IJRIT International Journal of Research in Information Technology, Volume 2, Issue 3, March 2014, Pg: 600-607

International Journal of Research in Information Technology (IJRIT)

www.ijrit.com

ISSN 2001-5569

Adaptive and Mobility Based Algorithm for enhancement of VANET’s reliabilty Bhanu Gadamsetti1, Mr.E.Sivakumar2 1.

2.

Department of Electronics and Communication Engineering SRM University, Kancheepuram, Tamilnadu-603203 INDIA e-mail: [email protected]

Assistant Professor (Sr.G),Department of Electronics and Communication Engineering SRM University, Kancheepuram, Tamilnadu-603203 INDIA e-mail: [email protected] Abstract

In this paper an analytical model for the reliability of vehicular ad hoc networks (VANETs) is proposed. Dedicated short range communication (DSRC) handles safety applications in VANETs. The DSRC current specifications may lead to severe performance degradation in dense and high mobility conditions. Therefore, an adaptive algorithm is introduced to increase system reliability in terms of the probability of successful packet reception and delay of emergency messages. Another salient feature of the proposed model is that it enhances the security and privacy issues of vehicular ad hoc networks. The performance of proposed model is examined using NS2 simulations. Keywords-Vehicular adhoc networks, dedicated short range communication, reliabilty, mobility, safety, security,privacy.

I.

INTRODUCTION

Vehicular ad hoc network (VANET) is a form of Mobile ad hoc network which provides communication between vehicles and between vehicles and road-side base stations. A vehicle in VANET is considered as an intelligent mobile node capable of communicating with its neighboring nodes in the network. The difference between VANET and MANET is due to high mobility of nodes and the large scale of networks. VANET is a self-organizing network that works on both Inter-Vehicle Communication (IVC) and Vehicle to Infrastructure Communication (VIC). VANETs applications have been driven by dedicated short range communication (DSRC) or IEEE 802.11p [1], which helps drivers to drive safely. IEEE 802.11p medium access control (MAC) uses carrier sense multiple access with collision avoidance. DSRC uses 5.9 GHz with a 75 MHz spectrum, which is divided into seven 10 MHz channels and a 5 MHz guard band. The control channel is used for safety applications, whereas remaining six channels for service channels. In VANET, each vehicle is equipped with on-board unit (OBU) and there are road-side units (RSU) installed along the roads. The OBUs and RSUs communicate each other using the Dedicated Short Range Communications (DSRC) protocol. The basic application of a VANET is to allow arbitrary vehicles to broadcast safety messages (like road condition, traffic information) to the nearby vehicles and RSUs so that remaining vehicles may divert their routes and RSU may inform the traffic control system to adjust traffic lights for avoiding traffic congestion. Security and privacy are also critical issues. In vehicular ad hoc networks, vehicles download data from RSUs. In this paper a novel security model protocol called broadcast encryption (BE) to encrypt the data that only authorized applicants can decrypt. It also ensures vehicles privacy which is one of the important security features of VANETs. In summary, VANETs reliability enhanced with the following contributions: 1) An application layer data sharing protocol is designed to facilitate data downloading. MAC layer collisions and hidden terminal issues are avoided with coordinated relay transmission in sharing.

Bhanu Gadamsetti, IJRIT

600

IJRIT International Journal of Research in Information Technology, Volume 2, Issue 3, March 2014, Pg: 600-607

2) Security and privacy protocols are developed in VANETs to guarantee the applicants exclusive access to the applied data and the privacy of the vehicles involved in the application. 3) Analytical models are derived to evaluate the impact of the distance between vehicles and RSUs. 4) The performance of proposed model can be examined using NS2 simulations, in terms of throughput, packet delivery ratio and end to end delay. II.

RELATED WORK

For most of the existing work, the performance of data sharing is constrained by the MAC layer collisions and the hidden terminal issues. The channel access delay of the DSRC has been analyzed in [2] and compared with the self-organizing time division multiple access scheme, which is more suitable for VANETs real-time applications. In [3], the framework for sharing the DSRC between vehicular safety and non safety applications are proposed. By assuming uniform distribution of vehicles on the road, their simulations show that safety applications are not compromised. In [4], a 1-D Markov chain has been used to calculate the delay and the reception rate in VANETs without considering the delay in each stage due to a busy channel. In [5], an analytical model for the performance of delivering vehicular safety messages is proposed, without considering the mobility of vehicles. The neighborhood of a single roadside unit operating in a non-saturation traffic regime is considered in this model. In [6], a 2-D Markov chain is used to model the impact of the differentiated AIFS on a stationary vehicular scenario. A fixed number of vehicles are assumed within transmitter range and have not considered vehicle mobility. The saturation performance of the broadcast scheme in VANETs is proposed in [7] and [8]. They assumed saturation conditions, ie., stationary distribution without considering the vehicle mobility impact on the system performance. [9] derived an analytical model for delivering safety messages within inter vehicular communication. A perfect channel access is assumed and hidden terminal problem, collision probability, and vehicle mobility are not considered. The probability of the end-to-end connectivity between clusters of vehicles distributed uniformly on the road is derived in [10]. A new opportunistic packet relaying protocol that switches between data muling and local routing with the help of vehicles on the other direction are introduced. An intuitive method is that each applicant reports a public key in the request message and then the service provider distributes encrypted data to the corresponding applicants [11], [12]. This method is not scalable, but applicable as far as the data is not frequently applied. It is less efficient than the broadcast when multi-users apply for the same data. Privacy is one of the important security features of VANETs. Two major categories of techniques are proposed to provide privacy for vehicles which are group based protocols [13] and pseudonym based protocols [14]. [15] proposed pseudonym exchange protocol called AMOEBA to provide privacy for vehicles. In AMOEBA, vehicles form groups and a group leader will be chosen randomly in each group. All messages that are transmitted between group members and RSUs should be forwarded by the group leader. Therefore, the group leader may cache and shuffle several requests and responses. In other words, group member’s privacy is protected by sacrificing that of group leaders. These group leaders are randomly selected who may reveal group member’s privacy. [16] describes a protocol to provide privacy for vehicles by introducing some randomness. But it supports unicast communication. III.

SYSTEM MODEL

In the safety applications of VANETs, vehicles broadcast two types of messages: warning and status messages. Here warning messages contains safety related information whereas status messages are periodically sent to all vehicles within their transmission range and contains vehicle’s state information such as speed, acceleration, direction and position. A. Network Model Network entities can be classified into three categories in VANETs: nodes (vehicles), roadside infrastructure and the authority and application servers as shown in fig.1.

Bhanu Gadamsetti, IJRIT

601

IJRIT International Journal of Research in Information Technology, Volume 2, Issue 3, March 2014, Pg: 600-607

Fig.1. Vehicular ad hoc networks Nodes are ordinary vehicles on the road which can communicate with each other and RSUs. Vehicles are equipped with sensors and Global Positioning Systems to collect information about their speed, acceleration, direction and position. Roadside infrastructure consists of RSUs distributed along the road sides to collect data and transmission. The authority and application servers are powerful workstations which are responsible for management and service data provision respectively. The authority knows all keys and is incharge of service scheduling. Service data to vehicles are provided by application servers. The authority and application servers have powerful processing ability. Thus the computation time is ignored in this paper. In this paper, non-real time data downloading in the highway scenario are focused. RSUs are deployed along the highway at several kilometers far from each other. On the highway some vehicles may travel faster or slower than average, but the majority of vehicles travel with similar velocity is assumed. 1) Channel Assignment: In the VANETs, according to the 802.11p vehicles share the wireless spectrum, which has seven 10-MHz wide communication channels. Among these seven channels, one channel is used as the control channel which is reserved for short, high-priority messages. The two channels at the edges of the spectrum are reserved for future usages. The remainder is service channels which are available for both safety and non-safety applications. In this paper, one service channel is defined as coordination channel in which vehicles periodically broadcast their geographic information every 300 milliseconds. Some control messages will be transmitted in this channel .Two other service channels, named data channels, will be employed to share data among vehicles. Vehicles and RSUs use the same transmission power in all channels with communication range R. Moreover, multi-radios are equipped in each vehicle and RSU, so vehicles and RSUs are able to send and receive messages in multi channels simultaneously. 2)ReliableCommunications:In this framework Broadcast is utilized. However, there is no acknowledgment in the broadcast. Thus, reliable communications for a certain packet cannot be guaranteed. In this situation, coding methods, such as fountain codes, can be used to counteract the effect of packet loss in the wireless channel. In order to transmit a message which is comprised of k symbols to the receiver, the sender will encode the k original symbols to ḱ encoded symbols and then send out these encoded symbols. As long as the receiver gets at least (1+ε)k encoded symbols, the original message can be recovered, where1+ε is the decoding inefficiency. If we know that the packet deliver ratio in the wireless channel is Ppdr, ḱ should be at least (1 +ε)k/Ppdr to guarantee the reception at the receiver side. Note that, the computation overhead that is introduced by the fountain code encoding and decoding is negligible. Coding methods are employed in the data channels for efficient data sharing. Messages in the coordination channel are transmitted without being encoded in order to be compatible with other applications. B. Cooperative Data Downloading Framework 1) Vehicles Classification: Vehicles are classified into three types according to their roles in our framework. Applicants are vehicles that purchase data.

Bhanu Gadamsetti, IJRIT

602

IJRIT International Journal of Research in Information Technology, Volume 2, Issue 3, March 2014, Pg: 600-607

Downloading vehicles are vehicles that download data from RSUs for applicants. They are assigned by the authority according to their geographic positions. Relay vehicles are responsible for forwarding data to buyers which are more than one-hop away from downloading vehicles. Moreover, because some popular data may be applied by multiple vehicles, the existence of relay vehicles can prevent RSUs from distributing the same content repetitively. 2) Downloading and Sharing: A secure cooperative data downloading framework for paid services in VANETs. The proposed framework is comprised of two major parts, secure data downloading and efficient data sharing. RSUs periodically broadcast hello messages in the coordination channel. Vehicles will forward the first RSU’s hello message that they hear for one time by piggybacking it on the next geographic message. As shown in Fig. 2, when a vehicle, such as vehicle 1, hears the forwarded hello message from the vehicle 3, it will broadcast one-hop request messages in the coordination channel. Its neighbors who get the request message will forward it to the RSU. After receiving the request message, the authority will define some downloading vehicles and distribute a data unit to each of them.The time that a downloading vehicle needs to download a data unit is defined as a time unit (δ).

Fig. 2. Data downloading framework. When these downloading vehicles are at least I+R far from the RSU, they will start to share the data one by one, where I is the interference range of RSUs and vehicles. The distance I +R guarantee that all receivers in the communication range of the downloading vehicle can receive data without collisions and interference from the RSU. The data sharing procedure is shown in Fig. 2. Vehicle 11 (downloading vehicle 1) will share the data unit 1 by broadcasting. After that, it will choose a relay vehicle who can further forward the message to applicants that are several hops away.A certain vehicle may be served as both downloading vehicle and a relay vehicle in this frame work. For instance, if vehicle 11 selects vehicle 9 (downloading vehicle 2) as the relay vehicle, vehicle 9 will broadcast both data unit 1 as a relay vehicle and data unit 2 as a downloading vehicle after vehicle 11 finishes sharing. If vehicle 11 selects vehicle 8 as the next relay vehicle, vehicle 8 will broadcast data unit 1 after vehicle 9 shares the data unit 2. In this protocol a forward sharing process is included to transmit data units from back to front. C. Security Model 1) Short Group Signature: In this paper, the short group signature scheme for privacy provision is resorted. With short group signature, members of a group sign messages under the name of the group. In a group, there is one group public key and many corresponding group private keys. A message that is signed by any group private keys can be verified with the unique group public key, and the signer’s identifier will not be revealed. However, the authority holds a tracing key which can be used to retrieve the group private key from the signature. If one group private key is assigned to only one user, the signer can be identified after the authority gets its group private key. 2) Broadcast Encryption: is a security technique to encrypt broadcast content in such a way that only qualified users can decrypt it. In the broadcast encryption, unsubscription of some users will not affect the remaining users. Moreover, the system is secure against any number of colluders. In this paper short cipher texts are exploited. Therefore, it is more efficient in communications. IV.

SECURE SCHEMA FOR DATA TRANSMISSION

The principle of the schema is that messages in AODV must be authenticated to guarantee the integrity and nonrepudiation so that the protocol can be prevented against several kinds of attacks. Each node in a network has its own a pair of public key e and private key d following RSA Public-key Crypto-system by self-generation, and each node contains a list of neighbor nodes with records containing the information of a neighbor node including neighbor address, neighbor public

Bhanu Gadamsetti, IJRIT

603

IJRIT International Journal of Research in Information Technology, Volume 2, Issue 3, March 2014, Pg: 600-607

key, and a shared secret key. This information is formed after the key agreement between two neighbor nodes to negotiate a pair of keys and a shared secret key. The details of our security schema for AODV are described as the following sections. 4.1 Key agreement process between neighbor nodes A node joining a network requires to send key agreement messages to its neighbors to negotiate a shared secret key. The concept of this process is based on HELLO message in ad-hoc routing protocols. The node broadcasts a message indicating the negotiation request with neighbor nodes: . On receiving this request, nodes reply a message: (where eS and eN are the public key of the sender node and replying node, respectively; request_id is a sequence number generated by the sender node) to indicate the receiving of the request message and inform that it is ready for the key agreement process. For each received message, the request node creates a new record in its neighbor list. Each record contains filled neighbor address and filled neighbor public key; the other fields of the record are empty. For each new record in the list, the request node (A) negotiates a secret key with the neighbor node (B) by the following steps: 1. Generate a key KS by using a secure random number generator, 2. Encrypt KS with eB (node B's public key) = encrypt eB (KS), 3. Send an offer message to B, 4. Wait ACK from B and check message integrity to finish the negotiation When node B receives the offer message, it decrypts encrypt eB (KS) by its private key (dB) to get the shared key kS. Then, node B sends the ACK message to indicate successful shared secret key negotiation, where hKS (request_id) is the hashed message of request id by the shared key KS. Since RSA algorithm is used in the negotiation, the confidentiality of the shared key is guaranteed between the two nodes. The shared key is used for authenticating messages between two adjacent nodes later in AODV routing protocol. In the case a node does not have a shared key with its neighbor nodes, it cannot participate in routing transactions. 4.2 Route request Route request (RREQ) is initiated by a source node (S) and then propagated by intermediate nodes until the message reaches its destination node (D). On receiving RREQ, an intermediate node I, according to AODV routing protocol, checks whether the message will be re-broadcasted or not. If the message needs to be re-broadcasted and the sender is in node I's neighbor list, it will send (unicast) a message to request the authentication process from the sender: . When receiving the authentication request, the sender creates an authentication reply message containing where hashKS (RREQ) is the hashed value of RREQ message by the shared key KS between the two nodes. The authentication reply message is unicasted back to node I. Node I on receiving the message will check the integrity of the RREQ message by hashing the message with using the shared key Ks and then comparing with the received hashed digest. If the comparison is successful (the integrity of the RREQ message is guaranteed), node I continues steps following AODV such as set up reverse path, increase the hop count, rebroadcast the message and so on; otherwise, the RREQ will be discarded. The process continues until the message reaches the destination. The destination also authenticates the sender of RREQ (neighbor of the destination) by the same procedure. 4.3 Route reply and route maintenance Route replies (RREP) in AODV are also targets for attacks by malicious nodes. In our schema, when receiving a RREP, a node requests the sender to proof the integrity and non-repudiation of the message by sending an authentication message. The request for authentication is and the reply is where hashKS (RREP) is the hashed value of RREP message by the shared key KS between the two nodes. After the authentication process is successful, a node continues to the steps in AODV, otherwise, the node drops RREP since it is invalid. In route maintenance process, only route error report message (RERR) is a target for attacks in AODV protocol. Our schema requires the authentication process in sending route error messages to prevent attacks from malicious nodes. The authentication request and response for RERR is , and , respectively. V.

SYSTEM PERFORMANCE

A. Exclusive Data Access Our framework guarantees applicants’ exclusive access to the data that they apply. Before the authority disseminates data, it will encrypt the data by using a session key Kd derived from the broadcast encryption technique, as shown in equation (1).

Bhanu Gadamsetti, IJRIT

604

IJRIT International Journal of Research in Information Technology, Volume 2, Issue 3, March 2014, Pg: 600-607

The encryption ensures only applicants who pay for the service are able to get the key Kd. In other words, the applicants have exclusive access to the data. B. Privacy Provision This method allows vehicles to download data with their privacy under protection. Eavesdroppers are not able to link any two messages sent by the same vehicle. Applicants only need to prove their legitimacy to RSUs and the authority in the request phase. In this procedure, applicants’ privacy is guaranteed by the short group signature protocol. After the request phase, applicants do not need to send any messages. Therefore, it is impossible for eavesdroppers to compromise their privacy. In the data distribution phase, the authority attempts to define downloading vehicles according to their positions. Because only vehicles themselves have their secret keys, eavesdroppers cannot know who the downloading vehicle is. In the data sharing phase, relay vehicles are chosen randomly from candidate sets. After the data sharing, similar to downloading vehicles’ assignment, random index Fi and F’i are used to appoint relay vehicles. Later, when the next relay vehicle starts to share a certain data unit, eavesdroppers can only be sure that this relay vehicle was a member in its predecessor’s the candidate set. However, they can not exactly identify which member it was. We would like to emphasize that in the relay vehicle selection process, except the downloading vehicle and the selected relay vehicle, even vehicles in the candidate set do not know who is selected. All they know is they are not selected. Thus, in our framework, it is impossible for eavesdroppers to link any two messages from the same vehicle. V SIMULATION RESULTS In this section, we use NS-2.34 to evaluate the performance of the proposed cooperate data downloading protocol. We examine the number of data units that a vehicle can download in a drive through with different effective distances between RSUs. Comparisons between our protocol and an existing cooperative downloading protocol “VC-MAC” will also be given. After that, the time that vehicles spend to download all the data and real time throughput will be exhibited. Finally, we evaluate the throughput of our protocol when multiple files are requested. Moreover, Comparisons between our protocol and a simple sharing protocol are presented. In order to produce realistic simulations, modified PHY and MAC which provide cumulative signal to noise plus interference ratio, header and frame body capture, structured and modular MAC procedures are employed .Some parameters that will be used in our simulations are listed in Table. Parameter

value

Number of Nodes

50

Maximum packet size

512 bytes

MAC type

Mac/802_11

number of mobile nodes

30

Initial energy in Joules

100

Communication range

500m

Simulation Time

50ms

Table: Simulation parameters

Bhanu Gadamsetti, IJRIT

605

IJRIT International Journal of Research in Information Technology, Volume 2, Issue 3, March 2014, Pg: 600-607

FIG: Simulation Results. From the simulation results throughput packet delivery ratio and end to end delay increases as the simulation time increases.In secure AODV the system reliability increses since the number of vehicles that ave chance to send the status messages will decrease. This means that not all vehicles get a chance to access the channel and send there status packets.In secure AODV only the authenticated vehicles sends there status packets and can access the channel results in reducing the traffic. VI.

CONCLUSION

In this paper, an analytical model has been presented to analyze the reliability of the IEEE 802.11p in VANETs’ safety, security and privacy applications. The analysis is based on a new mobility model in which the relationship among vehicle density, speed, and the follow-on distance rule is derived. In the analysis, several factors have been considered, such as the impact of mobility on the link availability between the transmitter and the receiver, the distribution of vehicles on the road, and the average number of vehicles within the range of the transmitter. The proposed model is built on the fact that vehicles are broadcasting their status messages securely. REFERENCES [1]

IEEE Draft Standard for Information Technology Telecommunications and Information Exchange Between Systems—Local and Metropolitan Area Networks—Specific Requirements—Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications, Amendment 6: Wireless Access in Vehicular Environments, IEEE Std. 802.11, 2012.

Z. Wang and M. Hassan, “How much of DSRC is available for non-safety use?” inProc. 5th ACM Int. Workshop Veh. Inter-NETw., 2008, pp. 23–29. [3] X. Ma and X. B. Chen, “Delay and broadcast reception rates of highway safety applications in vehicular ad hoc networks,” inProc. Mobile Netw. Veh. Environ. May 2007, pp. 85–90. [4] G. Badawy, J. Misic, T. Todd, and D. Zhao, “Performance modeling of safety message delivery in vehicular ad hoc networks,” inProc. IEEE 6th Int. Conf. WiMob, Oct. 2010, pp. 188–195. [5] J. He, Z. Tang, T. O’Farrell, and T. M. Chen, “Performance analysis of DSRC priority mechanism for road safety applications in vehicularnetworks,”Wireless Commun. Mobile Comput., vol. 11, no. 7, pp. 980– 990, Jul. 2011.

[2]

Bhanu Gadamsetti, IJRIT

606

IJRIT International Journal of Research in Information Technology, Volume 2, Issue 3, March 2014, Pg: 600-607

[6] [7] [8] [9] [10] [11] [12] [13] [14] [15]

X. Ma and X. Chen, “Performance analysis of IEEE 802.11 broadcast scheme in ad hoc wireless LANs,”IEEE Trans. Veh. Technol., vol. 57, no. 6, pp. 3757–3768, Nov. 2008. X. Ma, J. Zhang, and T. Wu, “Reliability analysis of one-hop safetycritical broadcast services in VANETs,” IEEE Trans. Veh. Technol., vol. 60, no. 8, pp. 3933–3946, Oct. 2011. R. Fracchia and M. Meo, “Analysis and design of warning delivery service in intervehicular networks,” IEEE Trans. Mobile Comput., vol. 7, no. 7, pp. 832–845, Jul. 2008. M. Abuelela, S. Olariu, and I. Stojmenovic, “OPERA: Opportunistic packet relaying in disconnected vehicular ad hoc networks,” inProc. 5th IEEE Int. Conf. Mobile Ad Hoc Sens. Syst., 2008, pp. 285–294. S. Yuan, C. Zhang, and P.-H. Ho, “A secure business framework for file purchasing in vehicular networks,”Security Commun. Netw., vol. 1, no. 3, pp. 259–268, 2008. K. E. Shin, H. K. Choi, and J. Jeong, “A practical security framework for a VANET-based entertainment service,” in Proc. ACM PM2HW2N, 2009. X. Lin, X. Sun, P.-H. Ho, and X. Shen, “GSIS: A secure and privacy preserving protocol for vehicular communications,”IEEE Trans. Veh. Technol., vol. 56, no. 6, pp. 3442–3456, 2007 M. Raya and J.-P. Hubaux, “Securing vehicular ad hoc networks,” J. Computer Security, vol. 15, no. 1, pp. 39–68, 2007. K. Sampigethava, M. Li, L. Huang, and R. Poovendran, “AMOEBA: Robust location privacy scheme for VANET,”IEEE J. Sel. Areas Commun., vol. 25, no. 8, pp. 1569–1589, 2007. Y. Hao, J. Tang, Y. Cheng, and C. Zhou, “Secure data downloading with privacy preservation in vehicular ad hoc networks,” inProc. IEEE ICC, May 2010.

Bhanu Gadamsetti, IJRIT

607

Adaptive and Mobility Based Algorithm for enhancement of VANET's ...

In this paper an analytical model for the reliability of vehicular ad hoc networks (VANETs) is ... In vehicular ad hoc networks, vehicles download data from RSUs.

205KB Sizes 1 Downloads 355 Views

Recommend Documents

Routing in VANETs: propose of a generic algorithm
Federal Institute of Education,. Technology and Science of Paraba - IFPB - Campus Campina Grande ..... IEEE Communications Magazine, 46(6):164 - 171.

Routing in VANETs: propose of a generic algorithm
VANETs architecture. • Actually, exists ... There is one architecture developed by IEEE (Institute of ... in large scale, where the vehicles traffic is bigger like found.

Genetic Algorithm based Phase-Only Nulling in Adaptive Antennas
A simple alternative to complex hardware design of adaptive antennas along with optimizing SNR is proposed by the application of genetic algorithms. Adaptive antennas are antenna arrays with phase angle associated with each element of the array. The

An Adaptive Fusion Algorithm for Spam Detection
adaptive fusion algorithm for spam detection offers a general content- based approach. The method can be applied to non-email spam detection tasks with little ..... Table 2. The (1-AUC) percent scores of our adaptive fusion algorithm AFSD and other f

An Adaptive Fusion Algorithm for Spam Detection
An email spam is defined as an unsolicited ... to filter harmful information, for example, false information in email .... with the champion solutions of the cor-.

Mobility enhancement and temperature dependence in ...
31 Oct 2013 - the electron transport data from Ghatak and co-workers,26 which have been interpreted to imply that charged impurities are weakly screened at room temperature. For simplicity, electron-phonon interaction is mostly ignored here to isolat

Speed-Based Mobility Management for Heterogeneous Wireless ...
anticipated that the future wireless mobile Internet ... the integration of IP and wireless technologies. ... heterogeneous wireless network mobility management.

Interference Mitigation and Capacity Enhancement based on ...
Interference Mitigation and Capacity Enhancement ba ... Dynamic Frequency Reuse for Femtocell Networks.pdf. Interference Mitigation and Capacity ...

Speed-Based Mobility Management for Heterogeneous Wireless ...
by a network system. Handoff may be restricted within a system (such as within WWAN) or between heterogeneous systems (such as between WWAN and.

A Receding Horizon Control algorithm for adaptive management of ...
Apr 22, 2009 - eters are refined and the management horizon advances. The RHC .... energy transport model was used to drive the RHC algorithm qk | k.

A Receding Horizon Control algorithm for adaptive management of ...
Apr 22, 2009 - managing soil irrigation with reclaimed water. The largest current .... To explain RHC, we .... information x(k) and the first control u*(k) is then used to calculate the state x(k ю 1) ...... Technical Report NCSU-IE Technical Report

A Two-Stage Contrast Enhancement Algorithm for ...
gradation of the cloud and makes the grasslands brighter and provides ... Enhancement using Per-Pixel Virtual Exposures”, ACM. Transactions on Graphics ...

Image-based fusion for video enhancement of night ...
School of computer science and engineering, Chengdu,. China, 611731. bShanghai Jiao Tong University, Institute of Image. Communications and Information ... online Dec. 29, 2010. .... where FL(x, y) is the final illumination image, M(x, y) is.

A local mobility agent selection algorithm for mobile ...
Email: {yxu, hlee, vriz}@i2r.a-star.edu.sg. Abstract— The Mobile IP ... dent service. No matter where a host resides physically, the network should be able to identify it correctly with transpar- ent support for communications above network layer.

2012_ASCE_JTE_Fuzzy Logic–Based Mapping Algorithm for ...
2012_ASCE_JTE_Fuzzy Logic–Based Mapping Algorithm for Improving Animal-Vehicle Collision Data.pdf. 2012_ASCE_JTE_Fuzzy Logic–Based Mapping ...

A Hierarchical Goal-Based Formalism and Algorithm for ...
models typically take a large amount of human effort to create. To alleviate this problem, we have developed a ... and Search—Plan execution, formation, and generation. General Terms. Algorithms ...... data point is an average of 10 runs. There are

Optimization of Pattern Matching Algorithm for Memory Based ...
Dec 4, 2007 - widely adopted for string matching in [6][7][8][9][10] because the algorithm can ..... H. J. Jung, Z. K. Baker, and V. K. Prasanna. Performance of.

Optimization of Pattern Matching Algorithm for Memory Based ...
Dec 4, 2007 - accommodate the increasing number of attack patterns and meet ... omitted. States 4 and 8 are the final states indicating the matching of string ...

AntHocNet: An Adaptive Nature-Inspired Algorithm for ... - CiteSeerX
a broad range of possible network scenarios, and increases for larger, ... organized behaviors not only in ant colonies but more generally across social systems, from ... torial problems (e.g., travelling salesman, vehicle routing, etc., see [4, 3] f

Adaptive Line Extraction Algorithm for SLAM Application
Algorithm (ALE) to create line-based maps using a series of range data .... distance between data points and fitted line [15] to evaluate fitting. When a line is fitted ...

Adaptive Line Extraction Algorithm for SLAM Application
based SLAM is implemented on a mobile rescue robot to observe the proposed line ... incorporate noises of the range data, the fitted lines do not have a sound ...

AntHocNet: An Adaptive Nature-Inspired Algorithm for ...
network. Nature's self-organizing systems like insect societies show precisely these desir- ... while maintaining the properties which make ACO routing algorithms so appealing. ...... Routing over multihop wireless network of mobile computers.

Sparsity adaptive matching pursuit algorithm for ...
where y is the sampled vector with M ≪ N data points, Φ rep- resents an M × N ... sparsity adaptive matching pursuit (SAMP) for blind signal recovery when K is ...

A Memory Efficient Algorithm for Adaptive Multidimensional Integration ...
implemented on GPU platform using a single Tesla M2090 device [9]. ...... memory access patterns in CUDA,” Design Automation Conference (DAC), 2011 48th.