiPath Test Suite series, part 3DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 3. In this session, we will cover desktop automation along with UI automation.
Topics covered:
UI automation Introduction,
UI automation Sample
Desktop automation flow
Pradeep Chinnala, Senior Consultant Automation Developer @WonderBotz and UiPath MVP
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
Connector Corner: Automate dynamic content and events by pushing a buttonDianaGray10
Here is something new! In our next Connector Corner webinar, we will demonstrate how you can use a single workflow to:
Create a campaign using Mailchimp with merge tags/fields
Send an interactive Slack channel message (using buttons)
Have the message received by managers and peers along with a test email for review
But there’s more:
In a second workflow supporting the same use case, you’ll see:
Your campaign sent to target colleagues for approval
If the “Approve” button is clicked, a Jira/Zendesk ticket is created for the marketing design team
But—if the “Reject” button is pushed, colleagues will be alerted via Slack message
Join us to learn more about this new, human-in-the-loop capability, brought to you by Integration Service connectors.
And...
Speakers:
Akshay Agnihotri, Product Manager
Charlie Greenberg, Host
UiPath Test Automation using UiPath Test Suite series, part 4DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 4. In this session, we will cover Test Manager overview along with SAP heatmap.
The UiPath Test Manager overview with SAP heatmap webinar offers a concise yet comprehensive exploration of the role of a Test Manager within SAP environments, coupled with the utilization of heatmaps for effective testing strategies.
Participants will gain insights into the responsibilities, challenges, and best practices associated with test management in SAP projects. Additionally, the webinar delves into the significance of heatmaps as a visual aid for identifying testing priorities, areas of risk, and resource allocation within SAP landscapes. Through this session, attendees can expect to enhance their understanding of test management principles while learning practical approaches to optimize testing processes in SAP environments using heatmap visualization techniques
What will you get from this session?
1. Insights into SAP testing best practices
2. Heatmap utilization for testing
3. Optimization of testing processes
4. Demo
Topics covered:
Execution from the test manager
Orchestrator execution result
Defect reporting
SAP heatmap example with demo
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Key Trends Shaping the Future of Infrastructure.pdfCheryl Hung
Keynote at DIGIT West Expo, Glasgow on 29 May 2024.
Cheryl Hung, ochery.com
Sr Director, Infrastructure Ecosystem, Arm.
The key trends across hardware, cloud and open-source; exploring how these areas are likely to mature and develop over the short and long-term, and then considering how organisations can position themselves to adapt and thrive.
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Ramesh Iyer
In today's fast-changing business world, Companies that adapt and embrace new ideas often need help to keep up with the competition. However, fostering a culture of innovation takes much work. It takes vision, leadership and willingness to take risks in the right proportion. Sachin Dev Duggal, co-founder of Builder.ai, has perfected the art of this balance, creating a company culture where creativity and growth are nurtured at each stage.
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
Localization as a service in an Intelligent Transport System
1. LOCALIZATION AS A SERVICE IN
INTELLIGENT TRANSPORT SYSTEM
Saber Ferjani
PhD Student
Hana Lab - ENSI - Manouba University
http://www.fastcoexist.com/1681562/solar-roads-charging-roads-and-the-future-of-transportation
2. Traffic congestion
MOTIVATION
Problems:
Waste of time
Waste of energy
Air pollution
More accident
Solutions
Construct new roads
ReduceTraffic
Improve transport efficiency
2/40
3. MOTIVATION
ITS functional areas:
ATMS:AdvancedTraffic Management Systems
ATIS:AdvancedTraveler Information Systems
CVO: CommercialVehicle Operations
APTS:Advanced PublicTransportation Systems
AVCS:AdvancedVehicle Control Systems
3/40
7. 1. LOCALIZATION ALGORITHMS
1. ONE HOP LOCALIZATION
Trilateration
Determining the location of a point by
measuring distances, using the
geometry of circles (2D), or spheres
(3D).
Triangulation
Determining the location of a point by
measuring angles to it from known
points at either end of a fixed
baseline.
Location?
Location?
𝑅 𝑎
𝑅 𝑏
𝑅 𝑐 𝛼
𝛽
7/40
8. 1. LOCALIZATION ALGORITHMS
1. ONE HOP LOCALIZATION
1. PROPAGATION MODEL
The RSS (received signal strength) is provided by most radio chips.
Known :
The path loss model
Transmission power 𝑃𝑡𝑥
Path lost coefficient α
Receiver can determine the distance d to the transmitter :
𝑃𝑡𝑥
𝑅𝑆𝑆
𝑅𝑆𝑆 = 𝑐
𝑃𝑡𝑥
𝑑 𝛼
8/40
9. 1. LOCALIZATION ALGORITHMS
1. ONE HOP LOCALIZATION
2.TIME BASED
1. Time of arrival
The distance can be estimated, using the transmission time.
• The speed of propagation is known.
• Receiver and sender are synchronized
2. Time Difference of arrival
Use two transmissions mediums of different propagation speeds to generate an implicit
synchronization
Tx TxRx Rx
TOA
TDOA
9/40
10. 1. LOCALIZATION ALGORITHMS
1. ONE HOP LOCALIZATION
3. ANGLE BASED
1. DOA: Direction of arrival is the direction that
maximizes the RSS of directional antenna
2. AOA: Angle of arrival is the angle between
DOA, and a conventional direction
Measured using:
Rotatable DirectionalAntennas
TOA, RSS Differences ofAntenna array
Smart Antenna:
ESPRIT: estimation of signal parameters via rotational
invariant techniques
MUSIC: MUltiple SIgnal Classification
10/40
11. 1. LOCALIZATION ALGORITHMS
2. MULTI-HOP LOCALIZATION
Centralized
Designed to run on a central machine with
powerful computational capabilities.
Multi-Dimensional Scaling
Semi-Definite Programming
Distributed
Designed to run in network, using massive
parallelism and internode communication.
Beacon Based Localization
(DV-hop, DV distance, Iterative localization)
Coordinate System Stitching
Higher Accuracy
Low propagation error
Low Computation cost
Low Communication cost
High Computation cost
High Communication cost
Lower Accuracy
High propagation error
11/40
13. 1. LOCALIZATION ALGORITHMS
3. PROBABILISTIC LOCALIZATION
In probabilistic localization, we
distinguish two update steps:
1) ACTION:
Use proprioceptive sensors to estimate
location .
During this step, uncertainty grows.
2) PERCEPTION:
Combine data from exteroceptive
sensors with the belief before the
observation.
In this step, location uncertainty shrinks.
http://www.asl.ethz.ch/education/master/mobile_robotics/year2010/5b_-_Probabilistic_Map_Based_Localization_and_Markov_printable.pdf
13/40
14. 1. LOCALIZATION ALGORITHMS
3. PROBABILISTIC LOCALIZATION
1. KALMAN FILTER APPROACH
uses a single, well-defined Gaussian
probability density function.
Updating the parameters of the
Gaussian distribution is all that is
required.
For highly nonlinear systems:
Extended Kalman filter
Unscented Kalman filters
14/40
15. 1. LOCALIZATION ALGORITHMS
3. PROBABILISTIC LOCALIZATION
2. MARKOV CHAIN APPROACH
The location state is usually
represented as separate probability
assignments for every possible position
in its map.
Complete Sampling
Randomized Sampling
particle filter algorithms
condensation algorithms
Monte Carlo algorithms.
15/40
16. 1. LOCALIZATION ALGORITHMS
4. CONCLUSION
0.5
12.5
25
50
6.3 6.8 7.2 7.6
2003 2010 2015 2020
Connected devices (Billion) World population (Billion)
Cisco IBSG white paper “The Internet of Things”, April 2011
16/40
17. 2. FUTURE INTERNET TRENDS
1. Current challenges
2. Semantic web
3. Dbpedia
4. SPARQL Query Language
17/40
19. 2. FUTURE INTERNETTRENDS
2. CURRENT CHALLENGES
The web is extremely big!
And still getting bigger every minute!
The meaning of web pages can be understood
only by humans!
19/40
20. ”The Web was designed as an information
space, with the goal that it should be useful
not only for human-human communication,
but also that machines would be able to
participate and help…”
Tim Berners-Lee, SemanticWeb Roadmap, Sept 1998
2. FUTURE INTERNETTRENDS
3.SEMANTIC WEB
20/40
21. 2. FUTURE INTERNETTRENDS
3.SEMANTIC WEB
Ontology definition:
It is a compound word, composed of
ontos- (ὄντος) meaning “being”
-logia (λογία) interpreted as "science, study,
theory".
Ontology, is the science or study of being
Ontology In computer science:
“An ontology is an explicit, formal
specification of a shared conceptualization.”
(Thomas R. Gruber, 1993)
Top-Level
Ontology
Task Ontology
Domain Ontology
Application
Ontology
Dublin Core
General Formal Ontology
OpenCyc
Railway Domain Ontology
soccer ontology
music ontology
21/40
22. XML was created to structure, store,
and transport information.
XML Separates Data from HTML:
Simplifies Data Sharing
Simplifies DataTransport
Simplifies Platform Changes
Used to Create New Internet
Languages
2. FUTURE INTERNETTRENDS
3.SEMANTIC WEB
1.XML
22/40
23. Resource
can be everything
must be uniquely identified and be
referencable
Description
via representing properties and relationships
among resources
relationships can be represented as graphs
Framework
Combination of web based protocols (URI,
HTTP, XML,...)
based on formal model
defines all allowed relationships among
resources
2. FUTURE INTERNETTRENDS
3.SEMANTIC WEB
2.RDF
http://about.me/ferjani +216 22 94 20 94
<Subject> <PREDICATE> <Object>
hasPhoneNumber
23/40
27. Acronym Language Characteristics
XML Extensible Markup Language Extensions for arbitrary domains and specific tasks.
RDF Resource Description Framework
Syntactic conventions and simple data models to represent semantics.
It supports interoperability aspects with object - attribute - value
relationships.
RDFS
Resource Description Framework
Schema
Primitives to model basic ontologies with RDF.
OWL Web Ontology Language
W3C Recommandation
2004-02-10; 2009-10-27; 2010-06-22;
http://www.emc-eu.de/index-Dateien/3_ONTOLOGY_UK.html
2. FUTURE INTERNETTRENDS
3.SEMANTIC WEB
4. Ontology engineering
27/40
30. Find all schools within a
5km radius around a
specific location, and for
each school find
coffeeshops that are closer
than 1km.
2. FUTURE INTERNETTRENDS
5. SPARQL QUERY LANGUAGE
30/40
32. 3. WEB SERVICE COMPOSITION
1. Web services & RESTful services
2. Web process lifecycle
3. Composition methods
32/40
33. 3. WEB SERVICE COMPOSITION
1.WEB SERVICES & RESTFUL SERVICES
Client app code Client service code
Proxy/stub
Encoding
Protocol
Transport
Skeleton
Encoding
Protocol
Transport
attachementdataheader
Jaxb, direct XML
XML, JSON
HTTP
TCP
WADL
SSL HTTP session
Client app code Client service code
Proxy/stub
Encoding
Protocol
Transport
Skeleton
Encoding
Protocol
Transport
attachementdataheader
WSDL
Jaxb, direct XML
XML, Fast-infoset
HTTP, SIP, SMTP
TCP, UDP
WS-Trust, WS-Security,
WS-SecureConversation
WS-ReliableMessaging,
WS-AtomicTransactions
SOAP REST 33/40
34. 3. WEB SERVICE COMPOSITION
1.WEB SERVICES & RESTFUL SERVICES
Eg: Ethernet link
IP
TCP
HTTP
Payload
Constrained link
IP
UDP
CoAP
Payload
Shelby, Z. - Embedded web services - Wireless Communications, IEEE, 2010
34/40
35. 3. WEB SERVICE COMPOSITION
2.WEB PROCESS LIFECYCLE
Annotation
Advertisement
Discovery
Selection
Composition
Execution
35/40
36. 3. WEB SERVICE COMPOSITION
3. COMPOSITION METHODSWebService
Composition
Static
Orchestration WS-BPEL
Choreography WS-CDL, CHOReOS
Dynamic
SemanticWeb
Service
RDF, DAML, OWL-S
36/40
37. 3. WEB SERVICE COMPOSITION
3. COMPOSITION METHODS
1. STATIC COMPOSITION
Orchestration
a central process takes control of the
involvedWeb services and coordinates
the execution of different operations.
Choreography
it is a collaborative effort focusing on
the exchange of messages in public
business processes.
coordinator
Web
service 1
Web
service 2
1
2
Web
service 33
4
5
Web
service 1
Web
service 3
Web
service 2
1
2
34
http://www.oracle.com/technetwork/articles/matjaz-bpel1-090575.html
37/40
38. 3. WEB SERVICE COMPOSITION
3. COMPOSITION METHODS
2. DYNAMIC COMPOSITION
Specification
Matchmaking
Algorithms
Generation
CSL language
Composabilty
Model
Composition
plans
Web
service
registries
Ontological
organization and
description of
WS
High level
description
of desired
composition
Composite
Service
QoC
parametersComposition
plan cost
Orchestration
Service Composition for the Semantic Web - DOI 10.1007/978-1-4419-8465-4
38/40
40. 5. CONCLUSION
Context-aware systems uses context to provide relevant information and services
Location is one of the most important context information
Proliferation of mobile devices improve real time information sharing
Semantic web allow autonomic web service composition
ITS functional areas use location with different accuracy level
40/40
Hello Every one, Welcome and Thanks for coming.
As most of you already know, I'm SABER FERJANI, I am PhD student at HANA Lab in Manouba university.
Since November 2013, I started working on Dynamic and Autonomic Web service composition in the context of internet of things, applied to Intelligent Transport System.
The topic of my talk today is “Localization as a service in Intelligent Transport system”.
I hope you enjoy my presentation and if you have any questions, please don't hesitate to ask me them at the end.
More roads: Expensive, it is needed most is in the heart of metropolitan areas.
Less traffic: Public transport isn’t an affordable choice yet
Improve transport efficiency: Goal of Intelligent transportation systems, or ITS,
ITS encompass a broad range of wireless and wireline communications-based information, control and electronics technologies. When integrated into the transportation system infrastructure, and in vehicles themselves, these technologies help monitor and manage traffic flow, reduce congestion, provide alternate routes to travelers, enhance productivity, and save lives, time and money.
ATMS: Uses real-time traffic data to improve the flow of vehicle traffic and improve safety.
ATIS: acquires, analyzes, and presents information to assist transportation travelers.
CVO: Logistics & supply chain monitoring, delivery conditions.
APTS: enable people to leave their car behind and travel more sustainably - and be more inclusive for those who can’t afford to run a car.
AVCS: encompass a variety of technologies which seek to prevent accidents by offering advanced in-vehicle technological assistance.
The problem of localization is a challenging task, and yet extremely crucial for many applications. While GNSS (such as GPS, or Galileo) solves the problem of localization for wide area of applications, the problem persists in many other cases like if satellite coverage is not available (skyscraper, tunnel), or the accuracy level is not sufficient. In such case, Invoking other devices and combining information from multiple sources may be considered as a potential solution.
To start with I'll introduce localization algorithms, Then I'll show how the future internet paradigm promotes the implementation of these algorithms, Finally I’ll focus on Web service composition, And, I'll conclude by a brief summary
Deterministic: One/Multi hop; Probabilistic
In one hop localization, the location to find reaches directly the anchors, which are nodes that already know their position. That may be done through trilateration: it means by measuring distance to anchors. Or by triangulation: it means by measuring angles to it known points at either end of fixed baseline.
An important characteristic of radio propagation is the increased attenuation of the radio signal as the distance between the transmitter and receiver increases. Propagation model methods analyze the relationship between RSS values and distances, to get the path loss exponent of the propagation model. The propagation model is then applied to convert the signal strength to the estimated distance between transmitter and receiver.
Time based are the most used ToA, also called Time of Flight
Require highly accurate synchronized timers
TDOA=(First signal is used to measure TOA of the second one.)
MDS uses the law of trigonometry and linear algebra to reconstruct the relative positions of the points based on the pairwise distances. It performs well on RSS data. The main problem with MDS, however, is its poor asymptotic performance, which is O(n3).
in SDP, geometric constraints between nodes are represented as linear matrix inequalities (LMIs). then LMIs can be combined to form a single semi-definite program, which is solved to produce a bounding region for each node.
BBL is based on progressive propagation of location information from beacons to an entire network (Top down manner),
CSS use bottom up approach in which localization is originated in a local group of nodes in relative coordinates. By gradually merging such local maps, it finally achieves entire network localization in global coordinates.
Kalman filter localization represents the belief state using a single, well-defined Gaussian probability density function, and thus retains just a 𝜇 and 𝜎 parameters about position with respect to the map.
Updating the parameters of the Gaussian distribution is all that is required.
Mu= mean value (likely position)
Sigma=proportional to the uncertainty
Markov localization allows for localization starting from any unknown position and can thus recover from ambiguous situations because the device can track multiple, completely disparate possible positions
Loclization
The following graph shows an exponential increase of connected devices, even though, the estimated world population increase is as low as 10%, the proliferation of wireless and mobile devices will allow many novel localization solution. Various technologies are used for location computation, and Any connected device can play the role of an anchor, or a gateway that may help to resolve the localization problem,
http://net.educause.edu/ir/library/pdf/ELI7047.pdf
I’ll start by identifying the challenges in current internet, then I’ll introduce the semantic web, ie the web that can be processed by machines, And I’ll show dbpedia as an example of shared db processable by machine, and I’ll show how machine can request information from it through sparql.
In his speech at the annual conference of the National Advertisers Association in 2005, Eric Schmidt, Google CEO, said that, from the data recorded by the search engine, it seems that, at this specific moment, the Internet is made up of 5 million terabytes. Even Google, which is considered currently the best search engine ever, has succeeded to index only 170 terabytes up until now (0,000034%). Google has been indexing information for 7 years, and if you want to have an idea on how fast this process is, it seems that, in order to index the 5 million terabytes of data, the search engine would need 300 years. And this would be valid only if nobody posted new content on the Internet!
[http://news.softpedia.com/news/How-Big-Is-the-Internet-10177.shtml]
Semantic= Sense + Meaning: study of interpretation of signs or symbols
Conceptualization: abstract model (domain, identified relevant concepts, relations)
Explicit: meaning of all concept must be clearly defined
Formal: machine redable/understandable
Shared: consensus about ontology (different people have different perceptions)
_______________
Top level: (Upper Ontology, Foundation Ontology) general, cross domain ontologies (represent very general concepts as e.g., Time, Space, Event independent of a specific domain or problem.)
Domain: fundamental concepts according to a generic domain.
Task: fundamental concepts according to a general activity or task.
Application: specialized ontology focused on a specific task and domain.
(HPI-4.4)
http://www.integrail.eu/documents/fs02.pdf
RDF provides a general, flexible method to decompose any knowledge into small pieces, called triples:
Goal: Express information as a list of statements in the form SUBJECT PREDICATE OBJECT
The subject and object are names for two things in the world, and the predicate is the name of a relation between the two.
• Subject is a resource
• Predicate is a resource
• Object is either a resource or a literal
Each object is an instance of an abstract family, which inherit from a more general family of concept.
RDFS is a set of classes with certain properties using the RDF extensible knowledge representation language, providing basic elements for the description of ontologies (otherwise called RDF vocabularies) intended to structure RDF resources.
Officially called: RDF Vocabulary Description Language
Limit of rdfs:
Locality of global properties: Cows only eat vegetables/Other animals also eat meat.
Disjunctive Classes: person is either male/female
Cardinality Restrictions: Every human has exactly two parents
Controlled Vocabulary: finite list of terms (e.g. catalogue)
Glossary: finite list of terms including an informal definition of their semantics in natural language
Thesauri: [greek. „treasure, treasure house“] controlled vocabulary, concepts are connected via relations.
(In)formal IS-A-Hierarchy: explicite hierarchy of classes, subclass relations are (not) strict
If a user or an operator of a traffic monitoring system needs to know specific information about the accidents occurred in a certain road, he will probably wants to know details about the vehicles involved, types of roads, etc. and therefore this type of question will not only involve one knowledge source but several.
Since ontologies are directly interpreted by the computer, we can ask questions more than basic shortest path, like: which is the best path that can be used by different users: (pedestrian, motorcycle, bus or a heavy truck)? Which roads can be used as alternative routes, with regards to particular constraint?
(traveller information systems)
The DBpedia data set uses a large multi-domain ontology which has been derived from Wikipedia. The English version of the DBpedia 3.9 data set currently describes 4.0 million “things” with 470 million “facts”. In addition, DBpedia provide localized versions of DBpedia in 119 languages. All these versions together describe 24.9 million things, out of which 16.8 million overlap (are interlinked) with concepts from the English DBpedia.
DBPedia plays a central role as it makes the content of Wikipedia available in RDF.
By the same way, we can write a query to look for all the available device that feature – for example - both gps & wifi within a predefined range, in order to use them as anchors.
http://linkedgeodata.org/OnlineAccess/SparqlEndpoints
Web services were introduced in 1998 as an alternative for CORBA, it encapsulates a SOAP message over XML file through http protocol. The entire configuration is stored in a wsdl file.
HTTP and TCP are considered too heavy for devices such as sensors. UDP is preferred for light queries and HTTP can be simplified to make the parsing of data messages easier and also to reduce its overhead.
2010 IETF started a new working group on Constrained RESTful Environments (CoRE). It has two goals:
- The CoAP (constraint application protocol) protocol is a way of structuring the exchange of information based on the representational state transfer (REST) paradigm but optimized for M2M applications.
- The group will also define a set of security bootstrapping methods for use in constrained environments in order to associate devices and set up keying material for secure operation.
Composition Specification Language: extends UML activity diagrams with an ontological description of the composition request.
Now I am going to summarize what I have just been talking about.
I hope I have been able to explain all aspects of our my work. If there are any questions left, I’m very willing to answer them.