Vehicular Communications Research Papers - Academia.edu (original) (raw)

The integration of IMS networks will enable telecom operators to evolve in a manner transparent to the incessant demand for the multimedia services. However the QoS management mechanisms defined for IMS networks are considered poor in... more

The integration of IMS networks will enable telecom operators to evolve in a manner transparent to the incessant demand for the multimedia services. However the QoS management mechanisms defined for IMS networks are considered poor in oversight and monitoring real-time services. Moreover the eTOM Framework includes the scenarios of monitoring service delivery that enable real-time tracking services being supplies. These specifications are standard and contain no specification for IMS networks. We propose in this paper a new approach to monitoring of IMS networks, and eTOM process based, the monitoring architecture is deploying by the WSOA concept.

A design pattern is a general solution to a commonly occurring problem in software design. It is a template to solve a problem that can be used in many different situations. Patterns formalize best practices that the programmer can use... more

A design pattern is a general solution to a commonly
occurring problem in software design. It is a template to solve a problem that can be used in many different situations. Patterns formalize best practices
that the programmer can use to solve common problem
s when designing an application or systems. In this
article we have focused our attention on it, how the proposed UML diagrams can be implemented in C# language and whether it is possible to make the diagram implementation in the program code with the greatest possible precision.

This paper presents HDy Copilot, an Android application for accident detection integrated with multimodal alert dissemination, both via eCall and IEEE 802.11p. The proposed accident detection algorithm receives inputs from the vehicle,... more

This paper presents HDy Copilot, an Android application for accident detection integrated with multimodal alert dissemination, both via eCall and IEEE 802.11p. The proposed
accident detection algorithm receives inputs from the vehicle,
via ODB-II, and from the smartphone sensors, namely the
accelerometer, the magnetometer and the gyroscope. The Android smartphone is also used as human machine interface, so that the driver can configure the application, receive road hazard warnings issued by other vehicles in the vicinity and cancel countdown procedures upon false accident detection. A prototype implementation was validated via laboratory tests.

The growing demand of wireless applications has put a lot of constraints on the usage of available radio spectrum which is limited and precious resource. However, a fixed spectrum assignment has lead to under utilisation of spectrum as a... more

The growing demand of wireless applications has put a lot of constraints on the usage of available radio spectrum which is limited and precious resource. However, a fixed spectrum assignment has lead to under utilisation of spectrum as a great portion of licensed spectrum is not effectively utilised. Cognitive radio is a promising technology which provides a novel way to improve utilisation efficiency of available electromagnetic spectrum. Spectrum sensing helps to detect the spectrum holes (underutilised bands of the spectrum) providing high spectral resolution capability. In this paper, survey of spectrum sensing techniques is presented. The challenges and issues involved in implementation of spectrum sensing techniques are discussed in detail giving comparative study of various methodologies.

The evolution of the Internet of vehicles and growing use of mobile devices has created a demand for new wireless communication technologies. Optical camera communication, which uses light-emitting diodes as transmitters and cameras as... more

The evolution of the Internet of vehicles and growing use of mobile devices has created a demand for new wireless communication technologies. Optical camera communication, which uses light-emitting diodes as transmitters and cameras as receivers, has emerged as a promising alternative. Since light-emitting diodes and cameras are already exploring in traffic lights, vehicles, and public lightings, optical camera communication has the potential to intelligently handle transport systems. Although other technologies have been proposed or developed in both academia and industry, they are not yet mature enough to uphold the huge requirements of the Internet of vehicles. This study introduces a new intelligent Internet of vehicles system based on optical camera communication combined with convolutional neural networks. Optical camera communication is a promising candidate for maintaining interference-free and more robust communication , for supporting the Internet of vehicles. Convolutional neural network is introduced for precise detection and recognition of light-emitting diode patterns at long distances and in bad weather conditions. We propose an algorithm to detect the interested light-emitting diode signals (i.e. regions-of-interest), measure the distance using a stereo-vision technique to find out the desired targets, and simulate our proposed scheme using a MATLAB Toolbox. Thus, our system will provide great advantages for next-generation transportation systems.

This article presents a descriptive comparative study on two methods of teaching, the traditional and blended learning pedagogical approach in a Business Communication course. Forty-four (44) students from the two controlled groups were... more

This article presents a descriptive comparative study on two methods of teaching, the traditional and blended learning pedagogical approach in a Business Communication course. Forty-four (44) students from the two controlled groups were enrolled in the course for the first semester of school year 2017-2018 participated in the study. The findings indicated that respondents' performance in ENGL118 (English Composition) had an effect on their performance in BUS261(Business Communication) and there was a significant positive relationship between year level and final grade in BUS261. Therefore, it was concluded that the year level and grade in ENGL118 have correlationson student'sperformance in BUS261. The results of the assessments of the two groups were compared and indicated a significant difference in the results which was influenced by respondents' year level and mode of conducting assessments. It is further concluded, that if the characteristics of both groups were the same, blended would have been more effective than the traditional method.This study recommends adopting the blended pedagogical approach not only in BUS261 course but also to other courses as applicable.

Navigation assistance systems are aiming to improve safety and provide traffic optimization, and have become more and more popular in modern vehicular technology. The reason is given by the significant traffic increase and numerous... more

Navigation assistance systems are aiming to improve safety and provide traffic optimization, and have become more and more popular in modern vehicular technology. The reason is given by the significant traffic increase and numerous congestion events in large cities, large complexity of road infrastructure and unexpected or hazardous conditions that can be found on roads. This paper proposes an innovative navigation system solution which intelligently gathers traffic data provided by integrated car sensors and/or onboard security systems and uses it to warn other participants. System concepts, architecture, design, implementation and performance evaluation aspects are presented, and also tasks organization for an embedded cost-effective implementation using a real-time kernel is illustrated.

Storage networking technology has enjoyed strong growth in recent years, but security concerns and threats facing networked data have grown equally fast. Today, there are many potential threats that are targeted at storage networks,... more

Storage networking technology has enjoyed strong growth in recent years, but security concerns and threats facing networked data have grown equally fast. Today, there are many potential threats that are targeted at storage networks, including data modification, destruction and theft, DoS attacks, malware, hardware theft and unauthorized access, among others. In order for a Storage Area Network (SAN) to be secure, each of these threats must be individually addressed. In this paper, we present a comparative study by implementing different security methods in IP Storage network.

International Journal of Advanced Information Technology (IJAIT) is a bi monthly open access peer-reviewed journal, will act as a major forum for the presentation of innovative ideas, approaches, developments, and research projects in the... more

International Journal of Advanced Information Technology (IJAIT) is a bi monthly open access peer-reviewed journal, will act as a major forum for the presentation of innovative ideas, approaches, developments, and research projects in the area advanced information technology applications and services. It will also serve to facilitate the exchange of information between researchers and industry professionals to discuss the latest issues and advancement in the area of advanced IT. Core areas of advanced IT and multi-disciplinary and its applications will be covered during in this journal.

—Autonomous vehicles can construct a more accurate perception of their surrounding environment by exchanging rich sensor data with nearby vehicles. Such exchange can require larger bandwidths than currently provided by ITS-G5/DSRC and... more

—Autonomous vehicles can construct a more accurate perception of their surrounding environment by exchanging rich sensor data with nearby vehicles. Such exchange can require larger bandwidths than currently provided by ITS-G5/DSRC and Cellular V2X. Millimeter wave (mmWave) communications can provide higher bandwidth and could complement current V2X standards. Recent studies have started investigating the potential of IEEE 802.11ad to support high bandwidth vehicular communications. This paper introduces the first performance evaluation of the IEEE 802.11ad MAC (Medium Access Control) and beamforming mechanism for mmWave V2V communications. The study highlights existing opportunities and shortcomings that should guide the development of mmWave communications for V2V communications.

In grid computing, trust has massive significance. There is lot of research to propose various models in providing trusted resource sharing mechanisms. The trust is a belief or perception that various researchers have tried to correlate... more

In grid computing, trust has massive significance. There is lot of research to propose various models in providing trusted resource sharing mechanisms. The trust is a belief or perception that various researchers have tried to correlate with some computational model. Trust on any entity can be direct or indirect. Direct trust is the impact of either first impression over the entity or acquired during some direct interaction. Indirect trust is the trust may be due to either reputation gained or recommendations received from various recommenders of a particular domain in a grid or any other domain outside that grid or outside that grid itself. Unfortunately, malicious indirect trust leads to the misuse of valuable resources of the grid. This paper proposes the mechanism of identifying and purging the untrustworthy recommendations in the grid environment. Through the obtained results, we show the way of purging of untrustworthy entities.

Scope & Topics: International journal of advanced Information technology (IJAIT) is a bimonthly open access peer-reviewed journal, will act as a major forum for the presentation of innovative ideas, approaches, developments, and research... more

Scope & Topics: International journal of advanced Information technology (IJAIT) is a bimonthly open access peer-reviewed journal, will act as a major forum for the presentation of innovative ideas, approaches, developments, and research projects in the area advanced information technology applications and services. It will also serve to facilitate the exchange of information between researchers and industry professionals to discuss the latest issues and advancement in the area of advanced IT. Core areas of advanced IT and multidisciplinary and its applications will be covered during the conferences. We expect that the journal and its publications will be a trigger for further related research and technology improvements in this important subject The topics suggested by this issue can be discussed in term of concepts, surveys, state of the art, research, standards, implementations, running experiments, applications, and industrial case studies. Authors are invited to submit complete unpublished papers, which are not under review in any other conference or journal in the following, but not limited to, topic areas. Topics of interest include, but are not limited to, the following:

Platooning is both a challenging and rewarding application. Challenging since strict timing and reliability requirements are imposed by the distributed control system. Rewarding since considerable fuel reductions are possible. As... more

Platooning is both a challenging and rewarding application. Challenging since strict timing and reliability requirements are imposed by the distributed control system. Rewarding since considerable fuel reductions are possible. As platooning takes place in a vehicular ad hoc network, the use of IEEE 802.11p is close to mandatory. IEEE 802.11p has problems with its medium access method causing packet collisions and random delays. Therefore, we suggest a token-passing medium access method, where the next token holder is selected based on beacon data age. This has the advantage of allowing beacons to be re-broadcasted in case of extra time in each beacon interval. We show that our token-based method is able to reduce the data age and increase reliability considerably compared to the standard.

An ad hoc network is a collection of wireless mobile nodes dynamically forming a temporary network without the use of any fixed network infrastructure or centralized administration. In order to enable communication within the network, a... more

An ad hoc network is a collection of wireless mobile nodes dynamically forming a temporary network without the use of any fixed network infrastructure or centralized administration. In order to enable communication within the network, a routing protocol is needed to discover routes between nodes. The primary goal of ad hoc network routing protocols is to establish routes between node pairs so that messages may be delivered reliably and in a timely manner. The objective of any routing protocol is to have packet delivered with least possible cost in terms of receiving power, transmission power, battery energy consumption and distance. All these factors basically effect the establishment of link between the mobile nodes and liability and stability of these links. In this paper, we implement a data link quality scheme on two protocols ODMRP and ADMR and compare them on the bases link quality and link stability.

In this paper, we propose to improve the performance of the channel estimation for LTE Downlink systems under the effect of the channel length. As LTE Downlink system is a MIMO-OFDMA based system, a cyclic prefix (CP) is inserted at the... more

In this paper, we propose to improve the performance of the channel estimation for LTE Downlink systems under the effect of the channel length. As LTE Downlink system is a MIMO-OFDMA based system, a cyclic prefix (CP) is inserted at the beginning of each transmitted OFDM symbol in order to mitigate both inter-carrier interference (ICI) and inter-symbol interference (ISI). The inserted CP is usually equal to or longer than the channel length. However, the cyclic prefix can be shorter because of some unforeseen channel behaviour. Previous works have shown that in the case where the cyclic prefix is equal to or longer than the channel length, LMMSE performs better than LSE but at the cost of computational complexity .In the other case, LMMSE performs also better than LS only for low SNR values. However, LS shows better performance for LTE Downlink systems for high SNR values. Therefore, we propose a hybrid LS-LMMSE channel estimation technique robust to the channel length effect. MATLAB Monte –Carlo simulations are used to evaluate the performance of the proposed estimator in terms of Mean Square Error (MSE) and Bit Error Rate (BER) for 2x2 LTE Downlink systems.

With the rapid increase of new and diverse cellular mobile services, the overlapping of cells has become typical in the majority of the coverage area of the network. Vertical handovers occur between two layers of cells when a user is... more

With the rapid increase of new and diverse cellular mobile services, the overlapping of cells has become typical in the majority of the coverage area of the network. Vertical handovers occur between two layers of cells when a user is switched from one layer to the other. In this paper we investigate the influence of network parameters on vertical hard handover performance in a cell environment. The work considers two layers of cells: a layer of macrocells and a layer of microcells. Handover requests enter the macrocell from neighbor macrocells and from microcells that belong to a different layer. Using Markov chain analysis and simulation we calculate network performance parameters such as mean queue delay, handover dropping probability and channel utilization. We also compare the handover performance for the macrocell and macrocell traffic separately. Our results show the influence of total channels, maximum queue size and handover request arrival rate on handover performance. They also show that when the traffic from each layer is treated with equal priority in the system, the performance of each layer is comparable.

ABSTRACT In this contribution, we design and test the performance of a distributed and adaptive resource management controller, which allows the optimal exploitation of Cognitive Radio and soft-input/soft-output data fusion in Vehicular... more

ABSTRACT In this contribution, we design and test the performance of a distributed and adaptive resource management controller, which allows the optimal exploitation of Cognitive Radio and soft-input/soft-output data fusion in Vehicular Access Networks. The ultimate goal is to allow energy and computing-limited car smartphones to utilize the available Vehicular-to-Infrastructure WiFi connections for performing traffic offloading towards local or remote Clouds by opportunistically acceding to a spectral-limited wireless backbone built up by multiple Roadside Units. For this purpose, we recast the afforded resource management problem into a suitable constrained stochastic Network Utility Maximization problem. Afterwards, we derive the optimal cognitive resource management controller, which dynamically allocates the access time-windows at the serving Roadside Units (i.e., the access points) together with the access rates and traffic flows at the served Vehicular Clients (i.e., the secondary users of the wireless backbone). Interestingly, the developed controller provides hard reliability guarantees to the Cloud Service Provider (i.e., the primary user of the wireless backbone) on a per-slot basis. Furthermore, it is also capable to self-acquire context information about the currently available bandwidth-energy resources, so as to quickly adapt to the mobility-induced abrupt changes of the state of the vehicular network, even in the presence of fadings, imperfect context information and intermittent Vehicular-to-Infrastructure connectivity. Finally, we develop a related access protocol, which supports a fully distributed and scalable implementation of the optimal controller.

A Vehicular Ad hoc Network (VANET) is a most popular application of Mobile Ad hoc Networks (MANETs). A lot of research work around the world is being conducted to design an efficient routing protocol for VANETs. In this paper, we examine... more

A Vehicular Ad hoc Network (VANET) is a most popular application of Mobile Ad hoc Networks (MANETs). A lot of research work around the world is being conducted to design an efficient routing protocol for VANETs. In this paper, we examine the significance of Greedy Forwarding with Border Node based approach for VANETs. We propose a position based routing protocol to forward packet to the border nodes of the forwarding nodeas the next-hop node. This protocol is called Border Node based Greedy Forwarding (BNGF) since it uses border nodes with greedy forwarding. We categorize BNGF as BNGF-H for highway and BNGF-C for city traffic scenario. We have simulated this protocol using NS-2 simulator and evaluated the performance in terms of end-to-end delay and packet delivery ratio. We have compared both the methods for highway and city traffic scenarios. The results clearly show that the end-to-end delay for BNGF-C is significantly lower and packet delivery ratio is higher than BNGF-H.

Convergent service environments are required to deal with current tendency to heterogeneity in network contents and its inherent incorporation of more types of devices demanding services from multiple domains. Efficient management... more

Convergent service environments are required to deal with current tendency to heterogeneity in network contents and its inherent incorporation of more types of devices demanding services from multiple domains. Efficient management architectures are required to tackle issues regarding: media content, subscriber reachability and subscriptions information coming from different types of networks in order to enable well organized communications among different environments such as: IMS, IPTv and subscribers management repositories. This paper describes the work of Eureka Mobicome project on the definition of an architecture to manage and provide services among distinct service delivery platforms (IPTV and ENUM) using IMS as a common core and proposes a compound modular architecture to set the basis for Future Internet converging service provision. The proposed architecture has been validated by the Interconnection of different prototypes deployed at Madrid (Spain) and Oslo (Norway).

A temperature is one of the parameters that have a great effect on the performance of microstrip antennas for TM 10 mode at 2.4 GHz frequency range. The effect of temperature on a resonance frequency, input impedance, voltage standing... more

A temperature is one of the parameters that have a great effect on the performance of microstrip antennas for TM 10 mode at 2.4 GHz frequency range. The effect of temperature on a resonance frequency, input impedance, voltage standing wave ratio, and return loss on the performance of a cylindrical microstrip printed antenna is studied in this paper. The effect of temperature on electric and magnetic fields are also studied. Three different substrate materials RT/duroid-5880 PTFE, K-6098 Teflon/Glass, and Epsilam-10 ceramic-filled Teflon are used for verifying the new model. KEYWORDS Temperature, Voltage Standing Wave Ratio VSWR, Return loss S11, effective dielectric constant, Transverse Magnetic TM 10 model.

Cognitive radio (CR) is a new paradigm that utilizes the available spectrum band. The key characteristic of CR system is to sense the electromagnetic environment to adapt their operation and dynamically vary its radio operating... more

Cognitive radio (CR) is a new paradigm that utilizes the available spectrum band. The key characteristic of CR system is to sense the electromagnetic environment to adapt their operation and dynamically vary its radio operating parameters. The technique of dynamically accessing the unused spectrum band is known as Dynamic Spectrum Access (DSA). The dynamic spectrum access technology helps to minimize unused spectrum bands. In this paper, main functions of Cognitive Radio (CR) i.e. spectrum sensing, spectrum management, spectrum mobility and spectrum sharing are discussed. Then DSA models are discussed along with different methods of DSA such as Command and Control, Exclusive-Use, Shared Use of Primary Licensed User and Commons method. Game-theoretic approach using Bertrand game model, Markovian Queuing Model for spectrum allocation in centralized architecture and Fuzzy logic based method are also discussed and result are shown.

Now a day’s Vehicular Ad Hoc Network (VANET) is an emerging technology. Mobility management is one of the most challenging research issues for VANETs to support variety of intelligent transportation system (ITS) applications. VANETs are... more

Now a day’s Vehicular Ad Hoc Network (VANET) is an emerging technology. Mobility management is one of the most challenging research issues for VANETs to support variety of intelligent transportation system (ITS) applications. VANETs are getting importance for inter-vehicle communication, because they allow the communication among vehicles without any infrastructure, configuration effort, and without the high costs of cellular networks. Besides local data exchange, vehicular applications may be used to accessing Internet services. The access is provided by Internet gateways located on the site of roadside. However, the Internet integration requires a respective mobility support of the vehicular ad hoc network. In this paper we will study about the network mobility approach in vehicular ad hoc network; the model will describe the movement of vehicles from one network to other network. The proposed handover scheme reduces the handover latency, packet loss signaling overhead.

As the spectrum for wireless transmission gets crowded due to the increase in the users and applications, the efficient use of the spectrum is a major challenge in today's world. A major affecting factor is the inefficient usage of the... more

As the spectrum for wireless transmission gets crowded due to the increase in the users and applications, the efficient use of the spectrum is a major challenge in today's world. A major affecting factor is the inefficient usage of the frequency bands. Interference in the neighboring cells affects the reuse of the frequency bands. In this paper, some of the quality of service parameters such as residual bandwidth, number of users, duration of calls, frequency of calls and priority are considered. This paper presents work based on the optimization of dynamic channel allocation using genetic algorithm (GA). This attempts to allocate the channel to users such that overall congestion in the network is minimized by reusing already allocated frequencies. The working of Genetic Algorithm which is used in the optimization procedure is also explained. The optimized channel is then compared with a non-optimized channel to check the efficiency of the genetic algorithm.

In this paper, we first discuss some security issues in the Internet, and we sketch some future research directions in this field. Then, we discuss the security issues in wireless networked embedded systems through three examples: sensor... more

In this paper, we first discuss some security issues in the Internet, and we sketch some future research directions in this field. Then, we discuss the security issues in wireless networked embedded systems through three examples: sensor networks, vehicular communications, and RFID systems. Finally, we give a brief introduction to the field of network coding, which is a new, promising research area in networking. 1.

Vehicle communications are becoming a reality, driven by navigation safety requirements and by the investments of car manufacturers and Public Transport Authorities. As a consequence many of the essential vehicle grid components (radios,... more

Vehicle communications are becoming a reality, driven by navigation safety requirements and by the investments of car manufacturers and Public Transport Authorities. As a consequence many of the essential vehicle grid components (radios, Access Points, spectrum, standards, etc.) will soon be in place (and paid for) paving the way to unlimited opportunities for other car-to-car applications beyond safe navigation, for

Convergent service environments are required to deal with current tendency to heterogeneity in network contents and its inherent incorporation of more types of devices demanding services from multiple domains. Efficient management... more

Convergent service environments are required to deal with current tendency to heterogeneity in network contents and its inherent incorporation of more types of devices demanding services from multiple domains. Efficient management architectures are ...

Wireless vehicular network (WVN) is exponentially gaining attention from industries and researchers since it is the Keystone of intelligent transportation systems (ITS). Despite the sophisticated features and services that it can offer,... more

Wireless vehicular network (WVN) is exponentially gaining attention from industries and researchers since it is the Keystone of intelligent transportation systems (ITS). Despite the sophisticated features and services that it can offer, it is susceptible to networking attacks such as eavesdropping threats where the confidential transmitted signal could be overheard by a malicious entity. In this paper, we intend to study the physical layer security (PLS) where we consider the eavesdropping attack for vehicle-to-infrastructure (V2I) communications. We analyze the average secrecy capacity, under different scenarios by comparing the performances of employing the decode-and-forward (D relay, the amplify-and-forward fixed gain (AFFG) relay, and the intelligent reflecting surface (IRS). Actually, this comparison investigates the efficiency of IRS comparing to the traditional relaying systems, since it was introduced as a novel paradigm in wireless technology with highly promising potential, especially in 5G and 6G.

Since Doppler shift is one of the most important parameters in wireless propagation, the evaluation of the Doppler shift at the base station (BTS) in vehicular communications improves BTS in many aspects such as channel varying rate,... more

Since Doppler shift is one of the most important parameters in wireless propagation, the evaluation of the Doppler shift at the base station (BTS) in vehicular communications improves BTS in many aspects such as channel varying rate, jamming detection, and handover operations. Therefore, in this study, we propose a novel method at a base station based on the received user signal to estimate the channel Doppler shift seen by BTS. Utilizing the inherent information existed in common receivers, a level crossing rate (LCR) based Doppler shift estimation algorithm is developed without any excessive hardware. Moreover, a jamming detection algorithm is improved based on the proposed Doppler shift estimation scheme. The performance of the proposed scheme is evaluated in a Terrestrial Trunked Radio (TETRA) network, and comprehensive experimental results have shown superior performance in a wide range of velocities, signal to noise ratios and jammers.