Vehicular ad-hoc network (VANET), identified as a mobile ad hoc network MANETs with several added constraints. Basically, in VANETs, the network is established on the fly based on the availability of vehicles on roads and supporting infrastructures along the roads, such as base stations. Vehicles and road-side infrastructures are required to provide communication facilities, particularly when enough vehicles are not available on the roads for effective communication. VANETs are crucial for providing a wide range of safety and non-safety applications to road users. However, the specific fundamental problem in VANET is the challenge of creating effective communication between two fast-moving vehicles. Therefore, message routing is an issue for many safety and non-safety of VANETs applications. The challenge in designing a robust but reliable message dissemination technique is primarily due to the stringent QoS requirements of the VANETs safety applications. This paper investigated various methods and conducted literature on an idea to develop a model for efficient and reliable message dissemination routing techniques in VANET.
Efficient and stable route selection by using cross layer concept for highly...Roopali Singh
Efficient and stable route selection by using cross layer concept for highly mobile network with predictive features by Rupali Singh, Gajendra Singh Dhakad
published in International Journal of Research & Technology, Volume 3, Issue 4_November_2015
The exponential rise in wireless communication systems and allied applications has revitalized academiaindustries to achieve more efficient data transmission system to meet Quality-of-Service (QoS) demands. Amongst major wireless communication techniques, Mobile Ad-hoc Network (MANET) is found potential to provide decentralized and infrastructure less communication among multiple distributed nodes across network region. However, dynamic network conditions such as changing topology, congestion, packet drop, intrusion possibilities etc often make MANET’s routing a tedious task. On the other hand, mobile network feature broadens the horizon for intruders to penetrate the network and causes performance degradation. Unlike classical MANET protocols where major efforts have been made on single network parameter based routing decision, this research paper proposes a novel Elitist Genetic Algorithm (EGA) Multi-Objective Optimization assisted Network Condition Aware QoS-Routing Protocol for Mobile Ad-hoc Networks (MNCQM). Our proposed MNCQM protocol exhibits two phase implementation where at first it performs node-profiling under dynamic network topology for which three factors; irregular MAC information exchange, queuing overflow and topological variations have been considered. Towards this objective node features like Packet Forwarding Probability (PFP) at the MAC layer, Success Probability of Data Transmission (SPDT) of a neighboring node, and Probability of Successful Data Delivery (PSDD) have been obtained to estimate Node-Trustworthiness Index (NTI), which is further used to eliminate untrustworthy nodes. In the second phase of implementation, a novel Evolutionary Computing assisted nondisjoint best forwarding path selection model is developed that exploits node’s and allied link’s connectivity and availability features to identify the quasi-sub-optimal forwarding paths. EGA algorithm intends to reduce hop-counts, connectivity-loss and node or link unavailability to estimate best forwarding node. One key feature of the proposed model is dual-supplementary forwarding path selection that enables alternate path formation in case of link outage and thus avoids any iterative network discovery phase.
INTELLIGENT INFORMATION DISSEMINATION IN VEHICULAR AD HOC NETWORKSijasuc
Vehicular Ad hoc Networks (VANETs) are a compelling application of ad hoc networks, because of the
potential to access specific context information (e.g. traffic conditions, service updates, route planning)
and deliver multimedia services (VOIP, in-car entertainment, instant messaging, etc.). In this paper, we
propose an agent based intelligent information dissemination model for VANETs. Safety information like
cooperative driving, accident, road condition warnings, etc. play a major role for applications of VANET.
Safety information dissemination poses a major challenge of delay-sensitive nature. This paper proposes
an agent based model for intelligent information dissemination in VANETs. Proposed model uses
cognitive agent concept for realizing intelligent information dissemination. To test the efficiency of the
model, proposed scheme is simulated using NS-2 simulator. Some of the performance parameters
analyzed are bandwidth utilized, push latency and push/pull decision latency.
Rough set based QoS enabled multipath source routing in MANET IJECEIAES
The single constrained Quality of Service (QoS) routing in Mobile Ad-hoc NETwork (MANET) is disastrous in consideration of MANET characteristics, inference, collision and link failure as it maintains a single path. The QoS enabled routing yields better packet delivery and maintains consistency among nodes in the network by incorporating multi-constrained and multipath routing. The Dynamic Source Routing (DSR) is best suited source routing algorithm to maintain multipath information at the source node, but performance degrades with larger number of mobile nodes. Multilayer mechanism should be incorporated to maintain QoS metric information spreads across multiple layers of TCP/IP protocol stack. The proposed multipath QoS enabled source routing provides balanced routing by making use of all these features. The imprecise decision making strategy called Rough Set Theory (RST) is used at destination node for decision making. The Route REQuest (RREQ) messages coming from different routes are filtered by considering the QoS metrics of each and every route by making use of RST. The Route REPly (RREP) messages are generated and delivered to the source node for filtered RREQ messages. The proposed routing algorithm will reduce load on the network by reducing number of control messages exchanged for route establishment. This will evenly distribute load among all the nodes and it also avoid the scenarios like few nodes starved for resources. Finally, multipath routing always provides alternate routing option in case of route failure.
Efficient and stable route selection by using cross layer concept for highly...Roopali Singh
Efficient and stable route selection by using cross layer concept for highly mobile network with predictive features by Rupali Singh, Gajendra Singh Dhakad
published in International Journal of Research & Technology, Volume 3, Issue 4_November_2015
The exponential rise in wireless communication systems and allied applications has revitalized academiaindustries to achieve more efficient data transmission system to meet Quality-of-Service (QoS) demands. Amongst major wireless communication techniques, Mobile Ad-hoc Network (MANET) is found potential to provide decentralized and infrastructure less communication among multiple distributed nodes across network region. However, dynamic network conditions such as changing topology, congestion, packet drop, intrusion possibilities etc often make MANET’s routing a tedious task. On the other hand, mobile network feature broadens the horizon for intruders to penetrate the network and causes performance degradation. Unlike classical MANET protocols where major efforts have been made on single network parameter based routing decision, this research paper proposes a novel Elitist Genetic Algorithm (EGA) Multi-Objective Optimization assisted Network Condition Aware QoS-Routing Protocol for Mobile Ad-hoc Networks (MNCQM). Our proposed MNCQM protocol exhibits two phase implementation where at first it performs node-profiling under dynamic network topology for which three factors; irregular MAC information exchange, queuing overflow and topological variations have been considered. Towards this objective node features like Packet Forwarding Probability (PFP) at the MAC layer, Success Probability of Data Transmission (SPDT) of a neighboring node, and Probability of Successful Data Delivery (PSDD) have been obtained to estimate Node-Trustworthiness Index (NTI), which is further used to eliminate untrustworthy nodes. In the second phase of implementation, a novel Evolutionary Computing assisted nondisjoint best forwarding path selection model is developed that exploits node’s and allied link’s connectivity and availability features to identify the quasi-sub-optimal forwarding paths. EGA algorithm intends to reduce hop-counts, connectivity-loss and node or link unavailability to estimate best forwarding node. One key feature of the proposed model is dual-supplementary forwarding path selection that enables alternate path formation in case of link outage and thus avoids any iterative network discovery phase.
INTELLIGENT INFORMATION DISSEMINATION IN VEHICULAR AD HOC NETWORKSijasuc
Vehicular Ad hoc Networks (VANETs) are a compelling application of ad hoc networks, because of the
potential to access specific context information (e.g. traffic conditions, service updates, route planning)
and deliver multimedia services (VOIP, in-car entertainment, instant messaging, etc.). In this paper, we
propose an agent based intelligent information dissemination model for VANETs. Safety information like
cooperative driving, accident, road condition warnings, etc. play a major role for applications of VANET.
Safety information dissemination poses a major challenge of delay-sensitive nature. This paper proposes
an agent based model for intelligent information dissemination in VANETs. Proposed model uses
cognitive agent concept for realizing intelligent information dissemination. To test the efficiency of the
model, proposed scheme is simulated using NS-2 simulator. Some of the performance parameters
analyzed are bandwidth utilized, push latency and push/pull decision latency.
Rough set based QoS enabled multipath source routing in MANET IJECEIAES
The single constrained Quality of Service (QoS) routing in Mobile Ad-hoc NETwork (MANET) is disastrous in consideration of MANET characteristics, inference, collision and link failure as it maintains a single path. The QoS enabled routing yields better packet delivery and maintains consistency among nodes in the network by incorporating multi-constrained and multipath routing. The Dynamic Source Routing (DSR) is best suited source routing algorithm to maintain multipath information at the source node, but performance degrades with larger number of mobile nodes. Multilayer mechanism should be incorporated to maintain QoS metric information spreads across multiple layers of TCP/IP protocol stack. The proposed multipath QoS enabled source routing provides balanced routing by making use of all these features. The imprecise decision making strategy called Rough Set Theory (RST) is used at destination node for decision making. The Route REQuest (RREQ) messages coming from different routes are filtered by considering the QoS metrics of each and every route by making use of RST. The Route REPly (RREP) messages are generated and delivered to the source node for filtered RREQ messages. The proposed routing algorithm will reduce load on the network by reducing number of control messages exchanged for route establishment. This will evenly distribute load among all the nodes and it also avoid the scenarios like few nodes starved for resources. Finally, multipath routing always provides alternate routing option in case of route failure.
The congestion control within the TCP (Transmission Control Protocol) plays a critical role in
amending data rate to evade congestion from happening possibilities. Based on TCP communication sender
not only guarantees the successful packet delivery, but also maintains the correct sequence of packets by
receiving the frequent acknowledgement from the receiver. In this research we proposed a congestion
control scheme with modified TCP and queue length variation with OLSR routing protocol in MANET. The
TCP protocol performance is modified by forwarding busy channel signals to predecessor nodes through
intermediate nodes in network. The congestion is controlled by that novel method of detecting the node is
busy or ready for communication. If the communication is start in network and the possibility if congestion
is arise, then in that case the queue length is handle the possibility of congestion. The congestion is
minimized due to awaring about the channel busy status and nodes buffer status or queue status. The TCP
protocol is able to handle the congestion situation but i.e. completely based on acknowledgement of receiver
and also not very effective to control it. The proposed TCP congestion control OLSR routing is improves
the network performance by reducing packet loss. The performance of network is measure through
performance metrics like throughput, PDF and Routing overhead in different node density scenarios. The
performance of proposed scheme is provides the better results.
MAR SECURITY: IMPROVED SECURITY MECHANISM FOR EMERGENCY MESSAGES OF VANET USI...IJCNCJournal
Vehicular Ad-hoc network (VANET) is one of the emerging technologies for research community to get various research challenges to construct secured framework for autonomous vehicular communication. The prime concern of this technology is to provide efficient data communication among registered vehicle nodes. The several research ideas are implemented practically to improve overall communication in VANETs by considering security and privacy as major aspects of VANETs. Several mechanisms have been implemented using cryptography algorithms and methodologies. However, these mechanisms provide a solution only for some restricted environments and to limited security threats. Hence, the proposed novel mechanism has been introduced, implemented and tested using key management technique. It provides secured network environment for VANET and its components. Later, this mechanism provides security for data packets of emergency messages using cryptography mechanism. Hence, the proposed novel mechanism is named Group Key Management & Cryptography Schemes (GKMC). The experimental analysis shows significant improvements in the network performance to provide security and privacy for emergency messages. This GKMC mechanism will help the VANET user’s to perform secured emergency message communication in network environment.
Packet Transfer Rate & Robust Throughput for Mobile Adhoc NetworkEswar Publications
An ad-hoc wireless network is highly different considering dynamic stochastic process of its underlying links, leads to link breaks during data transaction. Hence, to provide free flow data transaction, many routing algorithms have the property of link recovery and maintenance procedures to minimize the loss of data during transmission. However these routing method do not guarantee reliable data transmission in some special application conditions with wide requirements on Packet delivery ratio and link quality of the network. Routing is a critical issue in MANET and hence the focus of this paper is the performance analysis of different routing protocols used in the
wireless network. We evaluate the ability of a mobile ad hoc wireless network to distribute flows across robust routes by introducing the robust throughput measure as a performance metric. The utility gained by the delivery of flow messages is based on the level of interruption experienced by the underlying transaction. We describe the mathematical calculation of a network’s robust throughput measure, as well as its robust throughput capacity. We introduce the robust flow admission and routing algorithm (RFAR) to provide for the timely and robust transport of flow transactions across mobile ad hoc wireless systems.
Adaptive QoS Multicast Routing with Mobility Prediction in MANETs ijasuc
A Mobile Ad hoc NETwork (MANET) is a collection of wireless mobile hosts that form a temporary network
without a centralized administration or wired infrastructure. Due to the high mobility of nodes, the network
topology of MANETs changes very fast, making it more difficult to find the routes that message packets use.
Network control with Quality of Service (QoS) support is a key issue for multimedia applications in MANET.
Most of the real time applications have stringent requirements on bandwidth, delay, delay-jitter, packet loss
ratio, cost and other QoS metrics. This paper proposes a Multi-constrained QoS routing with mobility
prediction protocol. If the node has enough resources to transmit data packets, it uses the Global
Positioning System (GPS) to get the location information of the mobile nodes and selects the routing path
with the maximum Route Expiration Time (RET). A set of static and mobile agents are used to find the
multicast routes and transmit the packets. Extensive simulations have been conducted to evaluate the
performance of MC_MAODV using Network Simulator (NS-2). The simulation results show that the
proposed protocol achieves good performance in terms of improving packet delivery ratio and minimizing
end-to-end delay.
An effective transmit packet coding with trust-based relay nodes in VANETsjournalBEEI
Vehicular ad-hoc networks (VANETs) are characterized by limited network resources such as limited bandwidth and battery capacity. Hence, it is necessary that unnecessary use of network resources (such as unnecessary packet transfers) is reduced in such networks so that the available power can be conserved for efficient multicast communications. In this paper, we have presented a Transmit Packet Coding (TPC) Network Coding in VANET to ensure reliable and efficient multicasting. With network coding, the number of transmitted packets over the network can be reduced, ensuring efficient utilization of network devices and resources. Here, the trust-based graph optimization is performed using Cuckoo search algorithm to select the secure relay nodes. The experimental results showed the superiority of the presented approach compared to the existing techniques in terms of throughput, latency, hop delay, packet delivery ratio, network decoder outage probability, and block error rate.
Traffic Congestion Prediction using Deep Reinforcement Learning in Vehicular ...IJCNCJournal
In recent years, a new wireless network called vehicular ad-hoc network (VANET), has become a popular research topic. VANET allows communication among vehicles and with roadside units by providing information to each other, such as vehicle velocity, location and direction. In general, when many vehicles likely to use the common route to proceed to the same destination, it can lead to a congested route that should be avoided. It may be better if vehicles are able to predict accurately the traffic congestion and then avoid it. Therefore, in this work, the deep reinforcement learning in VANET to enhance the ability to predict traffic congestion on the roads is proposed. Furthermore, different types of neural networks namely Convolutional Neural Network (CNN), Multilayer Perceptron (MLP) and Long Short-Term Memory (LSTM) are investigated and compared in this deep reinforcement learning model to discover the most effective one. Our proposed method is tested by simulation. The traffic scenarios are created using traffic simulator called Simulation of Urban Mobility (SUMO) before integrating with deep reinforcement learning model. The simulation procedures, as well as the programming used, are described in detail. The performance of our proposed method is evaluated using two metrics; the average travelling time delay and average waiting time delay of vehicles. According to the simulation results, the average travelling time delay and average waiting time delay are gradually improved over the multiple runs, since our proposed method receives feedback from the environment. In addition, the results without and with three different deep learning algorithms, i.e., CNN, MLP and LSTM are compared. It is obvious that the deep reinforcement learning model works effectively when traffic density is neither too high nor too low. In addition, it can be concluded that the effective algorithms for traffic congestion prediction models in descending order are MLP, CNN, and LSTM, respectively.
New adaptation method based on cross layer and TCP over protocols to improve ...IJECEIAES
Due to rapid growth of multimedia traffic used over the mobile ad-hoc networks (MANETs), to keep up with the progress of this constraint MANETs protocols becoming increasingly concerned with the quality of service. In view of the random mobility nodes in MANET, TCP becomes more unreliability in case of higher energy consumption and packet loss. In this paper we proposed a new optimization approach to enhance decision making of TCP based on some changes of IEEE 802.11 MAC uses cross layer approach. The aim is to minimize the impact of retransmissions of packet lost and energy consumption in order to analyse and chose the appropriate routing protocol for TCP that can be enhance QoS MANET. Our simulation results based QoS study using NS3 show that, our proposal achieved better performance of TCP in MANETs significantly, and also improved the throughput, energy consumption and facilitates the traffic transmission over routing protocol.
ENERGY EFFICIENT NODE RANK-BASED ROUTING ALGORITHM IN MOBILE AD-HOC NETWORKSIJCNCJournal
Mobile Ad-hoc Network (MANET) is an emerging technology, infrastructure less with self-organizing, selfhealing, multi-hop wireless routing networks in real time. In such networks, many routing problems arise due to complexity in the network mobility which results from difficulty in achieving energy efficient routing
in the field of MANET. Due to the dynamic nature and the limited battery energy of the mobile nodes, the communication links between intermediate relay nodes may fail frequently, thus affecting the routing performance of the network and also the availability of the nodes. Though existing protocols are not
concentrating about communication links and battery energy, node links are very important factor for improving quality of routing protocols because Node Rank helps us to determine whether the node is within transmission range or out of transmission range through considering residual energy of the node during the routing process. This paper proposes a novel Energy Efficient Node Rank-based Routing (EENRR)
algorithm which includes certain performance metrics such as control overhead and residual energy in order to improve the Packet Delivery Ratio (PDR), and Network Life Time (NLT) from its originally observed routing performance obtained through other existing protocols. Simulation results show that, when the number of nodes increases from 10 to 100 nodes, EENRR algorithm increases the average residual energy by 31.08% and 21.26% over the existing Dynamic Source Routing (DSR) and Energy Efficient Delay Time Routing (EEDTR) protocols, respectively. Similarly it increases the PDR by 45.38% and 28.3% over the existing DSR and EEDTR protocols respectively.
Trust Based Scheme for QoS Assurance in Mobile Ad-Hoc NetworksIJNSA Journal
A mobile ad-hoc network (MANET) is a peer-to-peer wireless network where nodes can communicate with each other without the use of infrastructure such as access points or base stations. These networks are self-configuring, capable of self-directed operation and hastily deployable. Nodes cooperate to provide connectivity, operates without centralized administration. Nodes are itinerant, topology can be very dynamic and nodes must be able to relay traffic since communicating nodes might be out of range. The dynamic nature of MANET makes network open to attacks and unreliability. Routing is always the most significant part for any networks. Each node should not only work for itself, but should be cooperative with other nodes. Node misbehaviour due to selfish or malicious intention could significantly degrade the performance of MANET. The Qos parameters like PDR, throughput and delay are affected directly due to such misbehaving nodes. We focus on trust management framework, which is intended to cope with misbehaviour problem of node and increase the performance of MANETs. A trust-based system can be used to track this misbehaving of nodes, spot them and isolate them from routing and provide reliability. In this paper a Trust Based Reliable AODV [TBRAODV] protocol is presented which implements a trust value for each node. For every node trust value is calculated and based trust value nodes are allowed to participate in routing or else identified to become a misbehaving node. This enhances reliability in AODV routing and results in increase of PDR, decrease in delay and throughput is maintained. This work is implemented and simulated on NS-2. Based on simulation results, the proposed protocol provides more consistent and reliable data transfer compared with general AODV, if there are misbehaving nodes in the MANET.
ECA MODEL BASED QOS AODV ROUTING FOR MANETSIJCNCJournal
Applications like banking, interactive multimedia, movie on demand, VOIP, etc., are delay sensitive by
nature. The QoS given to users will be affected by network delay, which can be mitigated by employing
QoS routing and efficient data transfer. To build routing table, normal AODV routing uses flooding
technique, which will not consider QoS requirements. Hence QoS based routing which is stable for the
entire application is essential, which understands the dynamic nature of the MANET and establishes the
required route, in minimum possible time. We have proposed an intelligent routing protocol based ECA
model and AODV for establishing QoS route.
The simulation results shows that the ECA model gives better results, while considering the local
connectivity time, source to destination connectivity time, number of data packets successfully delivered to
the destination, local and global error correction time, compared to AODV.
Evaluation The Performance of MAODV and AODV Protocols In VANETs ModelsCSCJournals
This paper to study, analyse the performance of multicast technology using the MAODV (Multicast On-demand Distance Vector Routing Protocol) in the VANETs (Vehicle Ad-Hoc Networks), this protocol using widely in MANETs (Mobile Ad-Hoc Network). The wireless nodes in the wireless vehicle networks are the same wireless devices, which are integrated with a sensor and designed specifically for the design of safety, privacy and security applications. Researchers are interested in developing and enhancing the number of service quality parameters (packets received, delay, productivity, node power consumption, etc.). The aim of this paper is to introduce and optimize VANETS multi-cast transmission technology to reduce delay, increase throughput and reduce packet loss. Although, presents an analytical study of the Enhanced Protocol (MAODV) Protocol (AODV) and compares it to AODV performance in VANETs.
A QUALITY OF SERVICE ARCHITECTURE FOR RESOURCE PROVISIONING AND RATE CONTROL ...ijasuc
Prioritized flow control is a type of QoS provisioning in which each class is provided a different QoS by
assigning priority to one class over another in terms of allocating resources. It is an effective means to
provide service differentiation to different class of service in mobile ad hoc networks. So the objective is to
achieve a desired level of service to high-priority flows so that the wireless medium is completely utilized
using adaptive rate control. In this paper, we propose to design QoS architecture for Bandwidth
Management and Rate Control in MANET. Our proposed QoS architecture contains an adaptive
bandwidth management technique which measures the available bandwidth at each node in real-time and
it is then propagated on demand by the QoS routing protocol. The source nodes perform call admission
control for different priority of flows based on the bandwidth information provided by the QoS routing.
The network bandwidth utilization is monitored continuously and network congestion is detected in
advance. Then a rate control mechanism is used to regulate best-effort traffic.
An Efficient and Stable Routing Algorithm in Mobile Ad Hoc NetworkIJCNCJournal
Mobile Ad hoc Network (MANET) is mainly designed to set up communication among devices in infrastructure-less wireless communication network. Routing in this kind of communication network is highly affected by its restricted characteristics such as frequent topological changes and limited battery power. Several research works have been carried out to improve routing performance in MANET. However, the overall performance enhancement in terms of packet delivery, delay and control message overhead is still not come into the wrapping up. In order to overcome the addressed issues, an Efficient and Stable-AODV (EFST-AODV) routing scheme has been proposed which is an improvement over AODV to establish a better quality route between source and destination. In this method, we have modified the route request and route reply phase. During the route request phase, cost metric of a route is calculated on the basis of parameters such as residual energy, delay and distance. In a route reply phase, average residual energy and average delay of overall path is calculated and the data forwarding decision is taken at the source node accordingly. Simulation outcomes reveal that the proposed approach gives better results in terms of packet delivery ratio, delay, throughput, normalized routing load and control message overhead as compared to AODV.
Energy- Aware QoS Based Routing Protocols for Heterogeneous WSNs: A Survey ...............................1
Sridevi S., Rumeniya G. and Usha M.
Optimization of Outsourcing ICT Projects in Public Organizations; Case Study: Public Center of Iranian
ICT Studies ................................................................................................................................................. 20
Majid Nili Ahmadabadi, Abbas Bagheri and Fariba Abolghasemi
An Optimized CBIR Using Particle Swarm Optimization Algorithm ......................................................... 40
Subhakala S., Bhuvana S. and Radhakrishnan R.
Study of Satisfaction Assessment Techniques for Textual Requirements .............................................. 56
K. S. Divya, R. Subha and Dr. S. Palaniswami
Survey of MAC Protocols for Heterogeneous Traffic in Wireless Sensor Networks ............................... 67
Sridevi S., Priyadharshini R. and Usha M.
Harnessing Social Media for Business Success. Case Study of Zimbabwe ............................................... 80
Musungwini Samuel, Zhou Tinashe Gwendolyn, Zhou Munyaradzi and Ruvinga Caroline
Quality Platforms for Innovation and Breakthrough................................................................................ 90
Dr. Hima Gupta
Development of Virtual Experiment on Waveform Conversion Using Virtual Intelligent SoftLab ...... 107
Bhaskar Y. Kathane
Quick Routing for Communication in MANET using Zone Routing Protocolijceronline
rnational Journal of Computational Engineering Resaerch 2014, Volume 4 ~ Issue 11 (November 2014)
Abstract
The paper discusses the voltage control of a critical load bus using dynamic voltage restorer (DVR) in a distribution system. The critical load requires a balanced sinusoidal waveform across its terminals preferably at system nominal frequency of 50Hz .It is assumed that the frequency of the supply voltage can be varied and it is different from the system nominal frequency. The DVR is operated such that it holds the voltage across critical load bus terminals constant at system nominal frequency irrespective of the frequency of the source voltage. In case of a frequency mismatch, the total real power requirement of the critical load bus has to be supplied by the DVR. Proposed method used to compensate for frequency variation, the DC link of the DVR is supplied through an uncontrolled rectifier that provides a path for the real power required by the critical load to flow .A simple frequency estimation technique is discussed which are Discrete Fourier transform (DFT), ANN controller. The present work study the compensation principle and different control strategies of DVR used here are based on DFT, and ANN Controller .Through detailed analysis and simulation studies using MATLAB. It is shown that the voltage is completely controlled across the critical load.
Multicast routing protocol for advanced vehicular ad hoc networksTELKOMNIKA JOURNAL
Transport sector has great impact on our daily life. Despite the huge number of vehicular models, driving process still faces many challenges due to the lack information about the roads and the surrounding sudden events, which can result in high number of accidents globally and especially in Saudi Arabia. A new technology, vehicular ad hoc networks (VANETs), has emerged to support Intelligent Transport System (ITS) and to offer advanced solutions for drivers to avoid different hazard events that occur on the road. In this paper, we discuss the multicast and broadcast communications in VANETs, Quality of Sevice (QoS) awaregroup addressing/managing solutions to VANETs which help inclassifying different application that explore and design a new cross-layer framework, aware of high mobility and efficiency.
A QUALITY OF SERVICE ARCHITECTURE FOR RESOURCE PROVISIONING AND RATE CONTROL ...ijasuc
Prioritized flow control is a type of QoS provisioning in which each class is provided a different QoS by
assigning priority to one class over another in terms of allocating resources. It is an effective means to
provide service differentiation to different class of service in mobile ad hoc networks. So the objective is to
achieve a desired level of service to high-priority flows so that the wireless medium is completely utilized
using adaptive rate control. In this paper, we propose to design QoS architecture for Bandwidth
Management and Rate Control in MANET. Our proposed QoS architecture contains an adaptive
bandwidth management technique which measures the available bandwidth at each node in real-time and
it is then propagated on demand by the QoS routing protocol. The source nodes perform call admission
control for different priority of flows based on the bandwidth information provided by the QoS routing.
The network bandwidth utilization is monitored continuously and network congestion is detected in
advance. Then a rate control mechanism is used to regulate best-effort traffic.
The congestion control within the TCP (Transmission Control Protocol) plays a critical role in
amending data rate to evade congestion from happening possibilities. Based on TCP communication sender
not only guarantees the successful packet delivery, but also maintains the correct sequence of packets by
receiving the frequent acknowledgement from the receiver. In this research we proposed a congestion
control scheme with modified TCP and queue length variation with OLSR routing protocol in MANET. The
TCP protocol performance is modified by forwarding busy channel signals to predecessor nodes through
intermediate nodes in network. The congestion is controlled by that novel method of detecting the node is
busy or ready for communication. If the communication is start in network and the possibility if congestion
is arise, then in that case the queue length is handle the possibility of congestion. The congestion is
minimized due to awaring about the channel busy status and nodes buffer status or queue status. The TCP
protocol is able to handle the congestion situation but i.e. completely based on acknowledgement of receiver
and also not very effective to control it. The proposed TCP congestion control OLSR routing is improves
the network performance by reducing packet loss. The performance of network is measure through
performance metrics like throughput, PDF and Routing overhead in different node density scenarios. The
performance of proposed scheme is provides the better results.
MAR SECURITY: IMPROVED SECURITY MECHANISM FOR EMERGENCY MESSAGES OF VANET USI...IJCNCJournal
Vehicular Ad-hoc network (VANET) is one of the emerging technologies for research community to get various research challenges to construct secured framework for autonomous vehicular communication. The prime concern of this technology is to provide efficient data communication among registered vehicle nodes. The several research ideas are implemented practically to improve overall communication in VANETs by considering security and privacy as major aspects of VANETs. Several mechanisms have been implemented using cryptography algorithms and methodologies. However, these mechanisms provide a solution only for some restricted environments and to limited security threats. Hence, the proposed novel mechanism has been introduced, implemented and tested using key management technique. It provides secured network environment for VANET and its components. Later, this mechanism provides security for data packets of emergency messages using cryptography mechanism. Hence, the proposed novel mechanism is named Group Key Management & Cryptography Schemes (GKMC). The experimental analysis shows significant improvements in the network performance to provide security and privacy for emergency messages. This GKMC mechanism will help the VANET user’s to perform secured emergency message communication in network environment.
Packet Transfer Rate & Robust Throughput for Mobile Adhoc NetworkEswar Publications
An ad-hoc wireless network is highly different considering dynamic stochastic process of its underlying links, leads to link breaks during data transaction. Hence, to provide free flow data transaction, many routing algorithms have the property of link recovery and maintenance procedures to minimize the loss of data during transmission. However these routing method do not guarantee reliable data transmission in some special application conditions with wide requirements on Packet delivery ratio and link quality of the network. Routing is a critical issue in MANET and hence the focus of this paper is the performance analysis of different routing protocols used in the
wireless network. We evaluate the ability of a mobile ad hoc wireless network to distribute flows across robust routes by introducing the robust throughput measure as a performance metric. The utility gained by the delivery of flow messages is based on the level of interruption experienced by the underlying transaction. We describe the mathematical calculation of a network’s robust throughput measure, as well as its robust throughput capacity. We introduce the robust flow admission and routing algorithm (RFAR) to provide for the timely and robust transport of flow transactions across mobile ad hoc wireless systems.
Adaptive QoS Multicast Routing with Mobility Prediction in MANETs ijasuc
A Mobile Ad hoc NETwork (MANET) is a collection of wireless mobile hosts that form a temporary network
without a centralized administration or wired infrastructure. Due to the high mobility of nodes, the network
topology of MANETs changes very fast, making it more difficult to find the routes that message packets use.
Network control with Quality of Service (QoS) support is a key issue for multimedia applications in MANET.
Most of the real time applications have stringent requirements on bandwidth, delay, delay-jitter, packet loss
ratio, cost and other QoS metrics. This paper proposes a Multi-constrained QoS routing with mobility
prediction protocol. If the node has enough resources to transmit data packets, it uses the Global
Positioning System (GPS) to get the location information of the mobile nodes and selects the routing path
with the maximum Route Expiration Time (RET). A set of static and mobile agents are used to find the
multicast routes and transmit the packets. Extensive simulations have been conducted to evaluate the
performance of MC_MAODV using Network Simulator (NS-2). The simulation results show that the
proposed protocol achieves good performance in terms of improving packet delivery ratio and minimizing
end-to-end delay.
An effective transmit packet coding with trust-based relay nodes in VANETsjournalBEEI
Vehicular ad-hoc networks (VANETs) are characterized by limited network resources such as limited bandwidth and battery capacity. Hence, it is necessary that unnecessary use of network resources (such as unnecessary packet transfers) is reduced in such networks so that the available power can be conserved for efficient multicast communications. In this paper, we have presented a Transmit Packet Coding (TPC) Network Coding in VANET to ensure reliable and efficient multicasting. With network coding, the number of transmitted packets over the network can be reduced, ensuring efficient utilization of network devices and resources. Here, the trust-based graph optimization is performed using Cuckoo search algorithm to select the secure relay nodes. The experimental results showed the superiority of the presented approach compared to the existing techniques in terms of throughput, latency, hop delay, packet delivery ratio, network decoder outage probability, and block error rate.
Traffic Congestion Prediction using Deep Reinforcement Learning in Vehicular ...IJCNCJournal
In recent years, a new wireless network called vehicular ad-hoc network (VANET), has become a popular research topic. VANET allows communication among vehicles and with roadside units by providing information to each other, such as vehicle velocity, location and direction. In general, when many vehicles likely to use the common route to proceed to the same destination, it can lead to a congested route that should be avoided. It may be better if vehicles are able to predict accurately the traffic congestion and then avoid it. Therefore, in this work, the deep reinforcement learning in VANET to enhance the ability to predict traffic congestion on the roads is proposed. Furthermore, different types of neural networks namely Convolutional Neural Network (CNN), Multilayer Perceptron (MLP) and Long Short-Term Memory (LSTM) are investigated and compared in this deep reinforcement learning model to discover the most effective one. Our proposed method is tested by simulation. The traffic scenarios are created using traffic simulator called Simulation of Urban Mobility (SUMO) before integrating with deep reinforcement learning model. The simulation procedures, as well as the programming used, are described in detail. The performance of our proposed method is evaluated using two metrics; the average travelling time delay and average waiting time delay of vehicles. According to the simulation results, the average travelling time delay and average waiting time delay are gradually improved over the multiple runs, since our proposed method receives feedback from the environment. In addition, the results without and with three different deep learning algorithms, i.e., CNN, MLP and LSTM are compared. It is obvious that the deep reinforcement learning model works effectively when traffic density is neither too high nor too low. In addition, it can be concluded that the effective algorithms for traffic congestion prediction models in descending order are MLP, CNN, and LSTM, respectively.
New adaptation method based on cross layer and TCP over protocols to improve ...IJECEIAES
Due to rapid growth of multimedia traffic used over the mobile ad-hoc networks (MANETs), to keep up with the progress of this constraint MANETs protocols becoming increasingly concerned with the quality of service. In view of the random mobility nodes in MANET, TCP becomes more unreliability in case of higher energy consumption and packet loss. In this paper we proposed a new optimization approach to enhance decision making of TCP based on some changes of IEEE 802.11 MAC uses cross layer approach. The aim is to minimize the impact of retransmissions of packet lost and energy consumption in order to analyse and chose the appropriate routing protocol for TCP that can be enhance QoS MANET. Our simulation results based QoS study using NS3 show that, our proposal achieved better performance of TCP in MANETs significantly, and also improved the throughput, energy consumption and facilitates the traffic transmission over routing protocol.
ENERGY EFFICIENT NODE RANK-BASED ROUTING ALGORITHM IN MOBILE AD-HOC NETWORKSIJCNCJournal
Mobile Ad-hoc Network (MANET) is an emerging technology, infrastructure less with self-organizing, selfhealing, multi-hop wireless routing networks in real time. In such networks, many routing problems arise due to complexity in the network mobility which results from difficulty in achieving energy efficient routing
in the field of MANET. Due to the dynamic nature and the limited battery energy of the mobile nodes, the communication links between intermediate relay nodes may fail frequently, thus affecting the routing performance of the network and also the availability of the nodes. Though existing protocols are not
concentrating about communication links and battery energy, node links are very important factor for improving quality of routing protocols because Node Rank helps us to determine whether the node is within transmission range or out of transmission range through considering residual energy of the node during the routing process. This paper proposes a novel Energy Efficient Node Rank-based Routing (EENRR)
algorithm which includes certain performance metrics such as control overhead and residual energy in order to improve the Packet Delivery Ratio (PDR), and Network Life Time (NLT) from its originally observed routing performance obtained through other existing protocols. Simulation results show that, when the number of nodes increases from 10 to 100 nodes, EENRR algorithm increases the average residual energy by 31.08% and 21.26% over the existing Dynamic Source Routing (DSR) and Energy Efficient Delay Time Routing (EEDTR) protocols, respectively. Similarly it increases the PDR by 45.38% and 28.3% over the existing DSR and EEDTR protocols respectively.
Trust Based Scheme for QoS Assurance in Mobile Ad-Hoc NetworksIJNSA Journal
A mobile ad-hoc network (MANET) is a peer-to-peer wireless network where nodes can communicate with each other without the use of infrastructure such as access points or base stations. These networks are self-configuring, capable of self-directed operation and hastily deployable. Nodes cooperate to provide connectivity, operates without centralized administration. Nodes are itinerant, topology can be very dynamic and nodes must be able to relay traffic since communicating nodes might be out of range. The dynamic nature of MANET makes network open to attacks and unreliability. Routing is always the most significant part for any networks. Each node should not only work for itself, but should be cooperative with other nodes. Node misbehaviour due to selfish or malicious intention could significantly degrade the performance of MANET. The Qos parameters like PDR, throughput and delay are affected directly due to such misbehaving nodes. We focus on trust management framework, which is intended to cope with misbehaviour problem of node and increase the performance of MANETs. A trust-based system can be used to track this misbehaving of nodes, spot them and isolate them from routing and provide reliability. In this paper a Trust Based Reliable AODV [TBRAODV] protocol is presented which implements a trust value for each node. For every node trust value is calculated and based trust value nodes are allowed to participate in routing or else identified to become a misbehaving node. This enhances reliability in AODV routing and results in increase of PDR, decrease in delay and throughput is maintained. This work is implemented and simulated on NS-2. Based on simulation results, the proposed protocol provides more consistent and reliable data transfer compared with general AODV, if there are misbehaving nodes in the MANET.
ECA MODEL BASED QOS AODV ROUTING FOR MANETSIJCNCJournal
Applications like banking, interactive multimedia, movie on demand, VOIP, etc., are delay sensitive by
nature. The QoS given to users will be affected by network delay, which can be mitigated by employing
QoS routing and efficient data transfer. To build routing table, normal AODV routing uses flooding
technique, which will not consider QoS requirements. Hence QoS based routing which is stable for the
entire application is essential, which understands the dynamic nature of the MANET and establishes the
required route, in minimum possible time. We have proposed an intelligent routing protocol based ECA
model and AODV for establishing QoS route.
The simulation results shows that the ECA model gives better results, while considering the local
connectivity time, source to destination connectivity time, number of data packets successfully delivered to
the destination, local and global error correction time, compared to AODV.
Evaluation The Performance of MAODV and AODV Protocols In VANETs ModelsCSCJournals
This paper to study, analyse the performance of multicast technology using the MAODV (Multicast On-demand Distance Vector Routing Protocol) in the VANETs (Vehicle Ad-Hoc Networks), this protocol using widely in MANETs (Mobile Ad-Hoc Network). The wireless nodes in the wireless vehicle networks are the same wireless devices, which are integrated with a sensor and designed specifically for the design of safety, privacy and security applications. Researchers are interested in developing and enhancing the number of service quality parameters (packets received, delay, productivity, node power consumption, etc.). The aim of this paper is to introduce and optimize VANETS multi-cast transmission technology to reduce delay, increase throughput and reduce packet loss. Although, presents an analytical study of the Enhanced Protocol (MAODV) Protocol (AODV) and compares it to AODV performance in VANETs.
A QUALITY OF SERVICE ARCHITECTURE FOR RESOURCE PROVISIONING AND RATE CONTROL ...ijasuc
Prioritized flow control is a type of QoS provisioning in which each class is provided a different QoS by
assigning priority to one class over another in terms of allocating resources. It is an effective means to
provide service differentiation to different class of service in mobile ad hoc networks. So the objective is to
achieve a desired level of service to high-priority flows so that the wireless medium is completely utilized
using adaptive rate control. In this paper, we propose to design QoS architecture for Bandwidth
Management and Rate Control in MANET. Our proposed QoS architecture contains an adaptive
bandwidth management technique which measures the available bandwidth at each node in real-time and
it is then propagated on demand by the QoS routing protocol. The source nodes perform call admission
control for different priority of flows based on the bandwidth information provided by the QoS routing.
The network bandwidth utilization is monitored continuously and network congestion is detected in
advance. Then a rate control mechanism is used to regulate best-effort traffic.
An Efficient and Stable Routing Algorithm in Mobile Ad Hoc NetworkIJCNCJournal
Mobile Ad hoc Network (MANET) is mainly designed to set up communication among devices in infrastructure-less wireless communication network. Routing in this kind of communication network is highly affected by its restricted characteristics such as frequent topological changes and limited battery power. Several research works have been carried out to improve routing performance in MANET. However, the overall performance enhancement in terms of packet delivery, delay and control message overhead is still not come into the wrapping up. In order to overcome the addressed issues, an Efficient and Stable-AODV (EFST-AODV) routing scheme has been proposed which is an improvement over AODV to establish a better quality route between source and destination. In this method, we have modified the route request and route reply phase. During the route request phase, cost metric of a route is calculated on the basis of parameters such as residual energy, delay and distance. In a route reply phase, average residual energy and average delay of overall path is calculated and the data forwarding decision is taken at the source node accordingly. Simulation outcomes reveal that the proposed approach gives better results in terms of packet delivery ratio, delay, throughput, normalized routing load and control message overhead as compared to AODV.
Energy- Aware QoS Based Routing Protocols for Heterogeneous WSNs: A Survey ...............................1
Sridevi S., Rumeniya G. and Usha M.
Optimization of Outsourcing ICT Projects in Public Organizations; Case Study: Public Center of Iranian
ICT Studies ................................................................................................................................................. 20
Majid Nili Ahmadabadi, Abbas Bagheri and Fariba Abolghasemi
An Optimized CBIR Using Particle Swarm Optimization Algorithm ......................................................... 40
Subhakala S., Bhuvana S. and Radhakrishnan R.
Study of Satisfaction Assessment Techniques for Textual Requirements .............................................. 56
K. S. Divya, R. Subha and Dr. S. Palaniswami
Survey of MAC Protocols for Heterogeneous Traffic in Wireless Sensor Networks ............................... 67
Sridevi S., Priyadharshini R. and Usha M.
Harnessing Social Media for Business Success. Case Study of Zimbabwe ............................................... 80
Musungwini Samuel, Zhou Tinashe Gwendolyn, Zhou Munyaradzi and Ruvinga Caroline
Quality Platforms for Innovation and Breakthrough................................................................................ 90
Dr. Hima Gupta
Development of Virtual Experiment on Waveform Conversion Using Virtual Intelligent SoftLab ...... 107
Bhaskar Y. Kathane
Quick Routing for Communication in MANET using Zone Routing Protocolijceronline
rnational Journal of Computational Engineering Resaerch 2014, Volume 4 ~ Issue 11 (November 2014)
Abstract
The paper discusses the voltage control of a critical load bus using dynamic voltage restorer (DVR) in a distribution system. The critical load requires a balanced sinusoidal waveform across its terminals preferably at system nominal frequency of 50Hz .It is assumed that the frequency of the supply voltage can be varied and it is different from the system nominal frequency. The DVR is operated such that it holds the voltage across critical load bus terminals constant at system nominal frequency irrespective of the frequency of the source voltage. In case of a frequency mismatch, the total real power requirement of the critical load bus has to be supplied by the DVR. Proposed method used to compensate for frequency variation, the DC link of the DVR is supplied through an uncontrolled rectifier that provides a path for the real power required by the critical load to flow .A simple frequency estimation technique is discussed which are Discrete Fourier transform (DFT), ANN controller. The present work study the compensation principle and different control strategies of DVR used here are based on DFT, and ANN Controller .Through detailed analysis and simulation studies using MATLAB. It is shown that the voltage is completely controlled across the critical load.
Multicast routing protocol for advanced vehicular ad hoc networksTELKOMNIKA JOURNAL
Transport sector has great impact on our daily life. Despite the huge number of vehicular models, driving process still faces many challenges due to the lack information about the roads and the surrounding sudden events, which can result in high number of accidents globally and especially in Saudi Arabia. A new technology, vehicular ad hoc networks (VANETs), has emerged to support Intelligent Transport System (ITS) and to offer advanced solutions for drivers to avoid different hazard events that occur on the road. In this paper, we discuss the multicast and broadcast communications in VANETs, Quality of Sevice (QoS) awaregroup addressing/managing solutions to VANETs which help inclassifying different application that explore and design a new cross-layer framework, aware of high mobility and efficiency.
A QUALITY OF SERVICE ARCHITECTURE FOR RESOURCE PROVISIONING AND RATE CONTROL ...ijasuc
Prioritized flow control is a type of QoS provisioning in which each class is provided a different QoS by
assigning priority to one class over another in terms of allocating resources. It is an effective means to
provide service differentiation to different class of service in mobile ad hoc networks. So the objective is to
achieve a desired level of service to high-priority flows so that the wireless medium is completely utilized
using adaptive rate control. In this paper, we propose to design QoS architecture for Bandwidth
Management and Rate Control in MANET. Our proposed QoS architecture contains an adaptive
bandwidth management technique which measures the available bandwidth at each node in real-time and
it is then propagated on demand by the QoS routing protocol. The source nodes perform call admission
control for different priority of flows based on the bandwidth information provided by the QoS routing.
The network bandwidth utilization is monitored continuously and network congestion is detected in
advance. Then a rate control mechanism is used to regulate best-effort traffic.
A Proposal for End-to-End QoS Provisioning in Software-Defined NetworksIJECEIAES
This paper describes a framework application for the control plane of a network infras- tructure; the objective is to feature end-user applications with the capability of requesting at any time a customised end-to-end Quality-of-Service profile in the context of dynamic Service-Level-Agreements. Our solution targets current and future real-time applications that require tight QoS parameters, such as a guaranteed end-to-end delay bound. These applications include, but are not limited to, health-care, mobility, education, manufacturing, smart grids, gaming and much more. We discuss the issues related to the previous Integrated Service and the reason why the RSVP protocol for guaranteed QoS did not take off. Then we present a new signaling and resource reservation framework based on the cutting-edge network controller ONOS. Moreover, the presented system foresees the need of considering the edges of the network, where terminal applications are connected to, to be piloted by distinct logically centralised controllers. We discuss a possible inter-domain communication mechanism to achieve the end-to-end QoS guarantee.
DATA TRANSPARENT AUTHENTICATION USING QOD IN HYBRID NETWORKSEditor IJMTER
Hybrid networks are next generation of wireless networks that could be a
combination of Mobile wireless adhoc (MANET) networks and Wireless Infrastructure
networks. They are increasingly utilized in wireless communications that are extremely
supporting real time transmission with restricted Quality of Service. Invalid reservation and
race condition issues happens in MANET. In existing system, QoS-Oriented Distributed
routing protocol (QOD) is employed to boost the QoS support capability of hybrid networks,
it transforms the packet routing problem to resource scheduling problem that has 5
algorithms. They are, QoS guaranteed neighbor selection algorithm, Distributed packet
scheduling algorithm, Mobility based segment resizing algorithm, Traffic redundant
elimination algorithm and Data redundancy elimination based transmission algorithm. The
main drawback of hybrid networks is so far examined in minimum transmission hops and has
less beneficial feature with restricted number of mobile access points, mobility speeds, and
mobile workloads and with different network sizes. It will extremely perform on random
way point model and less in real mobility model. This paper present Data Transparent
Authentication to authenticates data streams by adjusting interpacket delay. Data Transparent
Authentication while not Communication overhead is an approach which reduces breakdown
of original information or sends out of band authentication data.
Adaptive Bandwidth Management Model for Wireless Mobile Ad-hoc NetworkIJCNCJournal
The quality of service (QoS) component in a mobile ad-hoc network has an active role in the current network scenario. In a dynamic mobile ad hoc network, ensuring optimum QoS with a scarce network resource is a significant challenge. To achieve QoS, it is essential to adopt some effective and efficient mechanisms. We have proposed an adaptive bandwidth manager model (ABMM) which uses a bandwidthsharing concept along with the flexible bandwidth reservation algorithm (FBRA) for an effective, quick and authentic data transfer. During real-time data transfer, to make communication effective, we make use of bandwidth-sharing network design problems and the concept of reserving bandwidth in high-performance networks. In our proposed model we are concentrating on the maximum utilization of resources, and using the scheduling concept to provide the minimum required bandwidth guarantee to QoS flows. Our goal is to reduce the delay in data transfer and enhance the throughput while properly utilizing the system resources. Our simulation result also shows that our model improves the network performance.
ADAPTIVE BANDWIDTH MANAGEMENT MODEL FOR WIRELESS MOBILE AD-HOC NETWORKIJCNCJournal
The quality of service (QoS) component in a mobile ad-hoc network has an active role in the current
network scenario. In a dynamic mobile ad hoc network, ensuring optimum QoS with a scarce network
resource is a significant challenge. To achieve QoS, it is essential to adopt some effective and efficient
mechanisms. We have proposed an adaptive bandwidth manager model (ABMM) which uses a bandwidthsharing concept along with the flexible bandwidth reservation algorithm (FBRA) for an effective, quick and
authentic data transfer. During real-time data transfer, to make communication effective, we make use of
bandwidth-sharing network design problems and the concept of reserving bandwidth in high-performance
networks. In our proposed model we are concentrating on the maximum utilization of resources, and using
the scheduling concept to provide the minimum required bandwidth guarantee to QoS flows. Our goal is to
reduce the delay in data transfer and enhance the throughput while properly utilizing the system resources.
Our simulation result also shows that our model improves the network performance.
Mobile Ad HOC networks (MANET’S) are networks in which all nodes are mobile and
communicate with each other via wireless connections. Nodes can join or leave the network at any
time. There is no fixed infrastructure. Research and industries are recently more interesting and
attracting to the VANET and MANET development domain. A vehicular ad hoc network (VANET)
is a subclass of MANET. In this paper, we propose Bee Routing Protocol for Ad Hoc Network, in
which a new quality of service multipath routing protocol adapted for the VANET. This algorithm is
a reactive source routing algorithm and consumes less energy as compared to DSDV, AODV, DSR
routing algorithms because a fewer control packets for routing are sent as compared to other
networks.
Real-World Multimedia Streaming for Software Defined Vehicular Ad Hoc NetworksIJCNCJournal
Multimedia services with required Quality of Service (QoS) is one of the most critical challenges in Software Defined Network (SDN) based Vehicular Ad-Hoc Networks (VANETs). It forms an essential part of the Intelligent Transport System (ITS), where infotainment services play an essential role. Streaming multimedia is one of the most popular applications and has a high demand for VANET infotainment services. The major issues for multimedia streaming on VANET are scalability, mobility of vehicles, frequent connection failures, frequent change in network topology, and distributed architecture with heterogeneous devices. To overcome these problems and provide a better QoS, we propose using a hybridarchitecture with a combination of VANET and SDN called Software-Defined Vehicular Networks (SDVN). This work presents a modified POX controller-based SDN framework for VANETs, especially for multimedia streaming applications in realistic traffic patterns. The proposed work has a real-world setup developed using Simulation of Urban Mobility (SUMO), where iPerf generates multimedia traffic. Also, streaming standard-definition YouTube videos in real-time between the vehicular nodes was done. The modified POX controller could take advantage of the centralised perspective of the network for action determination, and the integrated spanning tree algorithm reduced the redundancy. Despite the dynamic nature of the testing environments, the proposed Modified POX Controller consistently outperformed VANET, with up to 21 to 42% better packet delivery ratio for higher data transfer rates. The overall improvement in QoS parameters also accompanies an improvement in the consumers Quality of Experience (QoE) factors.
Real-World Multimedia Streaming for Software Defined Vehicular Ad Hoc NetworksIJCNCJournal
Multimedia services with required Quality of Service (QoS) is one of the most critical challenges in
Software Defined Network (SDN) based Vehicular Ad-Hoc Networks (VANETs). It forms an essential part
of the Intelligent Transport System (ITS), where infotainment services play an essential role. Streaming
multimedia is one of the most popular applications and has a high demand for VANET infotainment
services. The major issues for multimedia streaming on VANET are scalability, mobility of vehicles,
frequent connection failures, frequent change in network topology, and distributed architecture with
heterogeneous devices. To overcome these problems and provide a better QoS, we propose using a
hybridarchitecture with a combination of VANET and SDN called Software-Defined Vehicular Networks
(SDVN). This work presents a modified POX controller-based SDN framework for VANETs, especially for
multimedia streaming applications in realistic traffic patterns. The proposed work has a real-world setup
developed using Simulation of Urban Mobility (SUMO), where iPerf generates multimedia traffic.
Optimal model of vehicular ad-hoc network assisted by unmanned aerial vehicl...IJECEIAES
Vehicular ad-hoc network (VANET) is a promising project related to intelligent transportation systems (ITS), which aims at connecting vehicles and providing a set of functionalities for the efficient management of the network. However, the high mobility of the network nodes is considered a significant challenge for implementing a reliable, secure, and efficient exchange system. Furthermore, VANET faces the issue of packet delivery due to the high mobility of the nodes and packet collisions complicate the process of sending and receiving packets. We propose to combine two technologies which are unmanned aerial vehicle (UAV) and information centric networks (ICN) and apply it in VANET architecture as supporting technology. The UAV are more reliable and less affected by channel fading. And can be used in areas where we cannot install network infrastructure. The UAV has many advantages that we have cited in this article and can solve many issues of VANET. Using ICN can solve some of the problems of VANET since ICN has many strategies to capture and retrieve data. This study proposes a new VANET model based on an UAV and ICN, to reduce the overload of the vehicles, which in most cases require more resources and have a limited time to process and act especially in case of an accident or emergency.
A Quality of Service Strategy to Optimize Bandwidth Utilization in Mobile Net...IDES Editor
The mobile network that supports network mobility
is an emerging technology. It is also referred as NEMO
(NEtwork MObility). It is more appropriate for mobile
platforms such as car, bus, train, air plane, etc. It is a great
challenge to provide Quality of Service (QoS) in NEMO. QoS
is a set of service requirements to be met by the network.
There are various parameters by which QoS is provided. This
paper concentrates on providing optimum bandwidth for data
traffic. The objective of this paper is to propose a strategy to
use Virtual Circuit (VC) approach in NEMO. It helps to
utilize the bandwidth effectively, to consume minimum time to
transfer the data and also to reduce overload of the mobile
router due to the minimum size of the header. Ultimately, it
gives better results to enhance the QoS in mobile networks.
Secure and Proficient Cross Layer (SPCL) QoS Framework for Mobile Ad-hocIJECEIAES
A cross layer QoS framework is a complete system that provides required QoS services to each node present in the network. All components within it cooperate together for providing the required services. In existing QoS frameworks there is no security mechanism provided while Security is a critical aspect for QoS in the MANET environment. Cross layer QoS framework tend to be vulnerable to a number of threats and attacks like, over/under-reporting of available bandwidth, over-reservation, state table starvation, QoS degradation, information disclosure, theft of services timing attack, flooding attack, replay attack, and denial of service (DoS) attack, attacks on information in transit and attacks against routing. So it is necessary when designing protocols for QoS framework, the harmony between security and QoS must be present as one impacts the others. In this work we proposed secure and proficient cross layer (SPCL) QoS frameworks which prevents from various types of threats and attacks. The proposed SPCL QoS framework achieves better performance compared to existing QoS frameworks in metrics of throughput, packet drop ratio, end-to-end delay, and average jitter in both condition when malicious node present in the network and when malicious node not present in the network.
An Efficient Mobile Gateway Selection and Discovery Based-Routing Protocol in...IJCNCJournal
Coupling cellular communication networks with vehicular ad hoc networks (VANET) can be a very interesting way out for providing Internet access to vehicles in the road. However, due to the several specific characteristics of VANETs, making an efficient multi-hop routing from vehicular sources to the Internet gateways through Long Term Evolution (LTE) technology is still challenging. In this paper, an Internet mobile gateway selection scheme is proposed to elect more potential vehicles to behave as gateways to Internet in VANETs. Therefore, the discovery and the selection of route to those mobiles gateways is carried out via an efficient multiple metrics-based relay selection mechanism. The objective is to select the more reliable route to the mobile gateways, by reducing the communication overhead and performing seamless handover. The proposed protocol is compared with one recent protocol based on packet delivery ratio, average end-to-end delay and overhead. The results show that the proposed protocol ameliorates significantly the network performance in the contrast of the other protocol.
AN EFFICIENT MOBILE GATEWAY SELECTION AND DISCOVERY BASED-ROUTING PROTOCOL IN...IJCNCJournal
Coupling cellular communication networks with vehicular ad hoc networks (VANET) can be a very
interesting way out for providing Internet access to vehicles in the road. However, due to the several
specific characteristics of VANETs, making an efficient multi-hop routing from vehicular sources to the
Internet gateways through Long Term Evolution (LTE) technology is still challenging. In this paper, an
Internet mobile gateway selection scheme is proposed to elect more potential vehicles to behave as
gateways to Internet in VANETs. Therefore, the discovery and the selection of route to those mobiles
gateways is carried out via an efficient multiple metrics-based relay selection mechanism. The objective is
to select the more reliable route to the mobile gateways, by reducing the communication overhead and
performing seamless handover. The proposed protocol is compared with one recent protocol based on
packet delivery ratio, average end-to-end delay and overhead. The results show that the proposed protocol
ameliorates significantly the network performance in the contrast of the other protocol.
Mobile environment pretense a number of novel
theoretical and optimization issues such as position, operation
and following in that a lot of requests rely on them for
desirable information. The precedent works are sprinkled
across the entire network layer: from the medium of physical
to link layer to routing and then application layer. In this
invention, we present outline solutions in Medium Access
Control (MAC), data distribution, coverage resolve issues
under mobile ad-hoc network environment based on
congestion control technique using Transmission Control
Protocol (TCP). In mobile ad-hoc network issues can arise
such as link disconnections, channel contention and recurrent
path loss. To resolve this issue, we propose a Cross Layer
based Hybrid fuzzy ad-hoc rate based Congestion Control
(CLHCC) approach to maximize network performance. Based
on the destination report it regulates the speed of data flow to
control data loss by monitoring the present network status
and transmits this report to the source as advice. The source
adjusts the sending flow rate as per the advice. This is
monitored by channel usage, ultimate delay, short term
throughput.
Multicast routing strategy for SDN-cluster based MANET IJECEIAES
The energy limitation and frequent movement of the mobile Ad hoc network (MANET) nodes (i.e., devices) make the routing process very difficult. The multicast routing problem is one of the NP-complete problems. Therefore, the need for a new power-aware approach to select an optimum multicast path with minimum power consumption that can enhance the performance and increase the lifetime of MANET has become urgent. Software defined network (SDN) is a new technique that can solve many problems of the traditional networks by dividing the architecture into data part and control part. This paper presents three power-aware multicast routing strategies for MANET. First one called a Reactive Multicast routing strategy for Cluster based MANET by using SDN (RMCMS), second one called Proactive Multicast routing strategy for Cluster based MANET by using SDN (PMCMS) and third one represents Modification of PMCMS called M-PMCMS. Moreover, it produces a new mathematical model to build a multicast tree with minimum power consumption and takes into account the remaining power in each node. All proposed multicast strategies operate based on this mathematical model and aim to maximize the MANET lifetime by exploiting the advantages of SDN and clustering concepts. They consider the multicast tree with minimum power consumption as an optimal one. The simulation results illustrated that RMCMS is better than PMCMS, M-PMCMS, and MAODV in terms of power consumption and network overhead while M-PMCMS is the best one in terms of dropped packets ratio (DPR) and average end to end (E2E) delay.
Similar to Reliable and efficient data dissemination scheme in VANET: a review (20)
Bibliometric analysis highlighting the role of women in addressing climate ch...IJECEIAES
Fossil fuel consumption increased quickly, contributing to climate change
that is evident in unusual flooding and draughts, and global warming. Over
the past ten years, women's involvement in society has grown dramatically,
and they succeeded in playing a noticeable role in reducing climate change.
A bibliometric analysis of data from the last ten years has been carried out to
examine the role of women in addressing the climate change. The analysis's
findings discussed the relevant to the sustainable development goals (SDGs),
particularly SDG 7 and SDG 13. The results considered contributions made
by women in the various sectors while taking geographic dispersion into
account. The bibliometric analysis delves into topics including women's
leadership in environmental groups, their involvement in policymaking, their
contributions to sustainable development projects, and the influence of
gender diversity on attempts to mitigate climate change. This study's results
highlight how women have influenced policies and actions related to climate
change, point out areas of research deficiency and recommendations on how
to increase role of the women in addressing the climate change and
achieving sustainability. To achieve more successful results, this initiative
aims to highlight the significance of gender equality and encourage
inclusivity in climate change decision-making processes.
Voltage and frequency control of microgrid in presence of micro-turbine inter...IJECEIAES
The active and reactive load changes have a significant impact on voltage
and frequency. In this paper, in order to stabilize the microgrid (MG) against
load variations in islanding mode, the active and reactive power of all
distributed generators (DGs), including energy storage (battery), diesel
generator, and micro-turbine, are controlled. The micro-turbine generator is
connected to MG through a three-phase to three-phase matrix converter, and
the droop control method is applied for controlling the voltage and
frequency of MG. In addition, a method is introduced for voltage and
frequency control of micro-turbines in the transition state from gridconnected mode to islanding mode. A novel switching strategy of the matrix
converter is used for converting the high-frequency output voltage of the
micro-turbine to the grid-side frequency of the utility system. Moreover,
using the switching strategy, the low-order harmonics in the output current
and voltage are not produced, and consequently, the size of the output filter
would be reduced. In fact, the suggested control strategy is load-independent
and has no frequency conversion restrictions. The proposed approach for
voltage and frequency regulation demonstrates exceptional performance and
favorable response across various load alteration scenarios. The suggested
strategy is examined in several scenarios in the MG test systems, and the
simulation results are addressed.
Enhancing battery system identification: nonlinear autoregressive modeling fo...IJECEIAES
Precisely characterizing Li-ion batteries is essential for optimizing their
performance, enhancing safety, and prolonging their lifespan across various
applications, such as electric vehicles and renewable energy systems. This
article introduces an innovative nonlinear methodology for system
identification of a Li-ion battery, employing a nonlinear autoregressive with
exogenous inputs (NARX) model. The proposed approach integrates the
benefits of nonlinear modeling with the adaptability of the NARX structure,
facilitating a more comprehensive representation of the intricate
electrochemical processes within the battery. Experimental data collected
from a Li-ion battery operating under diverse scenarios are employed to
validate the effectiveness of the proposed methodology. The identified
NARX model exhibits superior accuracy in predicting the battery's behavior
compared to traditional linear models. This study underscores the
importance of accounting for nonlinearities in battery modeling, providing
insights into the intricate relationships between state-of-charge, voltage, and
current under dynamic conditions.
Smart grid deployment: from a bibliometric analysis to a surveyIJECEIAES
Smart grids are one of the last decades' innovations in electrical energy.
They bring relevant advantages compared to the traditional grid and
significant interest from the research community. Assessing the field's
evolution is essential to propose guidelines for facing new and future smart
grid challenges. In addition, knowing the main technologies involved in the
deployment of smart grids (SGs) is important to highlight possible
shortcomings that can be mitigated by developing new tools. This paper
contributes to the research trends mentioned above by focusing on two
objectives. First, a bibliometric analysis is presented to give an overview of
the current research level about smart grid deployment. Second, a survey of
the main technological approaches used for smart grid implementation and
their contributions are highlighted. To that effect, we searched the Web of
Science (WoS), and the Scopus databases. We obtained 5,663 documents
from WoS and 7,215 from Scopus on smart grid implementation or
deployment. With the extraction limitation in the Scopus database, 5,872 of
the 7,215 documents were extracted using a multi-step process. These two
datasets have been analyzed using a bibliometric tool called bibliometrix.
The main outputs are presented with some recommendations for future
research.
Use of analytical hierarchy process for selecting and prioritizing islanding ...IJECEIAES
One of the problems that are associated to power systems is islanding
condition, which must be rapidly and properly detected to prevent any
negative consequences on the system's protection, stability, and security.
This paper offers a thorough overview of several islanding detection
strategies, which are divided into two categories: classic approaches,
including local and remote approaches, and modern techniques, including
techniques based on signal processing and computational intelligence.
Additionally, each approach is compared and assessed based on several
factors, including implementation costs, non-detected zones, declining
power quality, and response times using the analytical hierarchy process
(AHP). The multi-criteria decision-making analysis shows that the overall
weight of passive methods (24.7%), active methods (7.8%), hybrid methods
(5.6%), remote methods (14.5%), signal processing-based methods (26.6%),
and computational intelligent-based methods (20.8%) based on the
comparison of all criteria together. Thus, it can be seen from the total weight
that hybrid approaches are the least suitable to be chosen, while signal
processing-based methods are the most appropriate islanding detection
method to be selected and implemented in power system with respect to the
aforementioned factors. Using Expert Choice software, the proposed
hierarchy model is studied and examined.
Enhancing of single-stage grid-connected photovoltaic system using fuzzy logi...IJECEIAES
The power generated by photovoltaic (PV) systems is influenced by
environmental factors. This variability hampers the control and utilization of
solar cells' peak output. In this study, a single-stage grid-connected PV
system is designed to enhance power quality. Our approach employs fuzzy
logic in the direct power control (DPC) of a three-phase voltage source
inverter (VSI), enabling seamless integration of the PV connected to the
grid. Additionally, a fuzzy logic-based maximum power point tracking
(MPPT) controller is adopted, which outperforms traditional methods like
incremental conductance (INC) in enhancing solar cell efficiency and
minimizing the response time. Moreover, the inverter's real-time active and
reactive power is directly managed to achieve a unity power factor (UPF).
The system's performance is assessed through MATLAB/Simulink
implementation, showing marked improvement over conventional methods,
particularly in steady-state and varying weather conditions. For solar
irradiances of 500 and 1,000 W/m2
, the results show that the proposed
method reduces the total harmonic distortion (THD) of the injected current
to the grid by approximately 46% and 38% compared to conventional
methods, respectively. Furthermore, we compare the simulation results with
IEEE standards to evaluate the system's grid compatibility.
Enhancing photovoltaic system maximum power point tracking with fuzzy logic-b...IJECEIAES
Photovoltaic systems have emerged as a promising energy resource that
caters to the future needs of society, owing to their renewable, inexhaustible,
and cost-free nature. The power output of these systems relies on solar cell
radiation and temperature. In order to mitigate the dependence on
atmospheric conditions and enhance power tracking, a conventional
approach has been improved by integrating various methods. To optimize
the generation of electricity from solar systems, the maximum power point
tracking (MPPT) technique is employed. To overcome limitations such as
steady-state voltage oscillations and improve transient response, two
traditional MPPT methods, namely fuzzy logic controller (FLC) and perturb
and observe (P&O), have been modified. This research paper aims to
simulate and validate the step size of the proposed modified P&O and FLC
techniques within the MPPT algorithm using MATLAB/Simulink for
efficient power tracking in photovoltaic systems.
Adaptive synchronous sliding control for a robot manipulator based on neural ...IJECEIAES
Robot manipulators have become important equipment in production lines, medical fields, and transportation. Improving the quality of trajectory tracking for
robot hands is always an attractive topic in the research community. This is a
challenging problem because robot manipulators are complex nonlinear systems
and are often subject to fluctuations in loads and external disturbances. This
article proposes an adaptive synchronous sliding control scheme to improve trajectory tracking performance for a robot manipulator. The proposed controller
ensures that the positions of the joints track the desired trajectory, synchronize
the errors, and significantly reduces chattering. First, the synchronous tracking
errors and synchronous sliding surfaces are presented. Second, the synchronous
tracking error dynamics are determined. Third, a robust adaptive control law is
designed,the unknown components of the model are estimated online by the neural network, and the parameters of the switching elements are selected by fuzzy
logic. The built algorithm ensures that the tracking and approximation errors
are ultimately uniformly bounded (UUB). Finally, the effectiveness of the constructed algorithm is demonstrated through simulation and experimental results.
Simulation and experimental results show that the proposed controller is effective with small synchronous tracking errors, and the chattering phenomenon is
significantly reduced.
Remote field-programmable gate array laboratory for signal acquisition and de...IJECEIAES
A remote laboratory utilizing field-programmable gate array (FPGA) technologies enhances students’ learning experience anywhere and anytime in embedded system design. Existing remote laboratories prioritize hardware access and visual feedback for observing board behavior after programming, neglecting comprehensive debugging tools to resolve errors that require internal signal acquisition. This paper proposes a novel remote embeddedsystem design approach targeting FPGA technologies that are fully interactive via a web-based platform. Our solution provides FPGA board access and debugging capabilities beyond the visual feedback provided by existing remote laboratories. We implemented a lab module that allows users to seamlessly incorporate into their FPGA design. The module minimizes hardware resource utilization while enabling the acquisition of a large number of data samples from the signal during the experiments by adaptively compressing the signal prior to data transmission. The results demonstrate an average compression ratio of 2.90 across three benchmark signals, indicating efficient signal acquisition and effective debugging and analysis. This method allows users to acquire more data samples than conventional methods. The proposed lab allows students to remotely test and debug their designs, bridging the gap between theory and practice in embedded system design.
Detecting and resolving feature envy through automated machine learning and m...IJECEIAES
Efficiently identifying and resolving code smells enhances software project quality. This paper presents a novel solution, utilizing automated machine learning (AutoML) techniques, to detect code smells and apply move method refactoring. By evaluating code metrics before and after refactoring, we assessed its impact on coupling, complexity, and cohesion. Key contributions of this research include a unique dataset for code smell classification and the development of models using AutoGluon for optimal performance. Furthermore, the study identifies the top 20 influential features in classifying feature envy, a well-known code smell, stemming from excessive reliance on external classes. We also explored how move method refactoring addresses feature envy, revealing reduced coupling and complexity, and improved cohesion, ultimately enhancing code quality. In summary, this research offers an empirical, data-driven approach, integrating AutoML and move method refactoring to optimize software project quality. Insights gained shed light on the benefits of refactoring on code quality and the significance of specific features in detecting feature envy. Future research can expand to explore additional refactoring techniques and a broader range of code metrics, advancing software engineering practices and standards.
Smart monitoring technique for solar cell systems using internet of things ba...IJECEIAES
Rapidly and remotely monitoring and receiving the solar cell systems status parameters, solar irradiance, temperature, and humidity, are critical issues in enhancement their efficiency. Hence, in the present article an improved smart prototype of internet of things (IoT) technique based on embedded system through NodeMCU ESP8266 (ESP-12E) was carried out experimentally. Three different regions at Egypt; Luxor, Cairo, and El-Beheira cities were chosen to study their solar irradiance profile, temperature, and humidity by the proposed IoT system. The monitoring data of solar irradiance, temperature, and humidity were live visualized directly by Ubidots through hypertext transfer protocol (HTTP) protocol. The measured solar power radiation in Luxor, Cairo, and El-Beheira ranged between 216-1000, 245-958, and 187-692 W/m 2 respectively during the solar day. The accuracy and rapidity of obtaining monitoring results using the proposed IoT system made it a strong candidate for application in monitoring solar cell systems. On the other hand, the obtained solar power radiation results of the three considered regions strongly candidate Luxor and Cairo as suitable places to build up a solar cells system station rather than El-Beheira.
An efficient security framework for intrusion detection and prevention in int...IJECEIAES
Over the past few years, the internet of things (IoT) has advanced to connect billions of smart devices to improve quality of life. However, anomalies or malicious intrusions pose several security loopholes, leading to performance degradation and threat to data security in IoT operations. Thereby, IoT security systems must keep an eye on and restrict unwanted events from occurring in the IoT network. Recently, various technical solutions based on machine learning (ML) models have been derived towards identifying and restricting unwanted events in IoT. However, most ML-based approaches are prone to miss-classification due to inappropriate feature selection. Additionally, most ML approaches applied to intrusion detection and prevention consider supervised learning, which requires a large amount of labeled data to be trained. Consequently, such complex datasets are impossible to source in a large network like IoT. To address this problem, this proposed study introduces an efficient learning mechanism to strengthen the IoT security aspects. The proposed algorithm incorporates supervised and unsupervised approaches to improve the learning models for intrusion detection and mitigation. Compared with the related works, the experimental outcome shows that the model performs well in a benchmark dataset. It accomplishes an improved detection accuracy of approximately 99.21%.
Developing a smart system for infant incubators using the internet of things ...IJECEIAES
This research is developing an incubator system that integrates the internet of things and artificial intelligence to improve care for premature babies. The system workflow starts with sensors that collect data from the incubator. Then, the data is sent in real-time to the internet of things (IoT) broker eclipse mosquito using the message queue telemetry transport (MQTT) protocol version 5.0. After that, the data is stored in a database for analysis using the long short-term memory network (LSTM) method and displayed in a web application using an application programming interface (API) service. Furthermore, the experimental results produce as many as 2,880 rows of data stored in the database. The correlation coefficient between the target attribute and other attributes ranges from 0.23 to 0.48. Next, several experiments were conducted to evaluate the model-predicted value on the test data. The best results are obtained using a two-layer LSTM configuration model, each with 60 neurons and a lookback setting 6. This model produces an R 2 value of 0.934, with a root mean square error (RMSE) value of 0.015 and a mean absolute error (MAE) of 0.008. In addition, the R 2 value was also evaluated for each attribute used as input, with a result of values between 0.590 and 0.845.
A review on internet of things-based stingless bee's honey production with im...IJECEIAES
Honey is produced exclusively by honeybees and stingless bees which both are well adapted to tropical and subtropical regions such as Malaysia. Stingless bees are known for producing small amounts of honey and are known for having a unique flavor profile. Problem identified that many stingless bees collapsed due to weather, temperature and environment. It is critical to understand the relationship between the production of stingless bee honey and environmental conditions to improve honey production. Thus, this paper presents a review on stingless bee's honey production and prediction modeling. About 54 previous research has been analyzed and compared in identifying the research gaps. A framework on modeling the prediction of stingless bee honey is derived. The result presents the comparison and analysis on the internet of things (IoT) monitoring systems, honey production estimation, convolution neural networks (CNNs), and automatic identification methods on bee species. It is identified based on image detection method the top best three efficiency presents CNN is at 98.67%, densely connected convolutional networks with YOLO v3 is 97.7%, and DenseNet201 convolutional networks 99.81%. This study is significant to assist the researcher in developing a model for predicting stingless honey produced by bee's output, which is important for a stable economy and food security.
A trust based secure access control using authentication mechanism for intero...IJECEIAES
The internet of things (IoT) is a revolutionary innovation in many aspects of our society including interactions, financial activity, and global security such as the military and battlefield internet. Due to the limited energy and processing capacity of network devices, security, energy consumption, compatibility, and device heterogeneity are the long-term IoT problems. As a result, energy and security are critical for data transmission across edge and IoT networks. Existing IoT interoperability techniques need more computation time, have unreliable authentication mechanisms that break easily, lose data easily, and have low confidentiality. In this paper, a key agreement protocol-based authentication mechanism for IoT devices is offered as a solution to this issue. This system makes use of information exchange, which must be secured to prevent access by unauthorized users. Using a compact contiki/cooja simulator, the performance and design of the suggested framework are validated. The simulation findings are evaluated based on detection of malicious nodes after 60 minutes of simulation. The suggested trust method, which is based on privacy access control, reduced packet loss ratio to 0.32%, consumed 0.39% power, and had the greatest average residual energy of 0.99 mJoules at 10 nodes.
Fuzzy linear programming with the intuitionistic polygonal fuzzy numbersIJECEIAES
In real world applications, data are subject to ambiguity due to several factors; fuzzy sets and fuzzy numbers propose a great tool to model such ambiguity. In case of hesitation, the complement of a membership value in fuzzy numbers can be different from the non-membership value, in which case we can model using intuitionistic fuzzy numbers as they provide flexibility by defining both a membership and a non-membership functions. In this article, we consider the intuitionistic fuzzy linear programming problem with intuitionistic polygonal fuzzy numbers, which is a generalization of the previous polygonal fuzzy numbers found in the literature. We present a modification of the simplex method that can be used to solve any general intuitionistic fuzzy linear programming problem after approximating the problem by an intuitionistic polygonal fuzzy number with n edges. This method is given in a simple tableau formulation, and then applied on numerical examples for clarity.
The performance of artificial intelligence in prostate magnetic resonance im...IJECEIAES
Prostate cancer is the predominant form of cancer observed in men worldwide. The application of magnetic resonance imaging (MRI) as a guidance tool for conducting biopsies has been established as a reliable and well-established approach in the diagnosis of prostate cancer. The diagnostic performance of MRI-guided prostate cancer diagnosis exhibits significant heterogeneity due to the intricate and multi-step nature of the diagnostic pathway. The development of artificial intelligence (AI) models, specifically through the utilization of machine learning techniques such as deep learning, is assuming an increasingly significant role in the field of radiology. In the realm of prostate MRI, a considerable body of literature has been dedicated to the development of various AI algorithms. These algorithms have been specifically designed for tasks such as prostate segmentation, lesion identification, and classification. The overarching objective of these endeavors is to enhance diagnostic performance and foster greater agreement among different observers within MRI scans for the prostate. This review article aims to provide a concise overview of the application of AI in the field of radiology, with a specific focus on its utilization in prostate MRI.
Seizure stage detection of epileptic seizure using convolutional neural networksIJECEIAES
According to the World Health Organization (WHO), seventy million individuals worldwide suffer from epilepsy, a neurological disorder. While electroencephalography (EEG) is crucial for diagnosing epilepsy and monitoring the brain activity of epilepsy patients, it requires a specialist to examine all EEG recordings to find epileptic behavior. This procedure needs an experienced doctor, and a precise epilepsy diagnosis is crucial for appropriate treatment. To identify epileptic seizures, this study employed a convolutional neural network (CNN) based on raw scalp EEG signals to discriminate between preictal, ictal, postictal, and interictal segments. The possibility of these characteristics is explored by examining how well timedomain signals work in the detection of epileptic signals using intracranial Freiburg Hospital (FH), scalp Children's Hospital Boston-Massachusetts Institute of Technology (CHB-MIT) databases, and Temple University Hospital (TUH) EEG. To test the viability of this approach, two types of experiments were carried out. Firstly, binary class classification (preictal, ictal, postictal each versus interictal) and four-class classification (interictal versus preictal versus ictal versus postictal). The average accuracy for stage detection using CHB-MIT database was 84.4%, while the Freiburg database's time-domain signals had an accuracy of 79.7% and the highest accuracy of 94.02% for classification in the TUH EEG database when comparing interictal stage to preictal stage.
Analysis of driving style using self-organizing maps to analyze driver behaviorIJECEIAES
Modern life is strongly associated with the use of cars, but the increase in acceleration speeds and their maneuverability leads to a dangerous driving style for some drivers. In these conditions, the development of a method that allows you to track the behavior of the driver is relevant. The article provides an overview of existing methods and models for assessing the functioning of motor vehicles and driver behavior. Based on this, a combined algorithm for recognizing driving style is proposed. To do this, a set of input data was formed, including 20 descriptive features: About the environment, the driver's behavior and the characteristics of the functioning of the car, collected using OBD II. The generated data set is sent to the Kohonen network, where clustering is performed according to driving style and degree of danger. Getting the driving characteristics into a particular cluster allows you to switch to the private indicators of an individual driver and considering individual driving characteristics. The application of the method allows you to identify potentially dangerous driving styles that can prevent accidents.
Hyperspectral object classification using hybrid spectral-spatial fusion and ...IJECEIAES
Because of its spectral-spatial and temporal resolution of greater areas, hyperspectral imaging (HSI) has found widespread application in the field of object classification. The HSI is typically used to accurately determine an object's physical characteristics as well as to locate related objects with appropriate spectral fingerprints. As a result, the HSI has been extensively applied to object identification in several fields, including surveillance, agricultural monitoring, environmental research, and precision agriculture. However, because of their enormous size, objects require a lot of time to classify; for this reason, both spectral and spatial feature fusion have been completed. The existing classification strategy leads to increased misclassification, and the feature fusion method is unable to preserve semantic object inherent features; This study addresses the research difficulties by introducing a hybrid spectral-spatial fusion (HSSF) technique to minimize feature size while maintaining object intrinsic qualities; Lastly, a soft-margins kernel is proposed for multi-layer deep support vector machine (MLDSVM) to reduce misclassification. The standard Indian pines dataset is used for the experiment, and the outcome demonstrates that the HSSF-MLDSVM model performs substantially better in terms of accuracy and Kappa coefficient.
Saudi Arabia stands as a titan in the global energy landscape, renowned for its abundant oil and gas resources. It's the largest exporter of petroleum and holds some of the world's most significant reserves. Let's delve into the top 10 oil and gas projects shaping Saudi Arabia's energy future in 2024.
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...Dr.Costas Sachpazis
Terzaghi's soil bearing capacity theory, developed by Karl Terzaghi, is a fundamental principle in geotechnical engineering used to determine the bearing capacity of shallow foundations. This theory provides a method to calculate the ultimate bearing capacity of soil, which is the maximum load per unit area that the soil can support without undergoing shear failure. The Calculation HTML Code included.
TECHNICAL TRAINING MANUAL GENERAL FAMILIARIZATION COURSEDuvanRamosGarzon1
AIRCRAFT GENERAL
The Single Aisle is the most advanced family aircraft in service today, with fly-by-wire flight controls.
The A318, A319, A320 and A321 are twin-engine subsonic medium range aircraft.
The family offers a choice of engines
Immunizing Image Classifiers Against Localized Adversary Attacksgerogepatton
This paper addresses the vulnerability of deep learning models, particularly convolutional neural networks
(CNN)s, to adversarial attacks and presents a proactive training technique designed to counter them. We
introduce a novel volumization algorithm, which transforms 2D images into 3D volumetric representations.
When combined with 3D convolution and deep curriculum learning optimization (CLO), itsignificantly improves
the immunity of models against localized universal attacks by up to 40%. We evaluate our proposed approach
using contemporary CNN architectures and the modified Canadian Institute for Advanced Research (CIFAR-10
and CIFAR-100) and ImageNet Large Scale Visual Recognition Challenge (ILSVRC12) datasets, showcasing
accuracy improvements over previous techniques. The results indicate that the combination of the volumetric
input and curriculum learning holds significant promise for mitigating adversarial attacks without necessitating
adversary training.
Forklift Classes Overview by Intella PartsIntella Parts
Discover the different forklift classes and their specific applications. Learn how to choose the right forklift for your needs to ensure safety, efficiency, and compliance in your operations.
For more technical information, visit our website https://intellaparts.com
Explore the innovative world of trenchless pipe repair with our comprehensive guide, "The Benefits and Techniques of Trenchless Pipe Repair." This document delves into the modern methods of repairing underground pipes without the need for extensive excavation, highlighting the numerous advantages and the latest techniques used in the industry.
Learn about the cost savings, reduced environmental impact, and minimal disruption associated with trenchless technology. Discover detailed explanations of popular techniques such as pipe bursting, cured-in-place pipe (CIPP) lining, and directional drilling. Understand how these methods can be applied to various types of infrastructure, from residential plumbing to large-scale municipal systems.
Ideal for homeowners, contractors, engineers, and anyone interested in modern plumbing solutions, this guide provides valuable insights into why trenchless pipe repair is becoming the preferred choice for pipe rehabilitation. Stay informed about the latest advancements and best practices in the field.
Final project report on grocery store management system..pdfKamal Acharya
In today’s fast-changing business environment, it’s extremely important to be able to respond to client needs in the most effective and timely manner. If your customers wish to see your business online and have instant access to your products or services.
Online Grocery Store is an e-commerce website, which retails various grocery products. This project allows viewing various products available enables registered users to purchase desired products instantly using Paytm, UPI payment processor (Instant Pay) and also can place order by using Cash on Delivery (Pay Later) option. This project provides an easy access to Administrators and Managers to view orders placed using Pay Later and Instant Pay options.
In order to develop an e-commerce website, a number of Technologies must be studied and understood. These include multi-tiered architecture, server and client-side scripting techniques, implementation technologies, programming language (such as PHP, HTML, CSS, JavaScript) and MySQL relational databases. This is a project with the objective to develop a basic website where a consumer is provided with a shopping cart website and also to know about the technologies used to develop such a website.
This document will discuss each of the underlying technologies to create and implement an e- commerce website.
Overview of the fundamental roles in Hydropower generation and the components involved in wider Electrical Engineering.
This paper presents the design and construction of hydroelectric dams from the hydrologist’s survey of the valley before construction, all aspects and involved disciplines, fluid dynamics, structural engineering, generation and mains frequency regulation to the very transmission of power through the network in the United Kingdom.
Author: Robbie Edward Sayers
Collaborators and co editors: Charlie Sims and Connor Healey.
(C) 2024 Robbie E. Sayers
2. ISSN: 2088-8708
Int J Elec & Comp Eng, Vol. 10, No. 6, December 2020 : 6423 - 6434
6424
communication between two fast-moving vehicles is only available at the time when a stable link is
established between them, but this has happened only in a few seconds [2, 3]. Therefore, message routing is
a problem for many safety and non-safety of ITS applications. The challenge in designing a robust but
reliable message dissemination technique is primarily due to the stringent QoS requirements of the ITS safety
applications [4].
2. QUALITY OF SERVICE (QOS) IN VANET
QoS assistance helps to enhance networking activity and allow it easier and properly coordinate
knowledge exchanged across the network and to increase network efficiency. The concept of QoS is
a network arrangement or guarantee to provide the customer with a variety of quantifiable pre-specified
service functionality including network latency, latency variances, usable capacity, packet loss (loss rate),
etc. etc. The IETF RFC 2386 defines QoS as a collection of connection specifications that the network should
satisfy for a packet stream from source to destination [5]. The capacity of the network to provide unique QoS
is dependent on the network's properties, which extend throughout the critical elements of the network.
The property included contact latency, transfer, failure levels, and error rate for the transfer relation.
Of the nodes, hardware characteristics provide operating speed and storage capacity. In addition to physical
node characteristics and communication relations, QoS control algorithms that operate at different network
levels often help QoS in networks. Regrettably, the features of MANETs show weak support for QoS [6, 7].
The actual transmitting power with comparably small errors and the failure rate is weak and time-varying.
Other potential wireless devices that nodes may use at the same time to connect MANETs [8, 9]. In order to
support QoS, each technology requires a MAC layer protocol. The QoS structures around the MAC
framework would also be readily matched to the different simple wireless technologies. It will be a task to
encourage various standard standards of service in a continuously diverse setting. The stochastic trait of
communications quality in a MANET allows it difficult for a system to obtain guarantees [10-12].
3. ISSUES AND PROBLEM IN DATA DISSEMINATION
Vehicle networks can have two types of implementation: the first, using pure ad hoc
communications, and the other, using infrastructure to allow communications. These types of networks pose
new and demanding challenges, mainly in the case of the absence of infrastructure, speed, and topographic
conditions in which the nodes are mobilized. In extra to the above, conventional routing protocols cannot be
applied to this type of networks in the same way as in conventional networks, since they are not prepared to
adapt to the variable conditions that may arise in the environment in which they are used. They play
vehicular networks. On the other side, considerations of security and quality of service arise that must be
adapted to the conditions of this type of network [13, 14].
Unlike traditional wired networks, in an ad-hoc wireless network, each of the nodes works
simultaneously as a station and as a router. For each node to be able to communicate with the rest,
it is necessary to maintain information of the network to which it belongs and have an algorithm that governs
the sending and receiving of packages. The routing protocol is defined as a set that forms the routing
algorithm and the information about the conditions of the network. The protocols of routing in ad hoc
networks must adapt quickly and correctly to frequent and unpredictable changes in the topology of
the network, making minimum use of memory, transmission power and bandwidth [15, 16]. The routing
process is defined as the act of transmitting information from one source to a destination source, that is, node
to node. A routing process is considered as the selection of paths from a source to a destination within
a network. A routing protocol for ad-hoc networks allows the network to be fully organized on its own, and
its main objective is the correct and efficient establishment of routes between a pair of nodes. Messages are
delivered correctly and timely [17].
The construction of routes must occur with a minimum overload in the headers of the control
packets and minimum consumption of bandwidth. There are many routing protocols have been proposed in
order to cover the different needs depending on the different environments and traffic conditions. The great
variety of existing protocols means that there are several criteria for their classification, which in turn reflect
the most important aspects considered for their design. The planning criterion assumes the classification most
widely used in the literature and attends to the moment in which the route is calculated from one source node
to another source (destination node). While in the proactive protocols, the updated information is kept at all
times, in the reagents, the route to the destination is searched when the need to establish a communication
arises. At the end of any vehicular communication network, the following questions need to be answered
prior to design an efficient and reliable message dissemination scheme in VANET for QoS of intelligent
transportation system implementation.
3. Int J Elec & Comp Eng ISSN: 2088-8708
Reliable and efficient data dissemination scheme in VANET: a review (Sami Abduljabbar Rashid)
6425
- What method of optimization can be effectively deployed to provide a stable link between any two
communicating nodes in VANET?
- How to build a reliable and efficient route/path for connecting a sender node and a receiver node and
suitable for QoS routing in VANET?
- What performance parameters shall be used such that QoS of the ITS application is acceptable?
In order to solve the above questions, the hypothesis can be made is that if a stable link can be
established between any two communicating nodes in VANET (V2V or V2I), there is a great chance that
a reliable and an efficient messages dissemination/routing can be made in the network to support the QoS
achievement for the ITS implementation.
4. ROUTING IN VANET
Based on the routing protocol, communication between mobile nodes may be single-hop or
multi-hop in VANET. The routing protocol also decides the end-to-end path between source nodes and
destination nodes. Low latency and the dependable end to end data delivery are the two main factors for
efficient routing protocols. However, route maintenance, route discovery, and sudden changes in
the topology are the key factors in designing efficient routing protocols [18, 19]. Numerous routing protocols
have been proposed in the literature to provide reliable and efficient routing in VANET. These can be
classified as shown in Figure 1.
Figure 1. Types of routing protocols
5. ALGORITHM BASED ROUTING IN VANETS
The development of routing protocols in VANET was based on various models and approaches.
Some of them are regarded as famous models in the literature in various applications. We present here some
of them. Various researchers have developed routing protocols for VANETs based on meta-heuristic
optimization models. Some researchers have adopted multi-objective optimization for this purpose and used
it to optimize existing routing protocols and to make it more suitable for VANETs. In the work of [20],
the firefly was used as multi-objective optimization for OLSR for VANET based on a developed framework.
More specifically, the framework consists of three stages: 1- generating the scenarios for creating
the network road and the traffic, 2- formulating the weighted cost function and 3- optimizing the protocol
4. ISSN: 2088-8708
Int J Elec & Comp Eng, Vol. 10, No. 6, December 2020 : 6423 - 6434
6426
parameters using considered parameters related to the time of holding the message, the refresh time of
the link status, and hello message etc. However, the evaluation has not generated the MOO evaluation
measures the number of non-dominated solutions, hyper-volume, set coverage, … etc.
The literature contains a significant amount of works using meta-heuristic approaches for
optimization of the VANET network in its different layers. In the context of applying meta-heuristic for
optimization of MAC layer in VANET [21], a MOO framework for optimization of MAC and the physical
layer was proposed. The framework aims at the optimization of three objectives: throughput, packet loss, and
latency. The solution is proposed to include various parameters in the protocol of the two layers.
For optimization, the framework was evaluated based on the non-dominated sorting genetic algorithm
NSGA-II. The work of [22] has proposed using a genetic whale optimization algorithm for assisting in
selecting a root channel for transmission. The protocol was named as a modified cognitive tree routing
protocol MCTRP. The protocol can be categorized under effective channel utilization in VANET. Another
aspect of applications of meta-heuristic optimization in VANET is controlling data dissemination and
preventing broadcast storms. In the work of [23], the authors have aimed at optimizing link stability and
lifetime as well as minimizing the number of obstacles within the selected route. The optimization function
was formulated as a single objective function with including the two terms. Next, the approach has used
discrete particle swarm optimization.
A complexity analysis has proved the feasibility of the method in real-world applications.
Some researchers have proposed meta-heuristic based optimization for establishing multi-cast-based
routing in VANETs. An improved shuffled frog-leaping algorithm-based [24] QoS constrained multicast
routing (ISFLABMR) was proposed. The goal is to find the optimal sub-tree for message dissemination.
This sub-tree is the optimal multi-cast tree from available options of the multi-cast tree between the source
and the destination. The formulation of the fitness function has aimed at optimizing various QoS
parameters, more specifically, jitter, latency, and bandwidth, in order to reduce the transmission cost of
multi-cast routing. Apart from that, some papers have focused on meta-heuristic based VANET security,
such as the work of [25], where swarm algorithms of artificial intelligence were proposed for countering
routing attacks.
The literature of VANETs routing protocols included many techniques based on meta-heuristic
approaches. In the work of [26], an approach of selecting routes based on their fitness values is proposed
using genetic. The routes were found using a greedy approach, and then the best route was selected based on
genetic. After proving the superiority of the approach over other benchmarking routing protocols, the author
stated that the algorithm suffers from slow computation, and its combination with heuristic can increase
the performance of the algorithm. This concern of speed of genetic algorithm was indicated by other authors
such as [27] in their work where genetic was applied in both serial and parallel ways, and they proved
the superiority of a similar way when using multi-core architecture. Other researchers have developed
metrics for route optimization. The metrics include information about signal strength, path loss, transmit
power and frequency such as the work of [28], in addition to the new metrics, an improved genetic-based
routing algorithm was proposed. The approach uses a non-probabilistic selection approach using k-means
clustering. The author also has stated about the real-time concern and regarded it as a future investigation.
It is observed in the literature that significant amount of meta-heuristic based routing has focused on
the problem of multi-cast routing and its result on the congestion in the network.
An example is a work of [29], where a micro-artificial bee colony was used for multi-cast routing.
The algorithm is proposed for achieving QoS-constrained VANET with maximizing network lifetime and
minimizing delay cost. The solution of the algorithm proposes a bit-based encoding for the route between
the source and the destination inside a spanning tree. The algorithm also proposed incorporating an energy
model that is suitable for electrical efficiency. On the other side, the optimization considers only a small
part of the population, which makes it more computationally efficient. A similar work for developing
meta-heuristic based multi-cast routing is the work of [30] where firefly was improved by using Levey
distribution, and bit string coding was proposed for searching for the path that achieves the best cost which is
represented by minimizing the energy consumption and E2E delay using a single objective function.
6. DATA DISSEMINATION IN VANET
The data dissemination is a crucial part of VANET for various applications, particularly related to
safety, to alert the drivers about the traffic incidents in their local region. An example of data dissemination
in VANET is shown in Figure 2. Although VANET inherits many concepts from traditional mobile ad hoc
networks (MANET), VANET is defined by its high mobility and frequent disconnection, and data
dissemination is an integral part of the network. This key difference is the reason for VANET that traditional
MANET routing data dissemination methods like AODV and DSR are not applicable in it. Unsurprisingly
5. Int J Elec & Comp Eng ISSN: 2088-8708
Reliable and efficient data dissemination scheme in VANET: a review (Sami Abduljabbar Rashid)
6427
many techniques of data dissemination have already been proposed for VANET. These techniques can be
distinguished into different categories as being Unicast [31], Multicast [32], or Broadcast. The techniques
of data dissemination in VANET can also be distinguished as one relying on the existence of an
infrastructure [33] and another one relying on zero infrastructure support [34]. For the intent of this study,
the techniques of data dissemination in VANET have been classified into two categories: (1) Those
Techniques which presume the existence of end-to-end connectivity between vehicles. (2) Those Techniques
do consider the lack of connectivity between vehicles. Techniques like VGrid, MURU [35], and PBR [36]
are the example of the first category.
Figure 2. Data dissemination in a VANET
The VGrid Data dissemination technique is a position-based, on-demand routing protocol that
creates a path from a static source node to the vehicles present in a destination area. Another technique is
MURU. It is a multi-hop routing protocol proposed for discovering strong routes in urban VANET. MURU
aims to reduce the probability of path-breaking by using movement data of all vehicles and by using a unique
parameter stated as expected disconnection degree factor to choose the utmost strong route from source to
destination [37]. MURU prudently assumes that there will be several routes between destination and source
and its aim to choose the one that is highly established. Position-based routing (PBR) protocol is used where
packet forwarding decisions are taken based on power awareness. Connectivity-aware routing (CAR) was
proposed for the uncertain end-end to connectivity in VANET. The fundamental concept of CAR is to find out
the connection route between the destination and source. It does not matter whether the route is the shortest
one or not; this is accomplished by using a path detection process before the actual data can be sent.
Moreover, this is because a longer entirely connected path is better than the shortest path, which
may further experience the connectivity issue at some point. Directional propagation protocol (DPP) [38, 39]
makes use of the directional pattern of the vehicles and data to disseminate the packet. DPP demonstrates real
traffic situations where vehicles form groups on the road, and these groups might get detached from each
other. Furthermore, a real traffic situation reflects in research where detached vehicles might make a cluster
with each other. A hybrid routing protocol is also presented, where packets can be directed inside the cluster,
but to associate these clusters, it depends on a prior infrastructure. Even though the real traffic conditions are
reflected in the hybrid routing protocol, its dependence on pre-existing. The major disadvantage of all
existing techniques of data dissemination is that either they do not take account of frequent VANET
disconnection such as VGrid, MURU and PBR or techniques that take account of disconnections, these
techniques have to go through many disadvantages such as routing loops and wasting the limited resources
by sending redundant messages in their data dissemination.
6.1. Quality of service (QoS)-based data dissemination
In VANETs, some of the applications are delay-sensitive. We have other efficiency criteria, such as
applications relevant to health. Therefore, an adequate data distribution service consistency (QoS) program
needs to be developed to guarantee the transmission of data. Wahab [40] proposed a new QoS system
management protocol transmission that can route a packet as soon as possible from the source node to
the destination. Throughout this protocol, a new metric is created to allow various weights for the routing
path between nodes, from which algorithms to build and maintain routes are established. This protocol can
overcome a storm and easily recover if a connection fails. This protocol can solve through consideration of
6. ISSN: 2088-8708
Int J Elec & Comp Eng, Vol. 10, No. 6, December 2020 : 6423 - 6434
6428
one compromise between QoS requirements and strong versatility restrictions, Waheb et al., introduced
a new QoS clustering algorithm [41]. The proposed algorithm was developed to shape and sustain stable
clusters while meeting QoS requirements.
6.2. Delay-based data dissemination
The delayed data distribution approaches have been established to cope efficiently with the diffusion
problem. Such solutions rely on nodes used to pick a relay node for forwarding data packets. UGAD [42]
uses a responsive pause algorithm for suppressing broadcast in city VANETs. At intersections, the UGAD
lets vehicles retransmit easily by setting priority preferences. Furthermore, cars run two separate kinds of
control mechanisms to satisfy the need for transport.
As a consequence, the packet arrival ratio is increased while the redundant transmission is reduced.
A comprehensive method for deciding specific vehicle objectives according to the delay criterion.
TVBR [43] proposes a timer-based vehicle backend network protocol in which each node takes distribution
decisions only through information stored in the header, its current state, and local calculations. This protocol
uses node times to select a relay node to forward the packet. However, if the protocol is not correctly
configured, the time quantity impact will lead to the dissemination stop. In [43], when evaluating data
dissemination, an assessment model is proposed in order to characterize the actions of incorrect forwarding
systems. The results obtained from several simulations help gain insights into the false transmitting issue that
affects the use of VANET-based networking protocols. The suggested model is used to determine the proper
dimensioning of the message flow admission control and pacing control processes, thereby limiting network
charges to an acceptable data rate point.
6.3. Probability-based data dissemination
Probability dependent schemes allow receivers to forward packets that are likely to reduce
the reliability of the information. Wisitpongphan [44] and Tonguz [45] propose two probability-based,
weighted-p-and slotted-p-based, cross-hop transmission protocols. The other node transmits the packet with
a higher likelihood under the Weighted-p Protocol. However, following the gap in this procedure, the chance
of forwarding decreases. Therefore, the enhanced intensity would contribute to more inefficient contact and
a hurricane. The future forwarding region is split into many sections of the Slotted-1 Protocol, with different
waiting times. The node that is further from the sender will wait for less time. However, since the traffic
movement varies over time, it is hard to assess correctly the number of time slots that should be separated.
Panichpapiboon [46] expands the concept of a system for probabilistic broadcasting. The likelihood of
re-transmission is calculated by the spatial function of the inter-vehicle delivery, which enables the IF system
to minimize the amount of duplicate re-transmissions efficiently. Therefore, the IF principle can be extended
for every inter-vehicle separation distribution. Mostafa [47] presents a modern, efficient, and low-collision
packet-forwarding system focused on probabilistic re-transmissions for VANETs. It operates in a distributed
way where every node retransmits a packet with a pre-defined probability. The likelihood is calculated by
many parameters, including the node number, the inter-vehicle gap between the nodes, and the next-hop
propagation path.
6.4. Push-based data dissemination
The push-based distribution of data is suitable for some programs that promote local and public
interest data. This scheme can create low containments during data transmission and collisions.
Schwartz [31] suggests a protocol to disseminate push-based results. When utilizing an efficient distributed
deletion strategy, the diffusion tempest issue with dense density may be minimized throughout the network.
It can effectively control the disconnected network, based on the Carry-and-Future communication strategy.
The newness and robustness of the current procedure are part of the new definition. However, in a dense
environment, the power control system does not significantly reduce the network load. Mondal [84] proposed
to guarantee secure and effective data transfer with one relative position-based data distribution system.
The relative position-based addressing method is configured initially to define the planned receivers
efficiently. A one-way broadcast protocol will then be proposed to make a set of candidate’s nodes store
messages to improve the packet delivery rations and to reduce packet delivery delays. Nevertheless, this
paper has not addressed the problems of intrusion, scalability, and accessibility.
6.5. Pull-based data dissemination
For personal or private details, pull-based data distribution is most suitable, where vehicles can
request data information explicitly. Bai [84] Proposes a unicast-based data distribution architecture
on-demand for VANETs. The system will scatter data as response messages if any question messages are
issued. The real automobiles that just disseminate data are observed. This scheme, however, will increase
7. Int J Elec & Comp Eng ISSN: 2088-8708
Reliable and efficient data dissemination scheme in VANET: a review (Sami Abduljabbar Rashid)
6429
the overhead calculation. Lakas [50] presented a capable and fast transmittal device for vital security
messages. The key to VMP is that it defines several trustworthy transmitters with differentiated delays and
utilizes the cooperative transmission mechanism to support the transmission of the data. It needs, however,
cross-cutting. A peer to peer VANET application is proposed in [51] to track and avoid obstruction in public
transport and to share details on public traffic. The application uses a push-based geo-cast system to collect
and disseminate information efficiently. The program will raise the amount of knowledge shared between
vehicles by incorporating a caching scheme.
6.6. Cluster-based data dissemination
In order to deal with some issues and challenges caused by the particular characteristics of
VANETs, most of the proposed solutions are to self-organize the vehicular network by creating dynamic
clusters. Singh [52] proposed one protocol for multiple target regions for complex and dispersed distribution
of information. This procedure comprises two primary components: configuration of geocasting and
management of geocasting. The former uses route connecting and main points to minimize the overall period
for transmitting the word. Lastly, the concept of regional autonomy divides each region into many small
areas in order to decrease the redundancy of information and dynamic maintenance costs. The suggested
procedure will minimize the probability of the same message and avoid the loss of valuable data.
An algorithm for VANETs is suggested for hybrid backbone-based clusters [53]. The algorithm creates
cluster heads and chooses them, taking into consideration the number of links and versatility for vehicles.
In the context of the growth of a cluster, nodes with reasonably large communication initially create
a backbone called a leadership. The leadership then takes part in unit heads and company reorganization
depending on the relative average pace of vehicles. In [58], a VANET mobile clustering scheme is suggested
to shape clusters that are spread using the Affinity Propagation algorithm. Their clustering algorithm takes
into consideration several variables, such as their average cluster head time, their average participant time,
the average rate of cluster-head shifts, and the total number of network clusters.
In [55], VANET's was introduced for a modern cluster-based emergency data transparency system.
First, the weight value for each node is calculated by taking into account different metrics. The cluster head
was chosen for the node with the minimum weight value. Cluster preparation and repair systems will be
provided. Recently, several techniques and algorithms have been proposed. A study was presented in [45].
The proposed method was focused on the design and delivery of a new Distributed protocol for
the deployment of multi-hop engines. The system was supposed to function in all traffic schemes, including
Dense and sparse extreme scenarios Traffic systems. DV-CAST is a distributed transmission protocol that
only utilizes knowledge from local topology to handle VANET messages. Quality of this is seen in terms of
precision, usefulness, and scalability. The current DV-CAST Protocol is outstanding. In another work [46],
the definition of IF is extended to be specific to any distance distribution of the intervehicle. In this study,
each vehicle should rebroadcast the received information from the network. However, this mechanism would
lead to a useless occupation of the radio channel and would minimize redundancy. While in [47],
the researchers have introduced a new reliable, low-collision vehicle ad hoc network packet forwarding
system based on a radio diffusion probabilistic. The collision-aware reliable forwarding scheme (CAREFOR)
was proposed to work in a distributed network form as each car receiving a packet would resend this packet
to pre-defined likelihood. This opportunity was exploited by various physical influences, such as the density
of the vehicles in the region, extracted from the vehicle environment vehicle transfer and reception, and,
eventually, the next-hop transmission system. However, the convergence of all these variables into one
probability enabled each driver to determine that a new automobile will accept this message, which will be
possible whether the message is returned.
The study of [31] provided a reliable and straightforward mechanism for the transmission of data in
crowded and space-saving vehicle networks. The simulation findings revealed that the proposed protocol
improved the transmission ratio and improved robustness in various path conditions compared with
DV-CAST. [44] Proposed a new scheme to efficiently disseminate the message (RPB-MD) dependent on
the relative location and disseminate vehicle communications in the field of interest effectively. The RPB
method model was suggested to describe the relative position based on Desired zone-of-relevance receivers
accurately. To guarantee a strong coverage level and Low distribution time, DGBR was implemented to have
a spatial greedy transmission routing. The message of high reliability is carried in the nominee nodes
community. Besides, to ensure performance, the time parameters of the protocol are tailored to a document
wide distribution of road characteristics and cars. The feasibility of the protocol was analyzed to show
the strength and confidence of RPB-MD. The findings of the simulations revealed that RPB-MD could
manage a strong output level, minimal overhead relative to current representative structures, reasonable
pause, and fast reliability of the network under specific vehicle densities and transmitting rate of data.
Bai [ 48 ] proposed a crucial function in road safety, detection of traffic accidents, and reduction of traffic
8. ISSN: 2088-8708
Int J Elec & Comp Eng, Vol. 10, No. 6, December 2020 : 6423 - 6434
6430
congestion by disseminating messages among vehicles. The periodic broadcasting was indicated as an
efficient approach to serve the requests of many vehicles without selecting any route between source and
destination. In [50] a study was presented a robust program for the rapid diffusion of safety communication
through critical space, known as vehicle multi-hop broadcasting protocol (VMP), through lowering the end-
to-end latency and re-transmission ratio while retaining high message arrival speeds, the VMP demonstrated
improved results than previous contested systems.
In [51] proposed a VANET technology peer-to-peer exchange of knowledge on highways, allowing
vehicles to identify and mitigate traffic congestion. Amid caching, they have shown that. The quality of
gathered traffic information was maintained, and similar data were achieved for the average decrease of
congested road travel. Another study was presented in [52]. The researchers suggested the knowledge sharing
system SmartGeocast for many target areas, with two protocols, namely the configuration of geocasting and
the management of geocasting. The suggested SmartGeocast protocol demonstrated that the risk of obtaining
repetitive messages could be minimized when attempting to minimize the loss of essential details. Moreover,
a clustering algorithm focused upon hybrid backbone is suggested for VANETs. The definition of the number
of links and versatility of vehicles is used for clusters and the collection of clusters. The findings of simulation
have shown similar cluster stability in metropolitan environments in the proposedalgorithm. [53].
Another article proposed a modern, intelligent transmission-based secure and effective data
distribution method, with a goal to resolve recurrent disconnection problems during data delivery. A detailed
network and traffic analysis for different metrics, such as latency, packet transmission ratio and efficiency.
The suggested densely variable approach increases average PDR and performance by 31.50 percent and
25.30 percent, respectively, relative to state-of-the-art protocols [58]. A new hybrid was proposed in [55].
The proposed technique was namely new hybrid relay class Selection of nodes in which the strongest aspects
of current communication protocols are used optimized accessibility terminology, contact times, and use of
bandwidth minimizing their vulnerabilities. The findings of this working study indicated that the current
hybrid solution improved reachability by up to 10% relative to standard models, which are more successful.
This progress is accomplished because there is a small reduction in contact times and messages saved
re-transmission ratios. The study of [56] intended to refine the method of discovery of suitable paths for
the effective distribution of data in VANETs, including the Encoding and Decoding phases. The method
suggested protects the stability and the likelihood of obstacles event as objective using Euclidean distance in
the polar coordination framework. Extensive models are used for performance measurement strategy, such as
packet distribution partnership, total overhead routing. The findings indicated that the suggested algorithm
was in the current literature greater than other associated structures.
In [57], the author proposed a technique of transmission utilizing a time-barrier method to eliminate
communications that may disrupt the network. The presented approach was focused on the idea that
a supernode should be used to disperse the message rapidly. To avoid unwanted propagation, which can also
trigger the issue of the transmitted hurricane, the time barrier methods are modified in order to resolve
the problem. While in [54], a modern, efficient clustering simulation versatility (MPECS) system was
proposed. The basic concept of MPECS was to split the whole region into separate areas by the Voronoi
graph; in order to enable each vehicle to estimate its lifetime and cost of becoming the cluster head in its
current location. The proposed technique has shown evidence of significant MPECS capabilities enhance
clustering design reliability with reduced overhead, finally, in [54]. This study suggested a modern scheme of
data distribution focused on clustering and CBD. A classification algorithm was initially introduced by
driving Vehicle directions utilizing which vehicles may cluster their data with enough contact time.
The simulation indicated that the new CPB configuration had improved the performance of the systems
regarding knowledge distribution, total communication duration, and the transmission ratio of packets.
Table 1 summarizes recent studies (see Appendix).
7. CONCLUSION
This paper has presented a literature review on various VANET techniques, their routing protocols,
security measures, and quality of services. Based on the literature conducted, the future development to be
done in this research has also been initially proposed that will include analysis, designing, and modeling of
a technique of stable link for message dissemination followed by the proposal to develop a modeled message
dissemination technique. In this research, studies on various factors that influence the incident detection and
monitoring based on the literature have been conducted. This review paper discusses the introduction,
motivation, problem formulation, objectives, and scope of the work and significance of this work. The paper
also includes a comprehensive literature review conducted in the field.
9. Int J Elec & Comp Eng ISSN: 2088-8708
Reliable and efficient data dissemination scheme in VANET: a review (Sami Abduljabbar Rashid)
6431
APPENDIX
Comparison of data dissemination schemes.
Table 1. Comparison of data dissemination protocols
Characteristic Features Map Simulation Advantage Study
Manage the storm
and network link
issue
Work in all transport
environments, detecting
neighborhoods, removing
broadcast and forwarding
of stores
Highway NS2 Powerful against various kinds of
conditions of vehicle traffic, very
scalable and stable especially in
dense traffic, strong network
connectivity
Tonguz et al.
2010 [45]
Redundancies will be
minimized thus
maintaining
transparency
Generalize the reckless
travel definition
Highway Matlab Redundancy package cap Panichpapiboo
n and Chen
2013 [46]
Provide a robust low-
collision transport
network
Job dispersed function Highway Java Performance in small re-
transmission numbers
Mostafa et al .
2014 [47]
Prevent the question
of transmission
Distribution of spatial data Highway OMNeT++ Small backup, no overly large
load Higher output volume
Schwartz et al.
2011 [31]
Reduce interruption
in contact
Dissemination of related
position-based message
Highway NS2 Robust and secure, good
availability, appropriate overhead
connectivity, strong network
usability
Liu and
Chigan 2012
[44]
Avoid channel
obstruction, escape
diffusion wind, solve
secret terminal
problem.
Hierarchy: Root approval
agency, intermediate base
stations, leaf stage
vehicles
Highway Processing
Units
Higher operation block and mean
answer time, higher efficiency
Mondal and
Mitra 2016
[84]
Prevent loss of
packets and address
storm diffusion
problem
Designation of multiple
sponsoring candidate
Highway Qualnet Great availability, small channel
expense
Bai et al. 2009
[50]
Detect and prevent
road haulage
Geo-cast protocol based
on Pull, determines the
optimal routes proactively
Urban RISIM Reduce the amount and reaction
time of transmission
Lakas Shafqa
2011 [51]
Reduce the expense
of communications
and servicing
Dynamic transmission and
delivery of suspicious
information
Urban NS2 Reduced traffic and data diffusion
period, ratio and efficiency
improvement in data receipt
Zhang et al.
2013 [52]
Coordinate
coordination between
nodes, help to
enhance
collaboration and
eradicate the issue of
secret terminals
Cluster formation and
cluster head selection
Urban NS2 Reduce latency and connectivity
expenses and improve network
reliability
Singh and Bali
2015 [53]
The relation stability
is the basis for
selecting the next
transmission node
and a greedy
algorithm for data
transfer
Smart, secure and reliable
data distribution protocol
focused on transmission
Urban NS-3 The suggested program is best for
PDR and efficiency, with a small
latency increase
Chahal et al.
2019 [58]
Selection of hybrid
relay nodes which
attempts to leverage
the best
characteristics of
established messages
Accessibility of
communications, contact
time and the usage of
bandwidth eliminating any
limitation
Highway NS2 The process is better than
traditional approaches
Osama et al.
2019 [55]
Stability of the
relation determined
in the Euclidean
polar system by
distance
A modern DPSO
algorithm with meta-
heuristic interest.
Urban NS-3 The suggested solution is stronger
relative to certain criteria found
than the other protocol
Manisha et al.
2019 [56]
A time limit system
for raising
communication
overhead
Technique to reduce the
overhead of
communications utilizing
a time constraint method
Urban NS-3 Latest approach aims to minimize
pollution by broadcasting
Shah et al.
2019 [57]
Effective clustering
scheme (MPECS)
dependent on
mobility prediction
MPECS is recommended
for enhancing VANETs'
performance.
Urban NS2 Current strategy aims to reduce
pollution by transmission
networks
Tharwat et al.
2019 [54]
Scheme for the
provision of data on
clustering and likely
broadcasting (CPB)
Clustering guidance and
probabilistic radio
programming
Urban NS2 Enhanced packet transmission
efficiency, knowledge
distribution and average time to
transmit.
Liu et al. 2018
[54]
10. ISSN: 2088-8708
Int J Elec & Comp Eng, Vol. 10, No. 6, December 2020 : 6423 - 6434
6432
REFERENCES
[1] Department of Statistics Malaysia, “Compendium of environment statistics,” Percetakan Nasional Malaysia Bhd.,
Malaysia, Putrajaya 2006.
[2] N. M. Shariff, “Private Vehicle Ownership and Transportation Planning in Malaysia,” International Conference on
Traffic and Transportation Engineering (ICTTE 2012), vol. 26, pp. 64-68, 2012.
[3] O. S. Al-heety, et al., “A comprehensive survey: Benefits, Services, Recent works, Challenges, Security and Use
cases for SDN-VANET,” IEEE Access, vol. 8, pp. 1-20, 2020.
[4] Y. Yang and R. Bagrodia, “Evaluation of VANET-based advanced intelligent transportation systems,” in
Proceedings of the Sixth ACM International Workshop on Vehicular Internetworking, New York, NY, USA,
pp. 3-12, 2009.
[5] M. Paolucci and R. Sacile, “Agent-Based Manufacturing and Control Systems,” CRC Press, Florida, United State
of America, 2004.
[6] A. C. Baktir, et al., “How Can Edge Computing Benefit from Software-Defined Networking: A Survey, Use Cases,
and Future Directions,” IEEE Communications Surveys & Tutorials, vol. 19, no. 4, pp. 2359-2391, 2017.
[7] M. A. Saad, et al., “Performance evaluation improvement of energy consumption in adhoc wireless network,”
International Journal of Advanced Science and Technology, vol. 29, no. 3, pp. 4128-4137, 2020.
[8] A. M. Fahad, et al., “Ns2 based performance comparison study between dsr and aodv protocols,”
International Journal of Advanced Trends in Computer Science and Engineering, vol. 8, no. 1.4, pp. 379-393,
2019.
[9] S. Alani, et al., “A new energy consumption technique for mobile Ad-Hoc networks,” International Journal
of Electrical and Computer Engineering (IJECE), vol. 9, no. 5, pp. 4147-4153, 2019.
[10] S. A. Rashid, et al., “Prediction based efficient multi-hop clustering approach with adaptive relay node
selection for VANET,” Journal of Communications, vol. 15, no. 4, pp. 332-344, 2020.
[11] S. A. Hussein and D. P. Dahnil, “A New Hybrid Technique to Improve the Path Selection in Reducing Energy
Consumption in Mobile AD-HOC Networks,” International Journal of Applied Engineering Research,
vol. 12, no. 3, pp. 277-282, 2017.
[12] R. A. Santos, et al., “Performance evaluation of routing Protocols in Vehicular Ad Hoc Networks,” The
International Journal of Ad Hoc and Ubiquitous Computing, vol. 1, no. 1, pp. 80-91, 2005.
[13] M. Ayaida, et al., “Improving the link lifetime in VANETs,” Proceedings of IEEE 36th Conference on Local
Computer Networks (LCN), pp. 905-912, 2011.
[14] J. Blum, et al., “Mobility Management in IVC Networks,” in Proceedings of IEEE Intelligent Vehicles Symposium,
pp. 150-155, 2003.
[15] M. M. Hamdi, et al., “A Survey on Data Dissemination and Routing Protocol in VANET : Types, Challenges,
opportunistic and Future Role,” International Journal of Advanced Science and Technology, vol. 29, no. 5,
pp. 6473-6482, 2020.
[16] E. M. Royer and C. E. Perkins, “Multicast Ad hoc On-demand Distance Vector (MAODV) Routing,” Internet
Draft. [Online]. Available: http://tools.ietf.org/html/draft-ietf-manet-maodv-00.
[17] L. Huang et al., “Efficient Data Traffic Forwarding for Infrastructure-to-Infrastructure Communications in
VANETs,” IEEE Transactions on Intelligent Transportation Systems, vol. 19, no. 3, pp. 839-853, 2018.
[18] C. J. Joshua and V. Varadarajan, “An optimization framework for routing protocols in vanets: a multi-objective
firefly algorithm approach,” Wireless Networks, pp. 1-10, 2019.
[19] H. G. V. Andrade, et al., “Multi-objective approaches to improve QoS in vehicular ad-hoc networks,” Proceedings
of the 8th ACM Symposium on Design and Analysis of Intelligent Vehicular Networks and Applications, pp. 41-48,
2018.
[20] U. Mohanakrishnan and B. Ramakrishnan, “MCTRP: An Energy Efficient Tree Routing Protocol for Vehicular Ad
Hoc Network Using Genetic Whale Optimization Algorithm,” Wireless Personal Communications, vol. 110, no. 1,
pp. 185-206, 2020.
[21] Q. Yang, et al., “ACAR: Adaptive Connectivity Aware Routing for Vehicular Ad Hoc Networks in City
Scenarios,” Mobile Networks and Applications, vol. 15, no. 1, pp. 36-60, 2010.
[22] M. Eusuff, et al., “Shuffled frog-leaping algorithm: A memetic meta-heuristic for discrete optimization,”
Engineering Optimization, vol. 38, no. 2, pp. 129-154, 2006.
[23] V. Krundyshev, et al., “Artificial swarm algorithm for VANET protection against routing attacks,” Proc. -
2018 IEEE Industrial Cyber-Physical Systems (ICPS 2018), pp. 795-800, 2018.
[24] G. Zhang, et al., “Genetic Algorithm Based QoS Perception Routing Protocol for VANETs,” Wireless
Communications and Mobile Computing, vol. 2018, pp. 1-11, 2018.
[25] H. Bello-Salau, et al., “An optimized routing algorithm for vehicle ad-hoc networks,” Engineering Science and
Technology, an International Journal, vol. 22, no. 3, pp. 754-766, 2019.
[26] X. Zhang, et al., “A micro-artificial bee colony based multi-cast routing in vehicular ad hoc networks,” Ad Hoc
Networks, vol. 58, pp. 213-221, 2017.
[27] M. Elhoseny, “Intelligent firefly-based algorithm with Levy distribution (FF-L) for multi-cast routing in vehicular
communications,” Expert Systems with Applications, vol. 140, 2020.
[28] J. J. Mulcahy, et al., “Autonomic computing and VANET,” SoutheastCon, pp. 1-7, 2015.
[29] F. Arena and G. Pau, “An Overview of Vehicular Communications,” Future Internet, vol. 11, no. 2, pp. 27-38,
2019.
11. Int J Elec & Comp Eng ISSN: 2088-8708
Reliable and efficient data dissemination scheme in VANET: a review (Sami Abduljabbar Rashid)
6433
[30] F. Li and Y. Wang, “Routing in vehicular ad hoc networks: A survey,” IEEE Vehicular technology magazine,
vol. 2, no. 2, pp. 12-22, 2007.
[31] R. S. Schwartz, et al., “A directional data dissemination protocol for vehicular environments,” Computer
Communications, vol. 34, no. 17, pp. 2057-2071, 2011.
[32] C. Wu, et al., “A low latency path diversity mechanism for sender- oriented broadcast protocols in VANETs,”
Ad Hoc Networks, vol. 11, no. 7, pp. 2059-2068, 2013.
[33] W. Abdou, et al., “Using an evolutionary algorithm to optimize the broadcasting methods in mobile ad hoc
networks,” Journal of Network and Computer Applications, vol. 34, no. 6, pp. 1794-1804, 2011.
[34] S. Alani, et al., “A Study Review on Mobile Ad-Hoc Network : Characteristics, Applications, Challenges and
Routing Protocols Classification,” International Journal of Advanced Science and Technology, vol. 28, no. 1,
pp. 394-405, 2019.
[35] F. G. Mármol and G. M. Pérez, “TRIP, a trust and reputation infrastructure-based proposal for vehicular ad hoc
networks,” Journal of Network and Computer Applications, vol. 35, no. 3, pp. 934-941, 2012.
[36] W. Alasmary and W. Zhuang, “Mobility impact in IEEE 802.11p infrastructureless vehicular networks,” Ad Hoc
Networks, vol. 10, no. 2, pp. 222-230, 2012.
[37] L. Maglaras, et al., “Social Aspect of Vehicular Communications,” EAI Transactions on Cloud Systems, vol. 1,
no. 1, pp. 1-10, 2015.
[38] B. Khorashadi, et al., “Distributed automated incident detection with VGRID,” IEEE Wireless Communications,
vol. 18, no. 1, pp. 64-73, 2011.
[39] V. Naumov and T. R. Gross, “Connectivity-Aware Routing (CAR) in Vehicular Ad-hoc Networks,” in IEEE
International Conference on Computer Communications (INFOCOM 2007), pp. 1919-1927, 2007.
[40] O. A. Wahab, et al., “VANET QoS-OLSR: QoS- based clustering protocol for vehicular ad hoc networks,”
Computer Communications, vol. 36, no. 13, pp. 1422-1435, 2013.
[41] R. Akamatsu, et al., “Adaptive delay-based geocast protocol for data dissemination in urban VANET,” in 2014
Seventh International Conference on Mobile Computing and Ubiquitous Networking, pp. 141-146, 2014.
[42] P. Salvo, et al., “Timer based distributed dissemination protocols for VANETs and their interaction with MAC
layer,” in IEEE 77th Vehicular Technology Conference, pp. 1-6, 2013.
[43] A. Baiocchi, et al., “Understanding spurious message forwarding in vanet beaconless dissemination protocols: An
analytical approach,” IEEE Transactions on Vehicular Technology, vol. 65, no. 4, pp. 2243-2258, 2016.
[44] N. Wisitpongphan, et al., “Broadcast storm mitigation techniques in vehicular ad hoc networks,” IEEE Wireless
Communications, vol. 14, no. 6, pp. 84-94, 2007.
[45] O. K. Tonguz, et al., “DV-CAST: A distributed vehicular broadcast protocol for vehicular ad hoc networks,” IEEE
Wireless Communications, vol. 17, no. 2, pp. 47-57, 2010.
[46] S. Panichpapiboon and L. Cheng, “Irresponsible forwarding under real intervehicle spacing distributions,” IEEE
Transactions on Vehicular Technology, vol. 62, no. 5, pp. 2264-2272, 2013.
[47] A. Mostafa, et al., “A probabilistic routing by using multi-hop retransmission forecast with packet collision-aware
constraints in vehicular networks,” Ad Hoc Networks, vol. 14, no. 3, pp. 118-129, 2014.
[48] A. Mondal and S. Mitra, “Secure data dissemination in VANET - a pull based approach,” in IEEE International
Conference on Communication, Networks and Satellite, pp. 60-67, 2016.
[49] S. Bai, et al., “Vehicular multi-hop broadcasting protocol for safety message dissemination in VANETs,” in IEEE
70th Vehicular Technology Conference Fall, pp. 1-5, 2009.
[50] A. Lakas and M. Shaqfa, “Geocache: Sharing and exchanging road traffic information using peer-to-peer vehicular
communication,” in Vehicular Technology Conference, pp. 1-7, 2011.
[51] L. Zhang, et al., “Smartgeocast: Dynamic abnormal traffic information dissemination to multiple regions in
VANET,” in Wireless Communications and Mobile Computing Conference, pp. 1750-1755, 2013.
[52] J. P. Singh and R. S. Bali, “A hybrid backbone-based clustering algorithm for vehicular ad-hoc networks,”
Procedia Computer Science, vol. 46, pp. 1005-1013, 2015.
[53] B. Hassanabadi, et al., “Clustering in vehicular ad hoc networks using affinity propagation,” Ad Hoc Networks,
vol. 13, no. 1, pp. 535-548, 2014.
[54] D. Jin, et al., “Cluster based emergency message dissemination scheme for vehicular ad hoc networks,”
in International Conference on Ubiquitous Information Management and Communication, pp. 1-8, 2015.
[55] M. Chahal and S. Harit, “A stable and reliable data dissemination scheme based on intelligent forwarding in
VANETs,” International Journal of Communication Systems, vol. 32, no. 3, 2019.
[56] O. Rehman and M. Ould-Khaoua, “A hybrid relay node selection scheme for message dissemination in VANETs,”
Future Generation Computer Systems, vol. 93, pp. 1-17, 2019.
[57] S. S. Shah, et al., “Time Barrier-Based Emergency Message Dissemination in Vehicular Ad-hoc Networks,”
in IEEE Access, vol. 7, pp. 16494-16503, 2019.
[58] I. T. Abdel-Halim, et al., “Mobility prediction-based efficient clustering scheme for connected and automated
vehicles in VANETs,” Computer Networks, vol. 150, pp. 217-233, 2019.
[59] L. Liu, et al., “A data dissemination scheme based on clustering and probabilistic broadcasting in VANETs,”
Vehicular Communications, vol. 13, pp. 78-88, 2018.
12. ISSN: 2088-8708
Int J Elec & Comp Eng, Vol. 10, No. 6, December 2020 : 6423 - 6434
6434
BIOGRAPHIES OF AUTHORS
Sami Abduljabbar Rashid was born in Al-Anbar, Iraq. He received the B.Eng. Degree in
computer engineering technology from Al-Maarif University College, Iraq and the M.Sc. degree in
communication and computer engineering from University Kebangsaan Malaysia (UKM),
Malaysia. He is currently pursuing the Ph.D. degree in the department of communication
engineering, University Tun Hussein Onn Malaysia (UTHM), Malaysia. His research interests
include wireless and mobile communications and VANET.
Lukman Audah was born in Kuala Lumpur, Malaysia. He received the B.Eng. Degree in
telecommunications from Universiti Teknologi Malaysia, in 2005, and the M.Sc. degree in
communication networks and software and the Ph.D. degree in electronic engineering from
the university of Surrey, U.K. He is currently a lecturer with the communication engineering
Department, University Tun Hussein Onn Malaysia. His research interests include wireless and
mobile communications, Internet traffic engineering, network system management, data security,
and satellite communication.
Mustafa Maad Hamdi was born in Al-Anbar, Iraq. He received the B.Eng. Degree in Computer
Engineering Technology from Al-Maarif University College, Iraq and the M.Sc. degree in
Communication and Computer Engineering from University Kebangsaan Malaysia (UKM),
Malaysia. He is currently pursuing the Ph.D. degree in the department of communication
engineering, University Tun Hussein Onn Malaysia (UTHM), Malaysia. His research interests
include Wireless and Mobile Communications, VANET, MANET, Satellite Communication, and
Cryptographic.
Mohammed Salah Abood was born in Baghdad, Iraq on 5th Dec. 1981, received the BSc degree
in computer engineering from University of Technology, Baghdad-Iraq, in 2004, and the master’s
degree in communication and computer engineering, University Kebangsaan Malaysia (UKM),
Malaysia, in 2016. He is currently studying toward the PhD degree in the field of information and
communication engineering in Beijing Institute of Technology (BIT), Beijing-China, starting on
2019. He is worked as a director of the research division of the directorate of information systems,
MoD-Iraq. His current research interests include, network function virtualization, future mobile
packet core networks, open source networking, internet of things (IoT) especially as the world is
heading towards the 5G networking, software-defined network (SDN), radio access technologies,
cyber security, cryptography, and mobile communication. Finally, I believe in teamwork, open
communication, and growth through the strengths of others.
Sameer Alani was born in Iraq, in 1989. He received the B.S. degree in computer engineering and
the M.Sc. degree in wireless communication and Computer networking technology from
The National University of Malaysia (UKM), in 2017. He is currently pursuing the Ph.D. degree in
wireless communication and networking. His research interests include antenna applications, SDN,
VANET, wireless communication, and networking technology.