Search Result

22675

Results Found

Relevance

Filter

Newest

Filter

Most Viewed

Filter

Most Downloaded

Filter

Most Cited

Filter

Pages Count

2268

Go To Page

Search Results/Filters    

Filters

Year

Banks



Expert Group











Full-Text


مرکز اطلاعات علمی SID1
اسکوپوس
دانشگاه غیر انتفاعی مهر اروند
ریسرچگیت
strs
Author(s): 

CHANG I.C. | LI C.H. | CHOU C.F.

Journal: 

SCIENTIA IRANICA

Issue Info: 
  • Year: 

    2015
  • Volume: 

    22
  • Issue: 

    4 (TRANSACTIONS B: MECHANICAL ENGINEERING)
  • Pages: 

    1517-1533
Measures: 
  • Citations: 

    0
  • Views: 

    1097
  • Downloads: 

    0
Abstract: 

To date, many VEHICULAR ad hoc NETWORK unicast routing protocols have been proposed to support efficient packet transmission between vehicles in urban environments. However, when there is insufficient vehicle density during non-rush hour times, the VEHICULAR ad hoc NETWORK is often intermittently connected. These unicast routing protocols, therefore, perform poorly when forwarding packets over this VEHICULAR disruption TOLERANT NETWORK. This paper adopts the controlled replication approach, in a proposed IG-Ferry routing protocol, to spray a limited number of packet copies, denoted by packet token values, to relay vehicles in a VEHICULAR disruption TOLERANT NETWORK. We then identify three kinds of relay vehicle, i.e. direct buses, non-direct buses and private cars according to their travel itineraries. Based on the proposed DELAY evaluation function for the three types of intermediate vehicle, the IG-Ferry packet spraying mechanism, instead of that of traditional binary spraying, can efficiently spray appropriate packet tokens to vehicles. Finally, intensive NS2 simulations are conducted using the realistic Shanghai city vehicle traffic trace, IEEE 802.11p protocol, with EDCA and the Nakagami radio propagation model, to show that IG-Ferry outperforms three well-known VDTN routing protocols, in terms of average packet delivery ratios, end-to-end transmission DELAYs and packet replication overheads, with respect to various combinations of five communication parameters.

Yearly Impact:

View 1097

Download 0 Citation 0 Refrence 0
Author(s): 

ZANG Y. | STIBOR L. | WALKE B.

Issue Info: 
  • Year: 

    2007
  • Volume: 

    -
  • Issue: 

    -
  • Pages: 

    0-0
Measures: 
  • Citations: 

    392
  • Views: 

    8497
  • Downloads: 

    16627
Keywords: 
Abstract: 

Yearly Impact:

View 8497

Download 16627 Citation 392 Refrence 0
Author(s): 

PARK D. | NICOPOULOS C. | DAS C.R.

Issue Info: 
  • Year: 

    2006
  • Volume: 

    -
  • Issue: 

    -
  • Pages: 

    93-104
Measures: 
  • Citations: 

    458
  • Views: 

    27358
  • Downloads: 

    28684
Keywords: 
Abstract: 

Yearly Impact:

View 27358

Download 28684 Citation 458 Refrence 0
گارگاه ها آموزشی
Issue Info: 
  • Year: 

    2021
  • Volume: 

    50
  • Issue: 

    4 (94)
  • Pages: 

    1833-1845
Measures: 
  • Citations: 

    0
  • Views: 

    103
  • Downloads: 

    121
Abstract: 

The conventional routing protocols are not able to handle intermittent mobile NETWORKs, since because of deficiency of nodes’ density, mobility, instability of radio connections, most of the times no path exists among the source and destination nodes. DELAY TOLERANT NETWORKs (DTN) is a solution in which communications become feasible in intermittent mobile NETWORKs by tolerating long DELAYs. Routing methods in DTN use the idea of spreading packets among the mobile nodes for transporting information toward the destinations. In order to achieve a good performance, it is necessary to control the workload of the NETWORK by limiting the number of copies. In this paper, a novel method for packet copying process is proposed which improves the throughput significantly while controlling the workload of the NETWORK. The key idea behind the proposed method is to prioritize the buffered packets at each node in order to avoid excessive repetitions of packets and stop wasteful workload grow. The packets are prioritized based on the source nodes, the ages, and their remaining lifetimes. Our simulation results indicate that the proposed method can improve packet delivery ratio by 40 to 60 percent in comparison with Spray and Binary Wait, and Direct delivery routing methods.

Yearly Impact:

View 103

Download 121 Citation 0 Refrence 0
Issue Info: 
  • Year: 

    2017
  • Volume: 

    48
  • Issue: 

    2
  • Pages: 

    345-356
Measures: 
  • Citations: 

    0
  • Views: 

    52634
  • Downloads: 

    12560
Abstract: 

In this paper, a new virtual leader following consensus protocol is introduced to perform the internal (asymptotic) stability analysis of longitudinal platoon of vehicles under generic NETWORK topology. In all previous studies on multi-agent systems with generic NETWORK topology, the control parameters are strictly dependent on eigenvalues of NETWORK matrices (adjacency or Laplacian). Since some of these eigenvalues are complex, the stability analysis with the presented methods is very hard or even impossible for large scale or time-varying NETWORKs. A new approach is introduced in this paper to decouple the large dimension closed-loop dynamics to individual third-order linear differential equations. A new spacing policy function assuring safety and increasing the traffic capacity is introduced to adjust the inter-vehicle spacing. The stable regions of communication and parasitic DELAYs are calculated by employing the cluster treatment characteristic roots (CTCR) method. It will be shown that the presented approach assures the internal stability of large-scale platoon of vehicles with generic NETWORK topology. The most important privilege of the presented method compared with the previous approaches, is that the control gains are independent on NETWORK structure. This new finding, simplifies the stability analysis and control design specially for large scale platoons and time-varying NETWORKs. Several simulation results are provided to show the effectiveness of the proposed approaches.

Yearly Impact:

View 52634

Download 12560 Citation 0 Refrence 0
Issue Info: 
  • Year: 

    2016
  • Volume: 

    4
  • Issue: 

    1 (13)
  • Pages: 

    59-69
Measures: 
  • Citations: 

    608
  • Views: 

    89228
  • Downloads: 

    35126
Abstract: 

The DELAY TOLERANT Mobile Sensor NETWORKs (DTMSNs) distinguish themselves from conventional sensor NETWORKs by means of some features such as loose connectivity, node mobility, and DELAY tolerability. It needs to be acknowledged that traditional end-to-end routing protocols cannot be applied usefully in such challenging NETWORK conditions because of intermittent connections and/or long DELAYs. Hence, this research is intended to propose a Unicast Tree-based Data Gathering protocol (UTDG) to resolve this problem. A UTDG includes 3 phases: tree formation phase, data collection and data transmission phase, and finally the updating phase. The proposed protocol constructs a tree in each community on the basis of transmission ranking, contact probability and the link expiration time. The selection of the next-hop node is based on the tree structure rather than forwarding the message to the neighbor node directly. Each node unicasts the data to its parent in the related community, and the root of the tree successively sends the data to the sink node. The authors contend, based on the simulation results of the study, that the proposed protocol can gain significantly higher message delivery rates with lower transmission overhead and also lower DELAY in data delivery than the other existing DTMSNs routing protocols in some applications.

Yearly Impact:

View 89228

Download 35126 Citation 608 Refrence 0
strs
Issue Info: 
  • Year: 

    2015
  • Volume: 

    4
  • Issue: 

    3
  • Pages: 

    29-38
Measures: 
  • Citations: 

    0
  • Views: 

    1348
  • Downloads: 

    339
Abstract: 

The DELAY TOLERANT Mobile Sensor NETWORKs (DTMSNs) distinguish themselves from conventional sensor NETWORKs by means of several features such as node mobility, loose connectivity, and DELAY tolerability. In comparison with conventional NETWORKs, prominent feature of these NETWORKs is that there is not end-to-end path between source and destination. Due to energy limitation, one of the crucial issues in large-scale NETWORKs is energy storage that can be overcome this problem by distribution of multi-sink in a NETWORK at the same time. In this paper, in order to covering large area, we determine a new radio range to sink nodes that prevents the presence of nodes in the radio range of multiple sinks and sending data to a large number of sinks. Then, we represent Replica Adaptive Data Gathering Protocol. Simulation results indicate that the proposed protocol significantly improves message delivery rate with lower transmission overhead and also lower DELAY in data delivery than the other existing DTMSNs routing protocols.

Yearly Impact:

View 1348

Download 339 Citation 0 Refrence 0
Author(s): 

PIRRETTI M. | LINK G.M. | BROOKS R.R.

Issue Info: 
  • Year: 

    2004
  • Volume: 

    -
  • Issue: 

    -
  • Pages: 

    46-51
Measures: 
  • Citations: 

    454
  • Views: 

    16567
  • Downloads: 

    27754
Keywords: 
Abstract: 

Yearly Impact:

View 16567

Download 27754 Citation 454 Refrence 0
Issue Info: 
  • Year: 

    2021
  • Volume: 

    8
  • Issue: 

    4 (32)
  • Pages: 

    41-52
Measures: 
  • Citations: 

    0
  • Views: 

    194
  • Downloads: 

    142
Abstract: 

The NETWORK overhead and multiple NETWORKs disconnection faults are the main challenges of anonymous servers implemented in VANETs. The block chain technology has been entered into the wide range of preserving privacy. The robust anonymity mechanism existence and the traceability of all transactions are the main advantages of this technology. The primary model of the block chain was able to complete the process with the anonymity stored data. In distributed models, the authentication, storage and retrieval of transactions are applied by all user’ s consensus. The asymmetric cryptography, preserves the identity anonymity and aggregating transactions of different users into a block which is ready to send, preserves the path anonymity. The proposed method is aimed to ensure anonymity by mounting the block chain on VANETs. Before delivering any transaction to the block chain, the risk of user’ s privacy is high. To achieve low risk, we combine the graph processing methods with Silent Period, Cloaking-Region and Dummy Node methods. The block chain simulation on VANET is driven by python and the anonymity risks are simulated with ARX. The results suggest that the block chain is stabled and the optimal risk reduction is achieved on the VANET.

Yearly Impact:

View 194

Download 142 Citation 0 Refrence 0
Author(s): 

Adaramola Ojo Jayeola

Issue Info: 
  • Year: 

    2018
  • Volume: 

    4
  • Issue: 

    3 (serial 15)
  • Pages: 

    185-192
Measures: 
  • Citations: 

    0
  • Views: 

    57576
  • Downloads: 

    63083
Abstract: 

Efficient message delivery in city environment is required to ensure driver’ s safety and passenger’ s comfortability. In cities of developed nations, routing of data in VEHICULAR Ad hoc NETWORK (VANET) faces many challenges such as radio obstacles, mobility constraints and uneven nodes distribution. These factors primarily makes communication between vehicles complex. To overcome and transmit data traffic effectively in city environment in the presence of abovementioned challenges, evaluation of some NETWORK parameters conducted. The selected metrics are packet delivery ratio (PDR), end-to-end DELAY and routing overhead. These are based on three performance of position-based routing protocols: Anchor– based Street and Traffic Awareness Routing (A-STAR), Greedy Perimeter Coordinator Routing (GPCR) and Contention Based Forwarding (CBF) with the help of Simulation of Urban Mobility (SUMO) to generates vehicle mobility in city environment and NETWORK simulator (OMNeT++) to creates and calculates needed components. The speed of the vehicles and node density were varied in this process, and the simulated results showed that CBF outperforms significantly than A-STAR and GPCR in terms of packet delivery ratio as the speed varied and with a better end-to-end DELAYs and routing overhead at a lower speed. In addition, CBF performs better than A-STAR and GPCR in terms of packet delivery ratio as the node varied with a better end-to-end DELAY, and a better routing overhead at a lower node density.

Yearly Impact:

View 57576

Download 63083 Citation 0 Refrence 0
litScript