In the 2000s, ad hoc networks was developed and highly used in dynamic environment, particularly for inter- vehicular communication (VANETs : Vehicular Ad hoc Networks). Since that time, many researches and developments process was dedicated to VANET networks. This was motivated by the current vehicular industry trend that is leading to a new transport system generation based on the use of new communication technologies in order to provide many services to passengers, the fact that improves the driving and travel’s experience. These systems require traffic information sharing and dissemination the example as the case alert message emitting allowing the driver to minimize driving risks. Sharing such information between vehicles helps to anticipate potentially dangerous situations, as well as planning better routes during congestion situations. In this context, we are trying in this paper to model and simulate VANET Networks in order to analyze and evaluate security information dissemination approaches and mechanisms used in this type of networks in several exchanges conditions.This in order to identify their limitations and suggest a new improved approach. This study was conducted as part of our research project entitled “Simulation & VANETs”, where we justify and validate our approach using modeling and simulation techniques and tools used in this domain.
A Broadcasting Scheme for Message Dissemination in VANETIJERA Editor
Vehicular Ad hoc Networks [VANET] is one of the fastest emerging technologies for research as there are many issues and challenges to be addressed by the researchers before the technology becomes commercialized. Vehicular communication systems developed largely by the growing interest in intelligent transportation systems [ITS]. Cooperative driving can improve safety and efficiency by enabling vehicles to exchange emergency messages to each other in the neighborhood and to assist driver in making proper decision to avoid vehicle collisions and congestion. Broadcast transmission is usually used for disseminating safety related information among vehicles. Message Broadcast over wireless networks poses many challenges due to link unreliability, hidden terminal, message redundancy, and broadcast storm, etc., which greatly degrade the network performance. In most of the emergency situations, there is less time to make a handshake with other nodes in the networks, as the emergency message is to be delivered fast and efficient. Broadcasting information is usually very costly and without limiting techniques this will result in serious data redundancy, contention and collisions. This work focuses on Broadcasting Scheme for Message Dissemination.
Master-Slave Clustering Technique for High Density Traffic in Urban VANET Sce...rifat1tasnim
Moving vehicle is never free of traffic congestion especially in the cities. Every day commuters wastes hours in travelling just because of traffic congestion. This has led to the emergence of vehicular management which will be beneficial for Road Transport department to control and manage the traffic flow on congested roads. Thus to support above idea we have Vehicular Ad-Hoc Network, or VANET technology that turns every participating car into a node, allowing cars to connect with each other and in turn create a network. There are wealthy numbers of approaches were highlighted to solve several thriving challenges of VANET. Clustering technique in vehicle is one of them which made a great impact on VANET. But it fails to fulfill a crucial requirement. Several protocols wanted to build a cluster in low density traffic where the numbers of vehicles are less with respect to transmission range & there is a less chance of broadcast storming which is not a practical scenario. So that cluster formation in high density traffic has arisen as an issue where there is a great possibility to broadcast storm. This paper suggests a “Priority Based Master-Slave Cluster Formation Process” in high density traffic for an urban scenario using “fidelity” metric. With the help of this metric it will be easier to find high density traffic & form priority based Master-Slave dynamically by reducing broadcast storm problem.
In this paper CHP function runs on the vehicular environment which carried out to select a vehicle as Master. In this Ad-hoc wireless environment a dataset is assumed which create a proper environment & generate a graph. Graph results can be analyzed to have the highest one selects as a Master. Thus for the final result, real aspects of vehicular traffic is very essential and scenarios play a very crucial role.
International Journal of Computational Engineering Research (IJCER) ijceronline
International Journal of Computational Engineering Research(IJCER) is an intentional online Journal in English monthly publishing journal. This Journal publish original research work that contributes significantly to further the scientific knowledge in engineering and Technology
A Broadcasting Scheme for Message Dissemination in VANETIJERA Editor
Vehicular Ad hoc Networks [VANET] is one of the fastest emerging technologies for research as there are many issues and challenges to be addressed by the researchers before the technology becomes commercialized. Vehicular communication systems developed largely by the growing interest in intelligent transportation systems [ITS]. Cooperative driving can improve safety and efficiency by enabling vehicles to exchange emergency messages to each other in the neighborhood and to assist driver in making proper decision to avoid vehicle collisions and congestion. Broadcast transmission is usually used for disseminating safety related information among vehicles. Message Broadcast over wireless networks poses many challenges due to link unreliability, hidden terminal, message redundancy, and broadcast storm, etc., which greatly degrade the network performance. In most of the emergency situations, there is less time to make a handshake with other nodes in the networks, as the emergency message is to be delivered fast and efficient. Broadcasting information is usually very costly and without limiting techniques this will result in serious data redundancy, contention and collisions. This work focuses on Broadcasting Scheme for Message Dissemination.
Master-Slave Clustering Technique for High Density Traffic in Urban VANET Sce...rifat1tasnim
Moving vehicle is never free of traffic congestion especially in the cities. Every day commuters wastes hours in travelling just because of traffic congestion. This has led to the emergence of vehicular management which will be beneficial for Road Transport department to control and manage the traffic flow on congested roads. Thus to support above idea we have Vehicular Ad-Hoc Network, or VANET technology that turns every participating car into a node, allowing cars to connect with each other and in turn create a network. There are wealthy numbers of approaches were highlighted to solve several thriving challenges of VANET. Clustering technique in vehicle is one of them which made a great impact on VANET. But it fails to fulfill a crucial requirement. Several protocols wanted to build a cluster in low density traffic where the numbers of vehicles are less with respect to transmission range & there is a less chance of broadcast storming which is not a practical scenario. So that cluster formation in high density traffic has arisen as an issue where there is a great possibility to broadcast storm. This paper suggests a “Priority Based Master-Slave Cluster Formation Process” in high density traffic for an urban scenario using “fidelity” metric. With the help of this metric it will be easier to find high density traffic & form priority based Master-Slave dynamically by reducing broadcast storm problem.
In this paper CHP function runs on the vehicular environment which carried out to select a vehicle as Master. In this Ad-hoc wireless environment a dataset is assumed which create a proper environment & generate a graph. Graph results can be analyzed to have the highest one selects as a Master. Thus for the final result, real aspects of vehicular traffic is very essential and scenarios play a very crucial role.
International Journal of Computational Engineering Research (IJCER) ijceronline
International Journal of Computational Engineering Research(IJCER) is an intentional online Journal in English monthly publishing journal. This Journal publish original research work that contributes significantly to further the scientific knowledge in engineering and Technology
Dynamic multiagent method to avoid duplicated information at intersections in...TELKOMNIKA JOURNAL
Vehicular ad hoc networks (VANETs) allow vehicles to contact one another to provide safety and comfort applications. However, mobility is a great challenge in VANETs. High vehicle speed causes topological changes that result in unstable networks. Therefore, most previous studies focused on using clustering techniques in roads to reduce the effect of vehicle mobility and enhance network stability. Vehicles stop moving at intersections, and their mobility does not impact clustering. However, none of previous studies discussed the impact of vehicle stopping at intersections on base stations (BSs). Vehicles that have stopped moving at intersections continue to send the same information to BSs, which causes duplicated information. Hence, this study proposes a new method named dynamic multiagent (DMA) to filter cluster information and prevent duplicated information from being sent to BSs at intersections. The performance of the proposed method was evaluated through simulations during the use of DMA and without-DMA (W-DMA) methods based on real data collected from 10 intersections in Batu Pahat City, Johor, Malaysia. Overall, the proposed DMA method results in a considerable reduction in duplicated information at intersections, with an average percentage of 81% from the W-DMA method.
Vehicular Ad Hoc Networks (VANETs) are classified as a special application of mobile ad hoc networks (MANETs)
which promise the new possibilities to improve traffic efficiency, road safety driving convenience. By providing the safety and
non-safety applications and sharing the useful information through vehicle to vehicle (V2V) or vehicle to roadside (V2R)
communications to avoid accidents and provide reliable information to travellers, such hot issues seeks much attention of
researchers in this field. VANET and MANET having several common characteristics but VANET differ with applications,
architecture, challenges and data dissemination. The survey of routing protocols in VANETs is important and necessary issue for
smart ITS. The objective of this paper is to design an algorithm for the detection and correction of routing attacks made by
obstructive nodes in VANETS and also drawn the comparison between various metrics like Cost, Average Packet loss,
Throughput and Energy Consumed.
Traffic Control System by Incorporating Message Forwarding ApproachCSCJournals
During the last few years, continuous progresses in wireless communications have opened new research fields in computer networking, aimed at extending data networks connectivity to environments where wired solutions are impracticable. Among these, vehicular traffic is attracting a growing attention from both academia and industry, due to the amount and importance of related distributive applications to mobile entertainment. VANETs are self-organized networks built up from moving vehicles, and are part of the broader class of MANETs. Because of these peculiar characteristics, VANETs require new networking techniques, whose feasibility and performance are usually tested by means of simulation. In order to meet performance goals, it is widely agreed that VANETs must rely heavily on node-to-node communication. In VANET, each vehicle acts as a node and communicates with other vehicles within the range or communicates with base stations. The main idea is to deploy a wireless communication network that has a capability of sending and receiving messages between transmitter and mobile devices in the particular network. Results can be shown using an effective VEINS Simulator. This Simulator can produce detailed vehicular movement traces and can simulate different traffic conditions through fully customizable scenarios. The Framework is expected to be employed using such simulator that makes use of traffic modulator, network simulator and coupling module that integrates the traffic and network.
CROSS LAYER DESIGN APPROACH FOR EFFICIENT DATA DELIVERY BASED ON IEEE 802.11P...pijans
Intelligent Transportation Systems (ITS) have been one of the promising technology that has a great interest attention from many researchers over the world. Vehicular Ad-hoc Network (VANET) communications environment as a part of ITS opens the way for a wide range of applications such as safety applications, mobility and connectivity for both driver and passengers to exploit the transport systems in a smoothly, efficiently and safer way. Several challenging tasks facing adopting VANET functionality for ITS such as modelling of wireless transmission and routing issues. These research issues have become more critical due to the high mobility of vehicles nodes (transmitters and receivers) and unexpected network topology due to the high speed of nodes. In fact, modelling radio propagation channel in VANET environment which considers as one of a stringent communications environment is a challenging task. The selection of a suitable transmission model plays a key role in the routing decisions for VANET. Different propagation models allow calculating the Received Signal Strength (RSS) based on key environmental properties such as the distance between transmitter vehicle and a receiver vehicle, the gain and antenna height of transmitter and a receiver vehicles. Hence, it is useful to calculate RSS and SNR values for a specific propagation model and then these values can be used later for routing decision in order to find the best path with high SNR. This paper evaluates the performance of different transmission models (freespace, two-ray and log-normal) in terms of Receive Signal Strength (RSS). In addition, the performance of such wireless transmission models for vehicular communication in terms of PDR, throughput and delay is evaluated by applying the proposed cross layer routing approach based on IEEE 802.11p. By using MATLAB, the obtained results confirm the best packet delivery ratio for our proposed approach, where it indicates poor quality of DSSS PHY with high number vehicles. The minimum delay achieved when traffic density is decreased.
VEHICULAR AD HOC AND SENSOR NETWORKS; PRINCIPLES AND CHALLENGES ijasuc
The rapid increase of vehicular traffic and congestion on the highways began hampering the safe and
efficient movement of traffic. Consequently, year by year, we see the ascending rate of car accidents and
casualties in most of the countries. Therefore, exploiting the new technologies, e.g. wireless sensor networks,
is required as a solution of reduction of these saddening and reprehensible statistics. This has motivated us to
propose a novel and comprehensive system to utilize Wireless Sensor Networks for vehicular networks. We
coin the vehicular network employing wireless Sensor networks as Vehicular Ad Hoc and Sensor Network, or
VASNET in short. The proposed VASNET is particularly for highway traffic .VASNET is a self-organizing Ad
Hoc and sensor network comprised of a large number of sensor nodes. In VASNET there are two kinds of
sensor nodes, some are embedded on the vehicles-vehicular nodes- and others are deployed in predetermined
distances besides the highway road, known as Road Side Sensor nodes (RSS). The vehicular nodes are used to
sense the velocity of the vehicle for instance. We can have some Base Stations (BS) such as Police Traffic
Station, Firefighting Group and Rescue Team. The base stations may be stationary or mobile. VASNET
provides capability of wireless communication between vehicular nodes and stationary nodes, to increase
safety and comfort for vehicles on the highway roads. In this paper we explain main fundamentals and
challenges of VASNET.
V2V communication systems communicates with the approaching vehicle and avoids the accident by alerting the driver and often it drives away the vehicle if the driver fails to stop it. V2I communication system communicates with the server in the road and reduces the traffic taking place in the road.
Lately, the concept of VANETs (Vehicular Ad hoc Networks) has gotten a huge attention as
more wireless communication technologies becoming available. Such networkis expected to be
one of the most valuable technology for improving efficiency and safety of the future
transportation. Vehicular networks are characterized by high mobility nodes which pose many
communication challenging problems. In vehicular networks, routing Collision Avoidance
Messages (CAMs) among vehicles is a key communication problem.Failure in routing CAMs to
their intended destination within the time constraint can render these messages useless. Many
routing protocols have been adapted for VANETs, such as DSDV (Destination Sequenced
Distance Vector), AODV (Ad-hoc On demand Distance Vector), and DSR (Dynamic Source Routing). This work compares the performance of those routing protocols at different driving environments and scenarios created by using the mobility generator (VanetMobiSim) and
network simulator(NS2). The obtained results at different vehicular densities, speeds, road
obstacles, lanes, traffic lights, and transmission ranges showed that on average AODV protocol outperforms DSR and DSDV protocols in packet delivery ratio and end-toend delay. However, at certain circumstances (e.g., at shorter transmission ranges) DSR tends to have better performance than AODV and DSDV protocols.
This talk by Professor Felix Schmid discussed a systematic approach to the analysis of railway system complexity, with a particular focus on interfaces and interactions. Case studies related to conventional railways, high-speed railways, light rail transit and novel technologies. For more information: http://goo.gl/qLtzY
Big data traffic management in vehicular ad-hoc network IJECEIAES
Today, the world has experienced a new trend with regard to data system management, traditional database management tools have become outdated and they will no longer be able to process the mass of data generated by different systems, that's why big data is there to process this mass of data to bring out crucial information hidden in this data, and without big data technologies the treatment is very difficult to manage; among the domains that uses big data technologies is vehicular ad-hoc network to manage their voluminous data. In this article, we establish in the first step a method that allow to detect anomalies or accidents within the road and compute the time spent in each road section in real time, which permit us to obtain a database having the estimated time spent in all sections in real time, this will serve us to send to the vehicles the right estimated time of arrival all along their journey and the optimal route to attain their destination. This database is useful to utilize it like inputs for machine learning to predict the places and times where the probability of accidents is higher. The experimental results prove that our method permits us to avoid congestions and apportion the load of vehicles in all roads effectively, also it contributes to road safety.
Intelligent Infrastructure for Next-Generation Rail SystemsCognizant
With the rail segment of the transportation system poised for rapid growth, we offer assessment and implementation plans for intelligent infrastructure for rail systems so that rail companies can better manage their rolling stock. Our system shows the evolution of rail system control architecture from managed to utilized to optimized and covers monitoring, analysis, alerts, maintenance and integration.
Traffic Congestion Prediction using Deep Reinforcement Learning in Vehicular ...IJCNCJournal
In recent years, a new wireless network called vehicular ad-hoc network (VANET), has become a popular research topic. VANET allows communication among vehicles and with roadside units by providing information to each other, such as vehicle velocity, location and direction. In general, when many vehicles likely to use the common route to proceed to the same destination, it can lead to a congested route that should be avoided. It may be better if vehicles are able to predict accurately the traffic congestion and then avoid it. Therefore, in this work, the deep reinforcement learning in VANET to enhance the ability to predict traffic congestion on the roads is proposed. Furthermore, different types of neural networks namely Convolutional Neural Network (CNN), Multilayer Perceptron (MLP) and Long Short-Term Memory (LSTM) are investigated and compared in this deep reinforcement learning model to discover the most effective one. Our proposed method is tested by simulation. The traffic scenarios are created using traffic simulator called Simulation of Urban Mobility (SUMO) before integrating with deep reinforcement learning model. The simulation procedures, as well as the programming used, are described in detail. The performance of our proposed method is evaluated using two metrics; the average travelling time delay and average waiting time delay of vehicles. According to the simulation results, the average travelling time delay and average waiting time delay are gradually improved over the multiple runs, since our proposed method receives feedback from the environment. In addition, the results without and with three different deep learning algorithms, i.e., CNN, MLP and LSTM are compared. It is obvious that the deep reinforcement learning model works effectively when traffic density is neither too high nor too low. In addition, it can be concluded that the effective algorithms for traffic congestion prediction models in descending order are MLP, CNN, and LSTM, respectively.
Implementing Secured and Comport Transportation using Vehicular Ad-Hoc Networ...ijtsrd
VANET is the largest wireless communications research area. VANETs of rapidly moving vehicles can be inefficient or unreliable. With the passing of time, VANET technology advances via inter vehicle interaction, but many problems need to be resolved in order to strengthen the network. This paper simulates road traffic simulators in a way that ensures safe communication between different types vehicles and prevents traffic based congestion in the cities of India. Ms. Pooja Deshpande | Mrs. Vrushali Uttarwar | Ms. Ekta Choudhari "Implementing Secured and Comport Transportation using Vehicular Ad-Hoc Network for Realistic City Scenario" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-4 | Issue-1 , December 2019, URL: https://www.ijtsrd.com/papers/ijtsrd29771.pdf Paper URL: https://www.ijtsrd.com/engineering/computer-engineering/29771/implementing-secured-and-comport-transportation-using-vehicular-ad-hoc-network-for-realistic-city-scenario/ms-pooja-deshpande
SIMULATION & VANET: TOWARDS A NEW RELIABLE AND OPTIMAL DATA DISSEMINATION MODELpijans
Ad hoc networks was developed in the 2000s, they was highly used in dynamic environment, particularly
for inter- vehicular communication (VANETs : Vehicular Ad hoc Networks).
Since that time, many researches and developments process was dedicated to VANET networks. These were
motivated by the current vehicular industry trend that is leading to a new transport system generation
based on the use of new communication technologies in order to provide many services to passengers, the
fact that improves the driving and travel’s experience.
These systems require traffic information sharing and dissemination, such as the alert message emitting,
that be exchanged for drivers protection on the road. Sharing such information between vehicles helps to
anticipate potentially dangerous situations, as well as planning better routes during congestion situations.
The current paper attempts to model and simulate VANET Networks, aiming to analyze and evaluate
security information dissemination approaches and mechanisms used in this type of networks in several
exchanges conditions. The second objective is to identify their limitations and suggest a new improved
approach. This study was conducted as part of our research project entitled “Simulation & VANETs”,
where we justify and validate our approach using modeling and simulation techniques and tools used in
this domain.
Definitive broadcasting in vehicular ad hoc networks is the key to success for various services and applications on an intelligent transportation system. Many trusted broadcasting protocols have been proposed but none of them has been evaluated in realistic scenario. In this paper, we discuss these reliable broadcasting protocols on VANET. Basic mechanism in broadcasting, and also we are providing collective research of Broadcasting protocols in vanet in that some real time protocols with their pros cons we have studied.
Dynamic multiagent method to avoid duplicated information at intersections in...TELKOMNIKA JOURNAL
Vehicular ad hoc networks (VANETs) allow vehicles to contact one another to provide safety and comfort applications. However, mobility is a great challenge in VANETs. High vehicle speed causes topological changes that result in unstable networks. Therefore, most previous studies focused on using clustering techniques in roads to reduce the effect of vehicle mobility and enhance network stability. Vehicles stop moving at intersections, and their mobility does not impact clustering. However, none of previous studies discussed the impact of vehicle stopping at intersections on base stations (BSs). Vehicles that have stopped moving at intersections continue to send the same information to BSs, which causes duplicated information. Hence, this study proposes a new method named dynamic multiagent (DMA) to filter cluster information and prevent duplicated information from being sent to BSs at intersections. The performance of the proposed method was evaluated through simulations during the use of DMA and without-DMA (W-DMA) methods based on real data collected from 10 intersections in Batu Pahat City, Johor, Malaysia. Overall, the proposed DMA method results in a considerable reduction in duplicated information at intersections, with an average percentage of 81% from the W-DMA method.
Vehicular Ad Hoc Networks (VANETs) are classified as a special application of mobile ad hoc networks (MANETs)
which promise the new possibilities to improve traffic efficiency, road safety driving convenience. By providing the safety and
non-safety applications and sharing the useful information through vehicle to vehicle (V2V) or vehicle to roadside (V2R)
communications to avoid accidents and provide reliable information to travellers, such hot issues seeks much attention of
researchers in this field. VANET and MANET having several common characteristics but VANET differ with applications,
architecture, challenges and data dissemination. The survey of routing protocols in VANETs is important and necessary issue for
smart ITS. The objective of this paper is to design an algorithm for the detection and correction of routing attacks made by
obstructive nodes in VANETS and also drawn the comparison between various metrics like Cost, Average Packet loss,
Throughput and Energy Consumed.
Traffic Control System by Incorporating Message Forwarding ApproachCSCJournals
During the last few years, continuous progresses in wireless communications have opened new research fields in computer networking, aimed at extending data networks connectivity to environments where wired solutions are impracticable. Among these, vehicular traffic is attracting a growing attention from both academia and industry, due to the amount and importance of related distributive applications to mobile entertainment. VANETs are self-organized networks built up from moving vehicles, and are part of the broader class of MANETs. Because of these peculiar characteristics, VANETs require new networking techniques, whose feasibility and performance are usually tested by means of simulation. In order to meet performance goals, it is widely agreed that VANETs must rely heavily on node-to-node communication. In VANET, each vehicle acts as a node and communicates with other vehicles within the range or communicates with base stations. The main idea is to deploy a wireless communication network that has a capability of sending and receiving messages between transmitter and mobile devices in the particular network. Results can be shown using an effective VEINS Simulator. This Simulator can produce detailed vehicular movement traces and can simulate different traffic conditions through fully customizable scenarios. The Framework is expected to be employed using such simulator that makes use of traffic modulator, network simulator and coupling module that integrates the traffic and network.
CROSS LAYER DESIGN APPROACH FOR EFFICIENT DATA DELIVERY BASED ON IEEE 802.11P...pijans
Intelligent Transportation Systems (ITS) have been one of the promising technology that has a great interest attention from many researchers over the world. Vehicular Ad-hoc Network (VANET) communications environment as a part of ITS opens the way for a wide range of applications such as safety applications, mobility and connectivity for both driver and passengers to exploit the transport systems in a smoothly, efficiently and safer way. Several challenging tasks facing adopting VANET functionality for ITS such as modelling of wireless transmission and routing issues. These research issues have become more critical due to the high mobility of vehicles nodes (transmitters and receivers) and unexpected network topology due to the high speed of nodes. In fact, modelling radio propagation channel in VANET environment which considers as one of a stringent communications environment is a challenging task. The selection of a suitable transmission model plays a key role in the routing decisions for VANET. Different propagation models allow calculating the Received Signal Strength (RSS) based on key environmental properties such as the distance between transmitter vehicle and a receiver vehicle, the gain and antenna height of transmitter and a receiver vehicles. Hence, it is useful to calculate RSS and SNR values for a specific propagation model and then these values can be used later for routing decision in order to find the best path with high SNR. This paper evaluates the performance of different transmission models (freespace, two-ray and log-normal) in terms of Receive Signal Strength (RSS). In addition, the performance of such wireless transmission models for vehicular communication in terms of PDR, throughput and delay is evaluated by applying the proposed cross layer routing approach based on IEEE 802.11p. By using MATLAB, the obtained results confirm the best packet delivery ratio for our proposed approach, where it indicates poor quality of DSSS PHY with high number vehicles. The minimum delay achieved when traffic density is decreased.
VEHICULAR AD HOC AND SENSOR NETWORKS; PRINCIPLES AND CHALLENGES ijasuc
The rapid increase of vehicular traffic and congestion on the highways began hampering the safe and
efficient movement of traffic. Consequently, year by year, we see the ascending rate of car accidents and
casualties in most of the countries. Therefore, exploiting the new technologies, e.g. wireless sensor networks,
is required as a solution of reduction of these saddening and reprehensible statistics. This has motivated us to
propose a novel and comprehensive system to utilize Wireless Sensor Networks for vehicular networks. We
coin the vehicular network employing wireless Sensor networks as Vehicular Ad Hoc and Sensor Network, or
VASNET in short. The proposed VASNET is particularly for highway traffic .VASNET is a self-organizing Ad
Hoc and sensor network comprised of a large number of sensor nodes. In VASNET there are two kinds of
sensor nodes, some are embedded on the vehicles-vehicular nodes- and others are deployed in predetermined
distances besides the highway road, known as Road Side Sensor nodes (RSS). The vehicular nodes are used to
sense the velocity of the vehicle for instance. We can have some Base Stations (BS) such as Police Traffic
Station, Firefighting Group and Rescue Team. The base stations may be stationary or mobile. VASNET
provides capability of wireless communication between vehicular nodes and stationary nodes, to increase
safety and comfort for vehicles on the highway roads. In this paper we explain main fundamentals and
challenges of VASNET.
V2V communication systems communicates with the approaching vehicle and avoids the accident by alerting the driver and often it drives away the vehicle if the driver fails to stop it. V2I communication system communicates with the server in the road and reduces the traffic taking place in the road.
Lately, the concept of VANETs (Vehicular Ad hoc Networks) has gotten a huge attention as
more wireless communication technologies becoming available. Such networkis expected to be
one of the most valuable technology for improving efficiency and safety of the future
transportation. Vehicular networks are characterized by high mobility nodes which pose many
communication challenging problems. In vehicular networks, routing Collision Avoidance
Messages (CAMs) among vehicles is a key communication problem.Failure in routing CAMs to
their intended destination within the time constraint can render these messages useless. Many
routing protocols have been adapted for VANETs, such as DSDV (Destination Sequenced
Distance Vector), AODV (Ad-hoc On demand Distance Vector), and DSR (Dynamic Source Routing). This work compares the performance of those routing protocols at different driving environments and scenarios created by using the mobility generator (VanetMobiSim) and
network simulator(NS2). The obtained results at different vehicular densities, speeds, road
obstacles, lanes, traffic lights, and transmission ranges showed that on average AODV protocol outperforms DSR and DSDV protocols in packet delivery ratio and end-toend delay. However, at certain circumstances (e.g., at shorter transmission ranges) DSR tends to have better performance than AODV and DSDV protocols.
This talk by Professor Felix Schmid discussed a systematic approach to the analysis of railway system complexity, with a particular focus on interfaces and interactions. Case studies related to conventional railways, high-speed railways, light rail transit and novel technologies. For more information: http://goo.gl/qLtzY
Big data traffic management in vehicular ad-hoc network IJECEIAES
Today, the world has experienced a new trend with regard to data system management, traditional database management tools have become outdated and they will no longer be able to process the mass of data generated by different systems, that's why big data is there to process this mass of data to bring out crucial information hidden in this data, and without big data technologies the treatment is very difficult to manage; among the domains that uses big data technologies is vehicular ad-hoc network to manage their voluminous data. In this article, we establish in the first step a method that allow to detect anomalies or accidents within the road and compute the time spent in each road section in real time, which permit us to obtain a database having the estimated time spent in all sections in real time, this will serve us to send to the vehicles the right estimated time of arrival all along their journey and the optimal route to attain their destination. This database is useful to utilize it like inputs for machine learning to predict the places and times where the probability of accidents is higher. The experimental results prove that our method permits us to avoid congestions and apportion the load of vehicles in all roads effectively, also it contributes to road safety.
Intelligent Infrastructure for Next-Generation Rail SystemsCognizant
With the rail segment of the transportation system poised for rapid growth, we offer assessment and implementation plans for intelligent infrastructure for rail systems so that rail companies can better manage their rolling stock. Our system shows the evolution of rail system control architecture from managed to utilized to optimized and covers monitoring, analysis, alerts, maintenance and integration.
Traffic Congestion Prediction using Deep Reinforcement Learning in Vehicular ...IJCNCJournal
In recent years, a new wireless network called vehicular ad-hoc network (VANET), has become a popular research topic. VANET allows communication among vehicles and with roadside units by providing information to each other, such as vehicle velocity, location and direction. In general, when many vehicles likely to use the common route to proceed to the same destination, it can lead to a congested route that should be avoided. It may be better if vehicles are able to predict accurately the traffic congestion and then avoid it. Therefore, in this work, the deep reinforcement learning in VANET to enhance the ability to predict traffic congestion on the roads is proposed. Furthermore, different types of neural networks namely Convolutional Neural Network (CNN), Multilayer Perceptron (MLP) and Long Short-Term Memory (LSTM) are investigated and compared in this deep reinforcement learning model to discover the most effective one. Our proposed method is tested by simulation. The traffic scenarios are created using traffic simulator called Simulation of Urban Mobility (SUMO) before integrating with deep reinforcement learning model. The simulation procedures, as well as the programming used, are described in detail. The performance of our proposed method is evaluated using two metrics; the average travelling time delay and average waiting time delay of vehicles. According to the simulation results, the average travelling time delay and average waiting time delay are gradually improved over the multiple runs, since our proposed method receives feedback from the environment. In addition, the results without and with three different deep learning algorithms, i.e., CNN, MLP and LSTM are compared. It is obvious that the deep reinforcement learning model works effectively when traffic density is neither too high nor too low. In addition, it can be concluded that the effective algorithms for traffic congestion prediction models in descending order are MLP, CNN, and LSTM, respectively.
Implementing Secured and Comport Transportation using Vehicular Ad-Hoc Networ...ijtsrd
VANET is the largest wireless communications research area. VANETs of rapidly moving vehicles can be inefficient or unreliable. With the passing of time, VANET technology advances via inter vehicle interaction, but many problems need to be resolved in order to strengthen the network. This paper simulates road traffic simulators in a way that ensures safe communication between different types vehicles and prevents traffic based congestion in the cities of India. Ms. Pooja Deshpande | Mrs. Vrushali Uttarwar | Ms. Ekta Choudhari "Implementing Secured and Comport Transportation using Vehicular Ad-Hoc Network for Realistic City Scenario" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-4 | Issue-1 , December 2019, URL: https://www.ijtsrd.com/papers/ijtsrd29771.pdf Paper URL: https://www.ijtsrd.com/engineering/computer-engineering/29771/implementing-secured-and-comport-transportation-using-vehicular-ad-hoc-network-for-realistic-city-scenario/ms-pooja-deshpande
SIMULATION & VANET: TOWARDS A NEW RELIABLE AND OPTIMAL DATA DISSEMINATION MODELpijans
Ad hoc networks was developed in the 2000s, they was highly used in dynamic environment, particularly
for inter- vehicular communication (VANETs : Vehicular Ad hoc Networks).
Since that time, many researches and developments process was dedicated to VANET networks. These were
motivated by the current vehicular industry trend that is leading to a new transport system generation
based on the use of new communication technologies in order to provide many services to passengers, the
fact that improves the driving and travel’s experience.
These systems require traffic information sharing and dissemination, such as the alert message emitting,
that be exchanged for drivers protection on the road. Sharing such information between vehicles helps to
anticipate potentially dangerous situations, as well as planning better routes during congestion situations.
The current paper attempts to model and simulate VANET Networks, aiming to analyze and evaluate
security information dissemination approaches and mechanisms used in this type of networks in several
exchanges conditions. The second objective is to identify their limitations and suggest a new improved
approach. This study was conducted as part of our research project entitled “Simulation & VANETs”,
where we justify and validate our approach using modeling and simulation techniques and tools used in
this domain.
Definitive broadcasting in vehicular ad hoc networks is the key to success for various services and applications on an intelligent transportation system. Many trusted broadcasting protocols have been proposed but none of them has been evaluated in realistic scenario. In this paper, we discuss these reliable broadcasting protocols on VANET. Basic mechanism in broadcasting, and also we are providing collective research of Broadcasting protocols in vanet in that some real time protocols with their pros cons we have studied.
Definitive broadcasting in vehicular ad hoc networks is the key to success for various services and applications on an intelligent transportation system. Many trusted broadcasting protocols have been proposed but none of them has been evaluated in realistic scenario. In this paper, we discuss these reliable broadcasting protocols on VANET. Basic mechanism in broadcasting, and also we are providing collective research of Broadcasting protocols in vanet in that some real time protocols with their pros cons we have studied.
Design Approach for Vehicle To Vehicle (V2V) Dissemination of Messages in Veh...IJERA Editor
Designing a protocol structure which contains the control system, VANET device and the type of communication message structures which will implement the message packets for v2v or v2I infrastructure . The different message packets contain the information required to transfer from one node to another in vehicular network for communication. Design various algorithm required for Control, Alert and Infotainment messages. Time stamping lowering data rate efficient packet delivery and proper communication of required messages. Implementation of proposed algorithms and comparison of them with existing algorithms and study of different factors affecting the working of theses algorithms. Analysis of proposed design approach and improvements in results if required.
Technical Review on Different Applications, Challenges and Security in VANETPallavi Agarwal
Vehicular ad-hoc networks (VANETs) technology has turned out as a vital research field throughout the most recent couple of years. VANETs are the likely an impacting way to deal with giving security of driver and different applications for the activity conditions and additionally travelers. Being dynamic in nature, it created the network, according to the condition and requirement of the users and provides consistent communication between the vehicles. Due to its excessive advantages, it is highly susceptible to numerous attacks and security in VANET should be taken into consideration. This paper presented the security issues such as authenticity, integrity, availability, confidentiality, anonymity and non-repudiation to provide the secure communication between Vehicle-to-Vehicle (V2V) and Vehicle-to-Infrastructure (V2I). Numerous research works have been done to recover the performance and security of this network. The fundamental point of this paper is the several security challenges and the applications of VANETs.
Security schemes based on conditional privacy-preserving vehicular ad hoc net...nooriasukmaningtyas
Recently, vehicular ad hoc networks (VANETs) have been garnering
significant inter-est from the people involved in transportation field.
Nowadays automotive manufactur-ers have already supplying vehicles with
multitude of road sensors that provides many useful characteristics. VANET
communication not only offers the drivers and passen-gers with the various
safety related services but also provides a wide range of valuable
applications. However, the inherent openness of the wireless communication
medium used by VANETs exposes vehicles to various security and privacy
issues. Researchers have proposed many security schemes to solve the issues
mentioned above for the widespread deployment of VANETs. However,
these schemes failed to fulfill all as-pects of security and privacy
requirements. Besides, these schemes have not provided the performance
parameters such as computation and communication costs. The pri-mary
emphasis of this paper is on the taxonomy of security schemes based
conditional privacy-preserving with respect to strengths and limitations.
Besides, a comparison be-tween these schemes related to the model of
security and privacy requirements, attacks, and performance parameters is
provided. Finally, this paper critically reviews the re-lated works by taking
into consideration the design and development of all VANETs security and
privacy schemes, this paper could serve as a guide and reference.
ANET: Technical and Future Challenges with a Real Time Vehicular Traffic Simu...IJERA Editor
VANET or Vehicular Ad-Hoc Network is a special type of MANET or Mobile Ad-Hoc Network that is
designed specifically for communications between vehicles or V2V and vehicles to infrastructure or V2I. There
is a lot of studies and research that has been dedicated to study this technology due to its importance and
necessity in our life. The fact that each and every module presented must be tested thoroughly before putting it
into action, as there will be severe consequences in case of a system malfunction especially if it's a vehicular
design problem. However, seeing VANETS coming into reality becomes very close with the advancement of
IEEE 802.11p standard that is being dedicated to the DSRC or dedicated short range communication [1]. This
paper will discuss this technology emphasizing some of its applications, current limitations and future challenges
plus simulating a real traffic using SUMO and OpenStreetMap
Edge computing for CAVs and VRU protection Carl Jackson
A partnership between the University of Melbourne, Cisco,
Cohda Wireless, TAC, VicRoads and WSP has completed
a round of trials in the AIMES ecosystem (the Australian
Integrated Multimodal EcoSystem), leveraging the
infrastructure for connected and automated vehicles, and
for edge computing.
Effective Road Model for Congestion Control in VANETSijwmn
Congestion on the roads is a key problem to deal with, which wastes valuable time.. Due to high mobility
rate and relative speed link failure occur very often. VANET is used to tackle the problem of congestion,
and make decisions well in advance to avoid traffic congestion. In this paper we proposed a solution to
detect and control the traffic congestion by using of both (V2V) and (V2I), as a result the drivers become
aware of the location of congestion as well as way to avoid getting stuck in congestion. The congestion is
detected by analyzing the data obtained by vehicular communication and road side units to avoid the
traffic. Our proposition system is competent of detecting and controlling traffic congestion in real-time.
V2V and V2I communication network is used to receive and send the messages. We simulate the result by
using Congestion Detection and Control Algorithm (CDCA), and show that this is one effective way to
control congestion. The Proposed methodology ensures reliable and timely delivery of messages to know
about congestion and avoid it.
A Study of Sybil and Temporal Attacks in Vehicular Ad Hoc Networks: Types, Ch...Editor IJCATR
In recent years, the number of automobiles on the road has increased tremendously. Due to high density and mobility of vehicles,
possible threats and road accidents are increasing. Wireless communication allows sending safety and other critical information. Due to this
inherent wireless characteristic and periodic exchange of safety packets, Vehicular Ad-hoc Network (VANET) is vulnerable to number of
security threats like Sybil attack or temporal attack. In this paper, a detailed discussion has been done on both the type of attacks. With the
help of already published works, some approaches have also been studied which have proved to be of significance in detection of these
attacks.
Edge computing for CAVs and VRU protectionCarl Jackson
A partnership between the University of Melbourne, Cisco,
Cohda Wireless, TAC, VicRoads and WSP has completed
a round of trials in the AIMES ecosystem (the Australian
Integrated Multimodal EcoSystem), leveraging the
infrastructure for connected and automated vehicles, and
for edge computing.
Predictive Data Dissemination in VanetDhruvMarothi
The vehicle itself is an information source that produces a large amount of various information including actual vehicle and environment sensors. The implementation of an efficient and scalable model for information dissemination in VANETs possesses major issues. In this dynamic environment, an ever-growing number of context dissemination messages are leveling up the usage of the channel which affects the network performance. This presentation tries to analyze and assess the key ideas of how to overcome the context data dissemination and how to reduce the amounts of transferred and stored data in a vehicular cooperation environment. This is one of the most prominent topics of pervasive computing.
Towards Improving Road Safety Using Advanced Vehicular NetworksTELKOMNIKA JOURNAL
Vehicular Ad-hoc Networks (VANETs) are advanced network technologies applied to improve safety on roads and to offer suitable solutions for Intelligent Transportation Systems (ITS). The goal of VANETs is to assistdrivers and to act as a smart co-pilot that can alret about accidents and help avoiding them while prodivding high-end infotainment systems for both the driver and passengers. Consequently, VANETs can save millions of lives around the world, especially in Saudi Arabia, which has a very high rate of road accidents annualy. In this paper, we introduce and discuss VANETs, related routing protocols, challenging problems, and the existing solutions. This work is a part of a bigger project that aims to enhance VANETs technologies and to updapteITS to significantly promote road safety in general and Saudi Arabia’s roads in particular.
In vehicular ad hoc network (VANETs), the applications mainly focused on the road challenging subclass of Mobile Ad-hoc Network, which empowers smart transmission among vehicles and between vehicles and roadside frameworks. It is an optimistic methodology for the Intelligent Transport System (ITS). There are numerous difficulties to be tended while utilizing VANET. It is flexible and has a high dynamic topology and flexibility which makes the conventional MANET protocols unacceptable for VANET. Trust is a principal element which is used to create a trustful environment to improve the security in vehicular networks. Trust can be calculated by observing the human behavior which creates a trusted communicating environment. In this paper, we define the architecture of VANET, then the communication establishment and various challenges. Some trust models had been defined in this paper to enforce honest information sharing between communicating nodes. Trust establishment is compulsory among communicating vehicles to build a secure messages exchange and reliability.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Similar to TOWARDS A NEW APPROACH OF DATA DISSEMINATION IN VANETS NETWORKS (20)
ANALYSIS OF LAND SURFACE DEFORMATION GRADIENT BY DINSAR cscpconf
The progressive development of Synthetic Aperture Radar (SAR) systems diversify the exploitation of the generated images by these systems in different applications of geoscience. Detection and monitoring surface deformations, procreated by various phenomena had benefited from this evolution and had been realized by interferometry (InSAR) and differential interferometry (DInSAR) techniques. Nevertheless, spatial and temporal decorrelations of the interferometric couples used, limit strongly the precision of analysis results by these techniques. In this context, we propose, in this work, a methodological approach of surface deformation detection and analysis by differential interferograms to show the limits of this technique according to noise quality and level. The detectability model is generated from the deformation signatures, by simulating a linear fault merged to the images couples of ERS1 / ERS2 sensors acquired in a region of the Algerian south.
4D AUTOMATIC LIP-READING FOR SPEAKER'S FACE IDENTIFCATIONcscpconf
A novel based a trajectory-guided, concatenating approach for synthesizing high-quality image real sample renders video is proposed . The lips reading automated is seeking for modeled the closest real image sample sequence preserve in the library under the data video to the HMM predicted trajectory. The object trajectory is modeled obtained by projecting the face patterns into an KDA feature space is estimated. The approach for speaker's face identification by using synthesise the identity surface of a subject face from a small sample of patterns which sparsely each the view sphere. An KDA algorithm use to the Lip-reading image is discrimination, after that work consisted of in the low dimensional for the fundamental lip features vector is reduced by using the 2D-DCT.The mouth of the set area dimensionality is ordered by a normally reduction base on the PCA to obtain the Eigen lips approach, their proposed approach by[33]. The subjective performance results of the cost function under the automatic lips reading modeled , which wasn’t illustrate the superior performance of the
method.
MOVING FROM WATERFALL TO AGILE PROCESS IN SOFTWARE ENGINEERING CAPSTONE PROJE...cscpconf
Universities offer software engineering capstone course to simulate a real world-working environment in which students can work in a team for a fixed period to deliver a quality product. The objective of the paper is to report on our experience in moving from Waterfall process to Agile process in conducting the software engineering capstone project. We present the capstone course designs for both Waterfall driven and Agile driven methodologies that highlight the structure, deliverables and assessment plans.To evaluate the improvement, we conducted a survey for two different sections taught by two different instructors to evaluate students’ experience in moving from traditional Waterfall model to Agile like process. Twentyeight students filled the survey. The survey consisted of eight multiple-choice questions and an open-ended question to collect feedback from students. The survey results show that students were able to attain hands one experience, which simulate a real world-working environment. The results also show that the Agile approach helped students to have overall better design and avoid mistakes they have made in the initial design completed in of the first phase of the capstone project. In addition, they were able to decide on their team capabilities, training needs and thus learn the required technologies earlier which is reflected on the final product quality
PROMOTING STUDENT ENGAGEMENT USING SOCIAL MEDIA TECHNOLOGIEScscpconf
Using social media in education provides learners with an informal way for communication. Informal communication tends to remove barriers and hence promotes student engagement. This paper presents our experience in using three different social media technologies in teaching software project management course. We conducted different surveys at the end of every semester to evaluate students’ satisfaction and engagement. Results show that using social media enhances students’ engagement and satisfaction. However, familiarity with the tool is an important factor for student satisfaction.
A SURVEY ON QUESTION ANSWERING SYSTEMS: THE ADVANCES OF FUZZY LOGICcscpconf
In real world computing environment with using a computer to answer questions has been a human dream since the beginning of the digital era, Question-answering systems are referred to as intelligent systems, that can be used to provide responses for the questions being asked by the user based on certain facts or rules stored in the knowledge base it can generate answers of questions asked in natural , and the first main idea of fuzzy logic was to working on the problem of computer understanding of natural language, so this survey paper provides an overview on what Question-Answering is and its system architecture and the possible relationship and
different with fuzzy logic, as well as the previous related research with respect to approaches that were followed. At the end, the survey provides an analytical discussion of the proposed QA models, along or combined with fuzzy logic and their main contributions and limitations.
DYNAMIC PHONE WARPING – A METHOD TO MEASURE THE DISTANCE BETWEEN PRONUNCIATIONS cscpconf
Human beings generate different speech waveforms while speaking the same word at different times. Also, different human beings have different accents and generate significantly varying speech waveforms for the same word. There is a need to measure the distances between various words which facilitate preparation of pronunciation dictionaries. A new algorithm called Dynamic Phone Warping (DPW) is presented in this paper. It uses dynamic programming technique for global alignment and shortest distance measurements. The DPW algorithm can be used to enhance the pronunciation dictionaries of the well-known languages like English or to build pronunciation dictionaries to the less known sparse languages. The precision measurement experiments show 88.9% accuracy.
INTELLIGENT ELECTRONIC ASSESSMENT FOR SUBJECTIVE EXAMS cscpconf
In education, the use of electronic (E) examination systems is not a novel idea, as Eexamination systems have been used to conduct objective assessments for the last few years. This research deals with randomly designed E-examinations and proposes an E-assessment system that can be used for subjective questions. This system assesses answers to subjective questions by finding a matching ratio for the keywords in instructor and student answers. The matching ratio is achieved based on semantic and document similarity. The assessment system is composed of four modules: preprocessing, keyword expansion, matching, and grading. A survey and case study were used in the research design to validate the proposed system. The examination assessment system will help instructors to save time, costs, and resources, while increasing efficiency and improving the productivity of exam setting and assessments.
TWO DISCRETE BINARY VERSIONS OF AFRICAN BUFFALO OPTIMIZATION METAHEURISTICcscpconf
African Buffalo Optimization (ABO) is one of the most recent swarms intelligence based metaheuristics. ABO algorithm is inspired by the buffalo’s behavior and lifestyle. Unfortunately, the standard ABO algorithm is proposed only for continuous optimization problems. In this paper, the authors propose two discrete binary ABO algorithms to deal with binary optimization problems. In the first version (called SBABO) they use the sigmoid function and probability model to generate binary solutions. In the second version (called LBABO) they use some logical operator to operate the binary solutions. Computational results on two knapsack problems (KP and MKP) instances show the effectiveness of the proposed algorithm and their ability to achieve good and promising solutions.
DETECTION OF ALGORITHMICALLY GENERATED MALICIOUS DOMAINcscpconf
In recent years, many malware writers have relied on Dynamic Domain Name Services (DDNS) to maintain their Command and Control (C&C) network infrastructure to ensure a persistence presence on a compromised host. Amongst the various DDNS techniques, Domain Generation Algorithm (DGA) is often perceived as the most difficult to detect using traditional methods. This paper presents an approach for detecting DGA using frequency analysis of the character distribution and the weighted scores of the domain names. The approach’s feasibility is demonstrated using a range of legitimate domains and a number of malicious algorithmicallygenerated domain names. Findings from this study show that domain names made up of English characters “a-z” achieving a weighted score of < 45 are often associated with DGA. When a weighted score of < 45 is applied to the Alexa one million list of domain names, only 15% of the domain names were treated as non-human generated.
GLOBAL MUSIC ASSET ASSURANCE DIGITAL CURRENCY: A DRM SOLUTION FOR STREAMING C...cscpconf
The amount of piracy in the streaming digital content in general and the music industry in specific is posing a real challenge to digital content owners. This paper presents a DRM solution to monetizing, tracking and controlling online streaming content cross platforms for IP enabled devices. The paper benefits from the current advances in Blockchain and cryptocurrencies. Specifically, the paper presents a Global Music Asset Assurance (GoMAA) digital currency and presents the iMediaStreams Blockchain to enable the secure dissemination and tracking of the streamed content. The proposed solution provides the data owner the ability to control the flow of information even after it has been released by creating a secure, selfinstalled, cross platform reader located on the digital content file header. The proposed system provides the content owners’ options to manage their digital information (audio, video, speech, etc.), including the tracking of the most consumed segments, once it is release. The system benefits from token distribution between the content owner (Music Bands), the content distributer (Online Radio Stations) and the content consumer(Fans) on the system blockchain.
IMPORTANCE OF VERB SUFFIX MAPPING IN DISCOURSE TRANSLATION SYSTEMcscpconf
This paper discusses the importance of verb suffix mapping in Discourse translation system. In
discourse translation, the crucial step is Anaphora resolution and generation. In Anaphora
resolution, cohesion links like pronouns are identified between portions of text. These binders
make the text cohesive by referring to nouns appearing in the previous sentences or nouns
appearing in sentences after them. In Machine Translation systems, to convert the source
language sentences into meaningful target language sentences the verb suffixes should be
changed as per the cohesion links identified. This step of translation process is emphasized in
the present paper. Specifically, the discussion is on how the verbs change according to the
subjects and anaphors. To explain the concept, English is used as the source language (SL) and
an Indian language Telugu is used as Target language (TL)
EXACT SOLUTIONS OF A FAMILY OF HIGHER-DIMENSIONAL SPACE-TIME FRACTIONAL KDV-T...cscpconf
In this paper, based on the definition of conformable fractional derivative, the functional
variable method (FVM) is proposed to seek the exact traveling wave solutions of two higherdimensional
space-time fractional KdV-type equations in mathematical physics, namely the
(3+1)-dimensional space–time fractional Zakharov-Kuznetsov (ZK) equation and the (2+1)-
dimensional space–time fractional Generalized Zakharov-Kuznetsov-Benjamin-Bona-Mahony
(GZK-BBM) equation. Some new solutions are procured and depicted. These solutions, which
contain kink-shaped, singular kink, bell-shaped soliton, singular soliton and periodic wave
solutions, have many potential applications in mathematical physics and engineering. The
simplicity and reliability of the proposed method is verified.
AUTOMATED PENETRATION TESTING: AN OVERVIEWcscpconf
The using of information technology resources is rapidly increasing in organizations,
businesses, and even governments, that led to arise various attacks, and vulnerabilities in the
field. All resources make it a must to do frequently a penetration test (PT) for the environment
and see what can the attacker gain and what is the current environment's vulnerabilities. This
paper reviews some of the automated penetration testing techniques and presents its
enhancement over the traditional manual approaches. To the best of our knowledge, it is the
first research that takes into consideration the concept of penetration testing and the standards
in the area.This research tackles the comparison between the manual and automated
penetration testing, the main tools used in penetration testing. Additionally, compares between
some methodologies used to build an automated penetration testing platform.
CLASSIFICATION OF ALZHEIMER USING fMRI DATA AND BRAIN NETWORKcscpconf
Since the mid of 1990s, functional connectivity study using fMRI (fcMRI) has drawn increasing
attention of neuroscientists and computer scientists, since it opens a new window to explore
functional network of human brain with relatively high resolution. BOLD technique provides
almost accurate state of brain. Past researches prove that neuro diseases damage the brain
network interaction, protein- protein interaction and gene-gene interaction. A number of
neurological research paper also analyse the relationship among damaged part. By
computational method especially machine learning technique we can show such classifications.
In this paper we used OASIS fMRI dataset affected with Alzheimer’s disease and normal
patient’s dataset. After proper processing the fMRI data we use the processed data to form
classifier models using SVM (Support Vector Machine), KNN (K- nearest neighbour) & Naïve
Bayes. We also compare the accuracy of our proposed method with existing methods. In future,
we will other combinations of methods for better accuracy.
VALIDATION METHOD OF FUZZY ASSOCIATION RULES BASED ON FUZZY FORMAL CONCEPT AN...cscpconf
In order to treat and analyze real datasets, fuzzy association rules have been proposed. Several
algorithms have been introduced to extract these rules. However, these algorithms suffer from
the problems of utility, redundancy and large number of extracted fuzzy association rules. The
expert will then be confronted with this huge amount of fuzzy association rules. The task of
validation becomes fastidious. In order to solve these problems, we propose a new validation
method. Our method is based on three steps. (i) We extract a generic base of non redundant
fuzzy association rules by applying EFAR-PN algorithm based on fuzzy formal concept analysis.
(ii) we categorize extracted rules into groups and (iii) we evaluate the relevance of these rules
using structural equation model.
PROBABILITY BASED CLUSTER EXPANSION OVERSAMPLING TECHNIQUE FOR IMBALANCED DATAcscpconf
In many applications of data mining, class imbalance is noticed when examples in one class are
overrepresented. Traditional classifiers result in poor accuracy of the minority class due to the
class imbalance. Further, the presence of within class imbalance where classes are composed of
multiple sub-concepts with different number of examples also affect the performance of
classifier. In this paper, we propose an oversampling technique that handles between class and
within class imbalance simultaneously and also takes into consideration the generalization
ability in data space. The proposed method is based on two steps- performing Model Based
Clustering with respect to classes to identify the sub-concepts; and then computing the
separating hyperplane based on equal posterior probability between the classes. The proposed
method is tested on 10 publicly available data sets and the result shows that the proposed
method is statistically superior to other existing oversampling methods.
CHARACTER AND IMAGE RECOGNITION FOR DATA CATALOGING IN ECOLOGICAL RESEARCHcscpconf
Data collection is an essential, but manpower intensive procedure in ecological research. An
algorithm was developed by the author which incorporated two important computer vision
techniques to automate data cataloging for butterfly measurements. Optical Character
Recognition is used for character recognition and Contour Detection is used for imageprocessing.
Proper pre-processing is first done on the images to improve accuracy. Although
there are limitations to Tesseract’s detection of certain fonts, overall, it can successfully identify
words of basic fonts. Contour detection is an advanced technique that can be utilized to
measure an image. Shapes and mathematical calculations are crucial in determining the precise
location of the points on which to draw the body and forewing lines of the butterfly. Overall,
92% accuracy were achieved by the program for the set of butterflies measured.
SOCIAL MEDIA ANALYTICS FOR SENTIMENT ANALYSIS AND EVENT DETECTION IN SMART CI...cscpconf
Smart cities utilize Internet of Things (IoT) devices and sensors to enhance the quality of the city
services including energy, transportation, health, and much more. They generate massive
volumes of structured and unstructured data on a daily basis. Also, social networks, such as
Twitter, Facebook, and Google+, are becoming a new source of real-time information in smart
cities. Social network users are acting as social sensors. These datasets so large and complex
are difficult to manage with conventional data management tools and methods. To become
valuable, this massive amount of data, known as 'big data,' needs to be processed and
comprehended to hold the promise of supporting a broad range of urban and smart cities
functions, including among others transportation, water, and energy consumption, pollution
surveillance, and smart city governance. In this work, we investigate how social media analytics
help to analyze smart city data collected from various social media sources, such as Twitter and
Facebook, to detect various events taking place in a smart city and identify the importance of
events and concerns of citizens regarding some events. A case scenario analyses the opinions of
users concerning the traffic in three largest cities in the UAE
SOCIAL NETWORK HATE SPEECH DETECTION FOR AMHARIC LANGUAGEcscpconf
The anonymity of social networks makes it attractive for hate speech to mask their criminal
activities online posing a challenge to the world and in particular Ethiopia. With this everincreasing
volume of social media data, hate speech identification becomes a challenge in
aggravating conflict between citizens of nations. The high rate of production, has become
difficult to collect, store and analyze such big data using traditional detection methods. This
paper proposed the application of apache spark in hate speech detection to reduce the
challenges. Authors developed an apache spark based model to classify Amharic Facebook
posts and comments into hate and not hate. Authors employed Random forest and Naïve Bayes
for learning and Word2Vec and TF-IDF for feature selection. Tested by 10-fold crossvalidation,
the model based on word2vec embedding performed best with 79.83%accuracy. The
proposed method achieve a promising result with unique feature of spark for big data.
GENERAL REGRESSION NEURAL NETWORK BASED POS TAGGING FOR NEPALI TEXTcscpconf
This article presents Part of Speech tagging for Nepali text using General Regression Neural
Network (GRNN). The corpus is divided into two parts viz. training and testing. The network is
trained and validated on both training and testing data. It is observed that 96.13% words are
correctly being tagged on training set whereas 74.38% words are tagged correctly on testing
data set using GRNN. The result is compared with the traditional Viterbi algorithm based on
Hidden Markov Model. Viterbi algorithm yields 97.2% and 40% classification accuracies on
training and testing data sets respectively. GRNN based POS Tagger is more consistent than the
traditional Viterbi decoding technique.
Key Trends Shaping the Future of Infrastructure.pdfCheryl Hung
Keynote at DIGIT West Expo, Glasgow on 29 May 2024.
Cheryl Hung, ochery.com
Sr Director, Infrastructure Ecosystem, Arm.
The key trends across hardware, cloud and open-source; exploring how these areas are likely to mature and develop over the short and long-term, and then considering how organisations can position themselves to adapt and thrive.
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
JMeter webinar - integration with InfluxDB and GrafanaRTTS
Watch this recorded webinar about real-time monitoring of application performance. See how to integrate Apache JMeter, the open-source leader in performance testing, with InfluxDB, the open-source time-series database, and Grafana, the open-source analytics and visualization application.
In this webinar, we will review the benefits of leveraging InfluxDB and Grafana when executing load tests and demonstrate how these tools are used to visualize performance metrics.
Length: 30 minutes
Session Overview
-------------------------------------------
During this webinar, we will cover the following topics while demonstrating the integrations of JMeter, InfluxDB and Grafana:
- What out-of-the-box solutions are available for real-time monitoring JMeter tests?
- What are the benefits of integrating InfluxDB and Grafana into the load testing stack?
- Which features are provided by Grafana?
- Demonstration of InfluxDB and Grafana using a practice web application
To view the webinar recording, go to:
https://www.rttsweb.com/jmeter-integration-webinar
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
Neuro-symbolic is not enough, we need neuro-*semantic*Frank van Harmelen
Neuro-symbolic (NeSy) AI is on the rise. However, simply machine learning on just any symbolic structure is not sufficient to really harvest the gains of NeSy. These will only be gained when the symbolic structures have an actual semantics. I give an operational definition of semantics as “predictable inference”.
All of this illustrated with link prediction over knowledge graphs, but the argument is general.
Transcript: Selling digital books in 2024: Insights from industry leaders - T...BookNet Canada
The publishing industry has been selling digital audiobooks and ebooks for over a decade and has found its groove. What’s changed? What has stayed the same? Where do we go from here? Join a group of leading sales peers from across the industry for a conversation about the lessons learned since the popularization of digital books, best practices, digital book supply chain management, and more.
Link to video recording: https://bnctechforum.ca/sessions/selling-digital-books-in-2024-insights-from-industry-leaders/
Presented by BookNet Canada on May 28, 2024, with support from the Department of Canadian Heritage.
The Art of the Pitch: WordPress Relationships and SalesLaura Byrne
Clients don’t know what they don’t know. What web solutions are right for them? How does WordPress come into the picture? How do you make sure you understand scope and timeline? What do you do if sometime changes?
All these questions and more will be explored as we talk about matching clients’ needs with what your agency offers without pulling teeth or pulling your hair out. Practical tips, and strategies for successful relationship building that leads to closing the deal.
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
Accelerate your Kubernetes clusters with Varnish CachingThijs Feryn
A presentation about the usage and availability of Varnish on Kubernetes. This talk explores the capabilities of Varnish caching and shows how to use the Varnish Helm chart to deploy it to Kubernetes.
This presentation was delivered at K8SUG Singapore. See https://feryn.eu/presentations/accelerate-your-kubernetes-clusters-with-varnish-caching-k8sug-singapore-28-2024 for more details.
Generating a custom Ruby SDK for your web service or Rails API using Smithyg2nightmarescribd
Have you ever wanted a Ruby client API to communicate with your web service? Smithy is a protocol-agnostic language for defining services and SDKs. Smithy Ruby is an implementation of Smithy that generates a Ruby SDK using a Smithy model. In this talk, we will explore Smithy and Smithy Ruby to learn how to generate custom feature-rich SDKs that can communicate with any web service, such as a Rails JSON API.
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
2. 14 Computer Science & Information Technology (CS & IT)
emergence of new communication technologies in the automotive industry in order to provide
passengers more services to enhance the driving experience and travelers.
These systems recently known as Vehicular Ad hoc NETworks (VANET), systems allow
communications between vehicles in order to exchange and share relevant information ,in the
form of different categories of applications. A safety application is one of these applications that
have aroused great interest among researchers.
In addition, the VANET systems often require knowledge of road conditions such as road status,
accidents and congestion situations, and therefore the transmission of warnings messages
allowing the driver of the drivers , this for minimize the dangers of driving. The exchange of
such information and its sharing with distant vehicles can also help to anticipate potentially
dangerous situations and to plan better routes during congestion situations.
The objective of this paper is to build a simulation model for the analysis of data dissemination
protocols in vehicular ad hoc networks, in order to propose a new approach of traffic data
dissemination which remedy insufficiencies of the approaches currently used. Where we interest
in warning messages delivered in VANET networks. For achieve a better diffusion of these
messages, consequently try to find the best parameters as time of dissemination and network
overhead rates.
2.VANET NETWORK
Vehicular networks are a new class of wireless networks that have emerged by means of
advances in wireless technology and the automotive industry. These networks also known with
name of VANETs, which are considered as one of the real applications of ad hoc network, for
communication between adjacent vehicles also between vehicles and stationary equipment.
The objective of VANET networks is to apply some notifications, such as dissemination of alert
messages, reporting an accident between vehicles to reduce the probability of collision, the
multimedia real-time applications and many other applications...
3. SHARING AND DISSEMINATION OF DATA IN VANET
Dissemination of traffic information is the principle of several research works, in consequence of
the fact that the information is always shared concerns the traffic situation (for example the state
of the road, condition of the car ...) in order to facilitate the movement of drivers and passengers
on the roads, to enable them to take appropriate decisions to changes occurring in the road. In
particular the information relevant to the risks and dangerous cases occur on the roads, this
information necessities the immediate release and quick [1, 2, 3, 4] to ensure traffic safety.
This type of information is usually sent to a group of vehicles where the public interest here is
consequently the most appropriate method is broadcast. although there are special cases where
interest is concerned a specific group (eg: Geocast) (see Figure 1 and 2) .in general, the authors
focus on methods Broadcast and Multicast, Geocast ... [1, 5, 6] according to their objective and
their needs. In parallel with the fact that VANETs networks are mainly based on the ad hoc short-
range communication between the vehicles to improve safety in vehicular environments (WAVE:
iEEE 802.11p).
3. Computer Science & Information Technology (CS & IT) 15
Figure 1. The information addressed to a specific group of vehicles
Figure 2. Information sent to all vehicles
Indeed, these previous studies use different concepts to achieve their goals and again to get the
best results by a specific need (objective work). What is generally similar in these works is (1)
the use of length of time. These shared information (warning messages, alerts messages ..) are
issued only for a period of time (as long as the danger has existed), although there are very
dangerous events cannot stand the wait and require the immediate release, this idea is not entirely
absent, though his realism that is somewhat missed. (2) The lack of attention to the nature of the
danger, for example:
• Loss of control over a truck carrying a flammable liquid, resulted in this slippage vehicle on
Highway contains dozens of vehicles where the movement is very fast (vehicle speed can exceed
100 km / h), this shift is 100 m from the place of the accident (in Algeria).
• Another example: an accident occurs several times in European pays (like Belgium), the loss of
control of the vehicle because of a breakdown on the level of the device named the limiting
device and speed regulator where the vehicle was blocked at the speed of 200 km/h on the road.
4. 16 Computer Science & Information Technology (CS & IT)
• The results of these accidents were catastrophic, and that because of the lack of availability of
the diffusion of this information in real time on the road.
Thus our objective in this work is not far from the mentioned points, we propose a
communication system Geocast inter vehicles that enable the dissemination of safety messages
(warning) in real time. Our objective is not the maintenance of the diffusion, but the reception
and to send it message in time (in real time) potentially possible. This innovation based on the
dissemination of the message of warning in the form of an alarm, in order to ensure a security
service.
4. SIMILAR WORK
4.1. Urban Multi –hop Broadcast (UMB)
This protocol proposed in [7] designed to solve problems: Broadcast Strom, hidden nodes and
which are related to the massive distribution in urban environments. This UMB protocol does not
guarantee the absence of collusion, since it is possible to exist in more than one vehicle in the
same segment. They can send in the same time the CTB. Again, this protocol works by some
form of wait can be very long to select the next transmitter.
4.2. Smart Broadcast (SB)
It is a UMB improvement, wait time to assign the next re-broadcaster (relay) . with a delay
function (WR) , the farther vehicles from the source always have a waiting period when this latter
is finished the vehicle transmitted the packet CTB to the source. once the source successfully
receives this packet, it then transmits the data packet. This SB protocol as it is Indicated, it is an
improvement of UMB at latency term .a shorter waiting period that is in UMB.
4.3. Position-Based Adaptive Broadcast (PAB)
The authors of SB propose the PAB protocol (Position-Based Adaptive Broadcast) [8]which is
based on the waiting time for relay vehicle before forwarding the information to improve the
techniques proposed for the facility access and efficiency of broadcasts. Contrary to SB which
works at the distance between transmitter and receiver, the PAB uses a formula calculated by the
vehicle position and speed to find the delay time value.
4.4. Efficient Directional Broadcast (EDB)
This protocol [9] is based on the direction one using bidirectional antennas of the vehicles. It
works in same principle UMB. To solve the problem of retransmission number redundant latency
is proposed for each node in the sector the emission before the retransmission, this time is
different for each vehicle, it is calculated according to the distance between the vehicle and the
transmitter.
4.5. Reliable Method for Disseminating Safety Information (RMDSI)
The authors in [10] the authors selected the delay time to differentiate the priority of
retransmission for each vehicle. It is to function similarly with the previous protocol, when the
vehicle receives a packet, a waiting time before rebroadcast it. After the expiration of the waiting
time, the vehicle retransmits the packet. Vehicles intending to duplicate the rebroadcast before
their waiting time expires cancel their broadcasts. By simulation, when the network is highly
5. Computer Science & Information Technology (CS & IT) 17
fragmented, RMDSI powerful that the UMB, which does not take the problem of the
fragmentation of the network.
4.6. Reliable Broadcasting of Life Safety Messages (RBLSM)
In [11] the priority in the selection of relay is given to the vehicle with the vehicle nearest to the
transmitter. The reason moreover nearer is more reliable. For example, a closer vehicle is
supposed to have an intensity of better received signal. This protocol also uses the use of the
packages of order and RTB CTB. The performances of the protocol are evaluated by simulation;
However, only latency of one hop is provided. [3][11]
4.7. Multi-hop Vehicular Broadcast (MHVB)
This protocol [12] is similar to the precedents; it waiting time-based, such as the furthest vehicle
from the transmitter always have the shortest waiting time. This time is calculated by an
allocation function is not explicitly stated. After the expiration of the waiting time, the vehicle
retransmits the packet. The protocol can be detecting traffic congestion. As each vehicle uses the
number of its neighbors and its speed as an indication of congestion. [3]
4.8. Abiding Geocast (AG)
It is a system geocast of communication inter vehicle for the dissemination of massages of
warning in VANET network. This model is proposed in order to ensure the dissemination of
warning in order to: increase the probability of access to all relevant vehicle and reduce the
overhead. This system uses different notions of time and space. To ensure inform group of
vehicles exist in a geographical area someone on a risk proximity. Of which, the first vehicle
detects the risk starts broadcasting a warning to other vehicles to inform them of this dangerous
situation. In this work the authors used different dissemination strategies: (1) To achieve the first
goal, they used the vehicle as reverse relay (2) Second goal: to update a time Waiting
dynamically active vehicle for the next release. [1]
4.9. Optimal multi-hop broadcast protocol for vehicular safety (OCAST)
This protocol is an optimization of alert message dissemination in the VANET network for
secure roads. Optimality in terms of time and number of transmission: using a dissemination
strategy exploits the vehicle as opposed relay based on waiting times. And to complete the
coordination of reliable and efficient distribution, smart periodic broadcasts to effectively adapt
to VANETs networks. [5]
5. OBJECTIVES AND METHODOLOGY OF THE STUDY
Our mains objectives in these papers - as we indicated – are:
• Study of different dissemination protocols used in VANET networks .
• Create a model of simulation for applied the comparison and analysis performance of two
studies in many cases: two scenarios and several parameters by analyzing the simulation
results and found parameters.
6. 18 Computer Science & Information Technology (CS & IT)
• Provide an optimal solution for the dissemination of safety messages on the roads.
This is generally for measuring the flexibility of these systems accidents that may occur suddenly
in roads whatever its nature. Because of the real measurements are not possible, we chose to use
in this work the analytical study based on simulation results.
6. PERFORMANCE EVALUATION
This study is a result of comparison and analysis of two studies of performance in many cases
two scenarios and several parameters by analyzing the simulation results and found parameters.
An optimal solution inspired by these studies for time dissemination and diffusion rate.
Although there are other protocols in addition to previously indicated [14], [4] ...., we chose
OCAST and AG since they use parameters give potentially effective results compared to other
proposes .En even more the OCAST is already compared with other in [2].
A. Metrics
Parameters measured are the rate of informed vehicles before the risk area, and the probability of
access to all vehicles concerned in two different cases of risk: (risk is located in a random manner
(case 2) and others in a predictable manner for the system (Case 1) ). for a short duration time and
long duration of time.
By simulation tools exists, our model is not much different from the used in [5] with a simple
change in parameters for measure the effectiveness of the two systems in case of changing of risk
on the road. The found results can be quite sufficient to compare and study the performance of
these two protocols. .Generally OCAST is an improvement of what studied.
Indeed, we have chosen to add these results broadcasts capabilities used in [5] to the Geocast
capacity proposed in [1] to provide an improved system for the dissemination of traffic
information. So our model is defined in the next section but realistic simulation results of our
approach are defined in details in our next production with a new algorithm for the message
diffusion process in VANETs, where we use the simulator OMNET ++ (Version: 4.3.1) with the
traffic simulator SUMO (0.17.1) and VEINS (2.2) to achieve our results.
B. Simulation
In this party, we use OMNET ++ open source simulation library that is written in C ++. This
discrete event simulator simulate both types of networks (wired and wireless), in which the
different network nodes can communicate via messages. The OMNET ++ tool has several
advantages over others: simple to use, easy to learn by means of its user interface and its generic
structure. It allows to find and obtain clear results, detailed and in many forms, diagram and
drawings. This simulator is flexible to make changes in the created simulation models and even
reuse these models. And more recently, this simulator is widely used in VANET network
simulation domain, in practically protocols simulation model related to the MAC layer.
Consequently, we prefer to use this simulation tool to avoid several problems related to the
implementation of the simulation model by other simulators, especially when a large number of
messages exchanged and shared between network nodes.
7. Computer Science & Information Technology (CS & IT) 19
B.1. Simulators information’s
Table 1. Informations about the Simulators.
Simulator Version
OMNET++ 4.1.1
Sumo 0.17.1
Veins 2.2
B.2. The simulation parameters
To achieve the simulation scenarios, we chose the following parameters:
Table 2. Simulation parameters.
Description value
Transmission range(R) 250m
Straight road 7 km
Mac layer IEEE802.11
Safety distance 250m
Effect distance 10Km
traffic volume λ 200 ~ 700 (veh/hr)
Speed mean(Smean)
Speed variation ε
30m/s
5m/s
location of the warning
Case 1 = 0meters
Case 2= variable
simulation time 3000s
Start time of the warning event Case 1 = 400s
Case 2= variable
As we say, we chose the same simulation parameters with slight changes, this for confirmation of
the results. Except the second case where we tried to stay away from the private of fixed location
of event for this risk to measure the effectiveness of the two systems. We omit the start time of
the warning event to let the system reach a stable state considering the distribution of vehicles
over the road. For both scenarios, when the warning event occurs, the beginner of dissemination
is at the location of the safety line.
C. Results and discussion
Case 1:
In figure 4: different traffic value (measured density 1 to 15 vehicles are informed to 100% before
the risk area (both systems). But imperfection AG appeared in (Figure 3) before arriving at risk
(after the security line) this rate is a little different (the existence of vehicles after they inform
exceed the safety line): a rate (> 20% ) and (<40%) of vehicle are not inform in the low density
network. But for OCast delivery rate of 100% for all densities.
8. 20 Computer Science & Information Technology (CS & IT)
Figure 3. Rate of traffic density vs. delivery [5]
Figure 4. Rate of vehicles informed before risk zone [5].
Case 2:
In this case the simulation results are slightly different. In FIG 5: different traffic value (higher
density then 7 vehicles are informed to 100% before the risk area (both systems).
But imperfection of both AG and Ocast system appeared in before arriving at risk (after the
security line) and the beginning of the appearance of risk: the vehicles after they inform exceed
the safety line, although this rate is not large but it is important in the warning information
dissemination process.
Generally for all densities (Figure 3), OCast shows better performance than the AG as sending
message "Stop" guarantee control the number of alerts issued in the network consequently it
ensures minimization overload network.
Figure 5.Rate of the vehicles before they risk area
9. Computer Science & Information Technology (CS & IT) 21
But the case of an unforeseeable risk, we see a better performance for both protocols in a density
more than 6, but this performance is decreased to the density less than 6 at the beginning of the
appearance of risk.
We note that in the determination of the nature of risk and the results were good. Unlike in case
the unknown risk (the location and characteristics) make traffic information sent uncertain and
imprecise. Indeed, the simulation results show the effectiveness of OCAST compared to AG
(case1) and but these results do not indicate the futility and uselessness of AG or OCast (case2).
Generally the purpose of our study is to measure the flexibility of these systems accidents that
may occur suddenly in roads whatever its nature.
D. Our proposed approach
Our proposal is defined as the GODD “Geocast Optimization for Data Dissemination in vanet
networks”, a Geocast protocol introduced as an improvement time (the emission time) and
number of transmissions (overhead), a flexible system to change the road for a better
dissemination of safety data in VANET networks.
We try in this work as much as possible to ensure the immediate and optimal delivery of the
warning information to all vehicles that are near to the risk, consider the validity of the message
(the life time) and the direction of the mobility of vehicles in the network.
Figure 6. Rate of the vehicles before they risk area
This communication system Geocast inter vehicles is interested in the warning information
released as soon as possible quickly the source node to several recipients in a region
geographically define to secure these vehicles.
We use strategies to achieve our objective, to inform all these points while reducing unnecessary
broadcasts and ensure a favorable reception time.
Broadcasts are organized in this system by the following process:
1- Initialization: when a risk occurs, the damaged vehicle will broadcast a warning message to
neighboring vehicles (in its transmission area).
2- Selection of vehicle drivers:
10. 22 Computer Science & Information Technology (CS & IT)
The relay vehicle is an active vehicle chosen by its proximity to the transmitter and its relative
position in the latter.
3- Exit the system: The made to select a new relay, the source must receive a message of "stop"
this relay to indicate you can leave the area.
7. CONCLUSIONS
We tried to present in these papers an inter vehicle communication system Geocast: GODD as an
optimization of the proposed approaches. Which we introduce a new contribution to more secure
passengers in the roads.
This work is a description of what our approach detailed in our next production, where we show
the optimality of the system by the simulation tool by OMNET ++ simulator used (version 4.3.1)
and SUMO (Version 0.17) with VEINS.
The system offer better message delivery performance side of caution, the thing that evolve road
services for VANETs.
REFERENCES
[1] Y.Qiangyuan Yu and H. Geert (2008) “Abiding Geocast for Warning Message Dissemination in
Vehicular Ad Hoc Networks”, IEEE International Conference on Communications Workshops (ICC)
Beijing, China, pp. 400-404.
[2] M. Koubek, S. Rea, D. Pesch (2008) “Effective Emergency Messaging in WAVE based VANETs”
Centre for Adaptive Wireless Systems,Electronic Engineering Dept, Cork Institute of Technology, ,
in Proc. First International Conference on Wireless Access in Vehicular Environments (WAVE
2008), Dearborn, MI, USA.
[3] S. Panichpapiboon, and W. Pattara-atikom (2011)“A Review of Information Dissemination Protocols
for Vehicular Ad Hoc Networks”, IEEE.
[4] N. Haddadou (2014) " Réseaux ad hoc véhiculaires : vers une dissémination de données efficace,
coopérative et fiable " (doctorate These ).
[5] A. Benaidja ,S. Moussaoui and F. Naït-Abdesselam (2013) “An Optimal Broadcast of Warning
Messages in Vehicular Ad Hoc Networks “, International Journal of Computer and Information
Technology , ISSN: 2279 – 0764, Volume 02– Issue 05.
11. Computer Science & Information Technology (CS & IT) 23
[6] C. Maihofer, T. Leinmuller, and E. Schoch (2005) “Abiding geocast: time–stable geocast for ad hoc
networks”, in Proceedings of the 2nd ACM international workshop on Vehicular ad hoc networks
(VANET’05), New York, USA, pp. 20-29.
[7] G. Korkmaz, E. Ekici, F. Ozguner, and U. Ozguner (2004) Urban multi-hop broadcast protocol for
inter-vehicle communication systems. In ACM International Workshop on Vehicular Ad Hoc
Networks, New York, NY, USA.
[8] Y.T. Yang and L.D. Chou (2008) "Position-Based Adaptive Broadcast for Inter-Vehicle
Communications," Communications Workshops, ICC Workshops '08. IEEE International Conference
on , vol., no., pp.410-414, 19-23.
[9] D. Li, H. Huang, X. Li, M. Li, and F. Tang (2007) “A distance-based directional broadcast protocol
for urban vehicular ad hoc network,” in Proc. IEEE Int’l Conf. on Wireless Comm., Networking and
Mobile Computing (WiCom), Shanghai, China, pp. 1520–1523.
[10] S. Khakbaz and M. Fathy (2008) “A reliable method for disseminating safety information in vehicular
ad hoc networks considering fragmentation problem,” in Proc. IEEE Int’l Conf. on Wireless and
Mobile Communications (ICWMC), Athens, Greece, pp. 25–30.
[11] M. Taha & Y. Hasan (2007)“VANET-DSRC protocol for reliable broadcasting of life safety
messages,” in Proc. IEEE Int’l Symp. on Signal Processing and Information Technology, pp. 104–
109.
[12] T. Osafune, L. Lin, & M. Lenardi (2006) “Multi-hop vehicular broadcast (MHVB),” in Proc. IEEE
Int’l Conf. on ITS Telecomm. (ITST), Chengdu, China, pp. 757–760.
[13] Q. Xu, T. Mak, J. Ko and R. Sengupta (2004) “Vehicle-to vehicle safety messaging in DSRC”, in
Proceedings of the First ACM workshop on Vehicular ad hoc Networks (VANET).
[14] Harshvardhan P. Joshi (2006) “ Distributed Robust Geocast:A Multicast Protocol for Inter-Vehicle
Communication”, Computer Networking - Electrical Engineering, Raleigh these.
AUTHORS
Ouafa MAHMA
Obtained on testimonies license (2006) and master (2011) in the fundamental automatic
information from the University of Ouargla in Algeria .Prepare for a doctoral degree in
the field networks and informatics systems in the same university.
Ahmed KORICHI
Obtained on testimonies doctorate (2004) in automatic information from the University
of Batna in Algeria. Prepare for a professor degree in university of Ouargla in Algeria .