• 제목/요약/키워드: mobile communication network

Search Result 2,173, Processing Time 0.089 seconds

Broadcasting Message Reduction Methods in VANET

  • Makhmadiyarov, Davron;Hur, Soojung;Park, Yongwan
    • IEMEK Journal of Embedded Systems and Applications
    • /
    • v.4 no.1
    • /
    • pp.42-49
    • /
    • 2009
  • Most Vehicular Ad hoc Network (VANET) applications rely heavily on broadcast transmission of traffic related information to all reachable nodes within a certain geographical area. Among various broadcast approaches, flooding is the first broadcasting technique. Each node rebroadcasts the received message exactly once, which results in broadcast storm problems. Some mechanisms have been proposed to improve flooding in Mobile Ad hoc Networks (MANET), but they are not effective for VANET and only a few studies have addressed this issue. We propose two distance-based and timer-based broadcast suppression techniques: 15P(15percent) and slotted 15P. In the first (distance based) scheme, node's transmission range is divided into three ranges (80%,15%and5%). Only nodes within 15% range will rebroadcast received packet. Specific packet retransmission range (15%) is introduced to reduce the number of messages reforwarding nodes that will mitigate the broadcaststorm. In the second (timer-based) scheme, waiting time allocation for nodes within 15% range isused to significantly reduce the broadcaststorm. The proposed schemes are distributed and reliedon GPS information and do not requireany other prior knowledge about network topology. To analyze the performance of proposed schemes, statistics such as link load and the number of retransmitted nodes are presented. Our simulation results show that the proposed schemes can significantly reduce link load at high node densities up to 90 percent compared to a simple broadcast flooding technique.

  • PDF

On-line Network Pseudo-dynamic Test Technologies Using the Internet (인터넷 기반 온라인 네트워크 유사동적 실험기법)

  • Park, D.U.;Yun, C.B.;Nagata, K.;Watanabe, E.
    • Proceedings of the Earthquake Engineering Society of Korea Conference
    • /
    • 2006.03a
    • /
    • pp.553-562
    • /
    • 2006
  • 본 논문에서는 한국과 일본에 위치한 여러 연구기관들 사이에서 수행된 온라인 네트워크 유사동적 실험 곁과에 대해 나타내었다. 예제 구조물로는 4경간 연속의 면진 교량을 이용하였다. 실험 장비를 보유하고 있는 두 연구기관에서 면진 장치의 비선형 거동에 대한 실험을 수행하고 각 실험 결과를 조합하여 전체 구조의 동적 해석을 수행하였다. 본 논문에서는 먼저 인터넷을 이용한 두 가지 데이터 전송기법을 이용하여 두 기법의 효율성을 비교, 분석하였다. 또한 최근 국내에 위치한 두 연구기관 사이에서 수행된 실험 결과에 대해 논의하였다. 본 연구에서는 상대 연구기관의 실험 상황 및 수행된 실험 결과의 효율적인 모니터링을 위하여 웹 기반의 자바 모니터링 시스템을 개발하였다. 마지막으로 유선과 무선 인터넷을 이용한 온라인 실험 기법에 대하여 나타내었다. 그 결과, 온라인 네트워크 실험에 소요된 실험 시간은 데이터 전송 기법과 실험장비에 따라 매 시간 단계의 데이터 전송에 0.2-l5초, 각 연구기관의 유사동적 실험에 1-10초의 시간이 소요되어 매우 큰 폭으로 변화함을 알 수 있었다. 또한 무선 인터넷을 이용한 온라인 실험의 경우, 뛰어난 이동성과 인터넷 보안성 등과 같은 여러 가지 장점을 가지고 있음을 알 수 있었다.

  • PDF

An Effective Emergency Message Delivery Mechanism for VANET (VANET에서의 효율적인 긴급 메시지 전송 기법)

  • Hwang, Jeong-Hee;Choe, Jong-Won
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.11 no.4
    • /
    • pp.86-94
    • /
    • 2012
  • VANETs can provide traffic warring service to help drivers drive safely based on the information of the traffic condition. The driver can drive safely through the warning service information provided by the VANET and know the traffic condition exactly more than through only the sight of driver. In this paper we suggest a new mechanism of updating the table to broadcast the message more rapidly based on the table driven method as the way of sending the emergency message in the VANETs. When updating the table, nodes sends only based on the message transmission success rate. In the result of simulation we could find that the suggested mechanism would reduce the delay time of the emergency message broadcast compared to the existing mechanism.

Identifying Mobile Owner based on Authorship Attribution using WhatsApp Conversation

  • Almezaini, Badr Mohammd;Khan, Muhammad Asif
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.7
    • /
    • pp.317-323
    • /
    • 2021
  • Social media is increasingly becoming a part of our daily life for communicating each other. There are various tools and applications for communication and therefore, identity theft is a common issue among users of such application. A new style of identity theft occurs when cybercriminals break into WhatsApp account, pretend as real friends and demand money or blackmail emotionally. In order to prevent from such issues, data mining can be used for text classification (TC) in analysis authorship attribution (AA) to recognize original sender of the message. Arabic is one of the most spoken languages around the world with different variants. In this research, we built a machine learning model for mining and analyzing the Arabic messages to identify the author of the messages in Saudi dialect. Many points would be addressed regarding authorship attribution mining and analysis: collect Arabic messages in the Saudi dialect, filtration of the messages' tokens. The classification would use a cross-validation technique and different machine-learning algorithms (Naïve Baye, Support Vector Machine). Results of average accuracy for Naïve Baye and Support Vector Machine have been presented and suggestions for future work have been presented.

Implementation of platform for long-term evolution cell perspective resource utilization analysis

  • Um, Jungsun;Kim, Igor;Park, Seungkeun
    • ETRI Journal
    • /
    • v.43 no.2
    • /
    • pp.232-245
    • /
    • 2021
  • As wireless communication continues to develop in limited frequency resource environments, it is becoming important to identify the state of spectrum utilization and predict the amount needed in future. It is essential to collect reliable information for data analysis. This paper introduces a platform that enables the gathering of the scheduling information of a long-term evolution (LTE) cellular system without connecting to the network. A typical LTE terminal can confirm its assigned resource information using the configuration parameters delivered from a network. However, our platform receives and captures only the LTE signal over the air and then enables the estimation of the data relevant to scheduling for all terminals within an LTE cell. After extracting the control channel signal without loss from all LTE subframes, it detects valid downlink control information using the proposed algorithm, which is based on the error vector magnitude of depatterned symbols. We verify the reliability of the developed platform by comparing it with real data from mobile phones and service operators. The average difference in resource block utilization is only 0.28%.

Performance Evaluation for a Unicast Vehicular Delay Tolerant Routing Protocol Networks

  • Abdalla, Ahmed Mohamed
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.2
    • /
    • pp.167-174
    • /
    • 2022
  • Vehicular Ad hoc Networks are considered as special kind of Mobile Ad Hoc Networks. VANETs are a new emerging recently developed, advanced technology that allows a wide set of applications related to providing more safety on roads, more convenience for passengers, self-driven vehicles, and intelligent transportation systems (ITS). Delay Tolerant Networks (DTN) are networks that allow communication in the event of connection problems, such as delays, intermittent connections, high error rates, and so on. Moreover, these are used in areas that may not have end-to-end connectivity. The expansion from DTN to VANET resulted in Vehicle Delay Tolerant Networks (VDTN). In this approach, a vehicle stores and carries a message in its buffer, and when the opportunity arises, it forwards the message to another node. Carry-store-forward mechanisms, packets in VDTNs can be delivered to the destination without clear connection between the transmitter and the receiver. The primary goals of routing protocols in VDTNs is to maximize the probability of delivery ratio to the destination node, while minimizing the total end-to-end delay. DTNs are used in a variety of operating environments, including those that are subject to failures and interruptions, and those with high delay, such as vehicle ad hoc networks (VANETs). This paper discusses DTN routing protocols belonging to unicast delay tolerant position based. The comparison was implemented using the NS2 simulator. Simulation of the three DTN routing protocols GeOpps, GeoSpray, and MaxProp is recorded, and the results are presented.

Development of User Subscription Services in E-Commerce: Effects on Consumer Behavior

  • Irina Gladilina;Gennady Degtev;Evgeniy Kochetkov;Elena Tretyak;Diana Stepanova;Lyailya Mutaliyeva
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.11
    • /
    • pp.53-58
    • /
    • 2023
  • The trend of satisfying consumer needs (payment for mobile communication, music services, cab ordering, banking products, and food delivery) on a unified online platform has shaped a digital ecosystem, an instrument creating a unified space of economic interaction. Representatives of e-commerce are major stakeholders in the development of such tools. In particular, subscription services (multiservice subscriptions) allow users to create their own ecosystems based on their personal preferences. The rate of subscription service use is growing around the world, yet understanding of the peculiarities of development of this e-commerce sphere is limited due to insufficient research.The study aims to determine the motives and barriers to the use of subscription services (multiservice subscriptions) by consumers and their relationship with consumer characteristics.Proceeding from an online survey of 200 users, the study determines the relationship between the gender and income of consumers and their use of subscription services, motives and motivators for using subscription services, and barriers to the choice of a particular subscription service. The obtained results may serve as a basis for managerial decisions in e-commerce and for improving the effectiveness of marketing solutions.

Design and Implementation of Fully Automated Solar Powered Irrigation System

  • Mohammad Fawzi Al Ajlouni;Essam Ali Al-Nuaimy;Salman Abdul-Rassak Sultan;Ali Hammod AbdulHussein Twaij;Al Smadi Takialddin
    • International Journal of Computer Science & Network Security
    • /
    • v.24 no.4
    • /
    • pp.197-205
    • /
    • 2024
  • This paper presents a fully automated stand-alone irrigation system with GSM (Global System for Mobile Communication) module. Solar energy is utilized to power the system and it is aimed to conserve water by reducing water losses. The system is based on a DC water pump that draws energy from solar panels along with automated water flow control using a moisture sensor. It is also fitted with alert and protection system that consists of an ultrasonic sensor and GSM messages sender that transmits signals showing the levels of the water in the reservoir and the battery charge. The control system is designed to stop the water pump from pumping water either when the battery level drops to equal or less than 10% of its full charge, or when the water level becomes less than 10 cm high in the reservoir. The experimental results revealed that the system is appropriate to use in remote areas with water scarcity and away from the national grid.

A Study on Polynomial Pre-Distortion Technique Using PAPR Reduction Method in the Next Generation Mobile Communication System (차세대 이동통신 시스템에 PAPR 감소기법을 적용한 다항식 사전왜곡 기법에 관한 연구)

  • Kim, Wan-Tae;Park, Ki-Sik;Cho, Sung-Joon
    • Journal of Advanced Navigation Technology
    • /
    • v.14 no.5
    • /
    • pp.684-690
    • /
    • 2010
  • Recently, the NG(Next Generation) system is studied for supporting convergence of various services and multi mode of single terminal. And a demand of user for taking the various services is getting increased, for supporting these services, many systems being able to transmit a large message have been appeared. In the NG system, it has to be supporting the CDMA and WCDMA besides the tele communication systems using OFDM method with single terminal An intergrated system can be improved with adopting of SoC technique. For adopting SoC technique on the intergrated terminal, we have to solve the non linear problem of HPA(High Power Amplifier). Nonlinear characteristic of HPA distorts both amplitude and phase of transmit signal, this distortion cause deep adjacent channel interference. We adopt a polynomial pre-distortion technique for this problem. In this paper, a noble modem design for NG mobile communication service and a method using polynomial pre-distorter with PAPR technique for counterbalancing nonlinear characteristic of the HPA are proposed.

Performance Analysis of Fast Handover Scheme Based on Secure Smart Mobility in PMIPv6 Networks (프록시 모바일 IPv6 네트워크에서 안전한 스마트 이동성에 기반한 빠른 핸드오버 기법의 성능분석)

  • Yoon, KyoungWon;Jeong, Jongpil
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.13 no.5
    • /
    • pp.121-133
    • /
    • 2013
  • Defect-free transfer service on the Next-generation wireless network extensive roaming mobile node (MN) to provide efficient mobility management has become very important. MIPv6(Mobility IPv6) is one of mobility management scheme proposed by IETF(Internet Engineering Task Force), and IPv6-based mobility management techniques have been developed in various forms. One of each management techniques, IPv6-based mobility management techniques for PMIPv6 (MIPv6) system to improve the performance of a variety of F-PMIPv6 (Fast Handover for Proxy MIPv6) is proposed. However, the F-PMIPv6 is cannot be excellent than PMIPv6 in all scenarios. Therefor, to select a proper mobility management scheme between PMIPv6 and F-PMIPv6 becomes an interesting issue, for its potenrials in enhancing the capacity and scalability of the system. In this paper, we develop an analytical model to analyze the applicability of PMIPv6 and F-PMIPv6. Based on this model, we design an Secure Smart Mobility Support(SSM) scheme that selects the better alternative between PMIPv6 and F-PMIPv6 for a user according to its changing mobility and service characteristics. When F-PMIPv6 is adopted, SSM chooses the best mobility anchor point and regional size to optimize the system performance. Numerical results illustrate the impact of some key parameters on the applicability of PMIPv6 and F-PMIPv6. Finally, SSM has proven even better result than PMIPv6 and F-PMIPv6.