Computer Science Research Articles
Single Platform to Read Collections of Research Articles
A Survey on Emergency Vehicle Preemption Methods Based on Routing and Scheduling
Shridevi Jeevan Kamble, Manjunath R Kounte
Abstract - Emergency Vehicles (EVs) play a significant role in saving human lives and property damages. Reducing the time delay of emergency vehicles is important to enhance emergency service performance. The preemption methods are powerful strategies that assist emergency vehicles to reach the desired destination quickly by managing the competing normal traffic along the emergency vehicle approaching lane. The EV preemption models pre-clears the vehicles on the EV approaching lane by interrupting the signal timings and boosting EV arrival speed even the road traffic is high. With the assistance of preemption models, the EVs are not stopping or waiting at signalized intersections. Also, the preemption models diminish the vehicle conflict problems on the EV approaching lane. Moreover, the preemption models use different strategies to navigate the EVs on their routes efficiently. Hence, a detailed survey is needed to understand the different preemption strategies and analyze the gaps which are not effectively solved by existing literature. This paper attempts to survey the existing EV preemption methods with detailed discussions. For a clear view, the survey divides the existing preemption models into three types that are routing-based, scheduling-based, and miscellaneous. The survey compares the preemption methods with their advantages and limitations. Further, it analyzes the gaps which are not solved in existing solutions and describe the possible future directions that pave the way for innovating novel realistic preemption solutions.
Published: 2022Read / Download
A Comprehensive Survey of Various Localization Methods in Vehicular Ad Hoc Network
Maria Christina Blessy A, S. Brindha
Abstract - Internet of Things (IoT) has had an evolutionary impact in recent days. The various changes in lifestyle and other critical influences have a huge impact on the growth of IoT. IoT in localization-based applications has attained remarkable attention, especially in the localization/positioning of vehicle tracking, health sector, etc. Localization is vital for Vehicular Ad Hoc Networks (VANET) in wireless communication technologies. VANET is prominent for most accident prevention, vehicle tracking, and efficient transportation applications. Most of the existing systems contain GPS technology integrated with vehicles for localization-based applications. The evolution of IoT replaces GPS in the VANET localization application. Various localization solutions are evolved in the literature, but it fails to meet the localization precision according to the consumer needs. In this survey, we have done depth analysis of existing technologies and techniques in the field of localization along with IoT. The analysis includes various parameters like RSU usage, Cooperative Localization methods, VANET localization effects, etc. This study describes that the RSU structures did not improve localization accuracy; instead, it minimizes the required mobile anchor nodes in VANET. Different VANET operations and their results related to real-world scenarios are discussed in detail. Finally, as a result of this potential research, a refined methodology is introduced for future research.
Published: 2021Read / Download
Recursive Perceptron Long Short Term Memory for Wireless Data Transmission in Unmanned Aerial Vehicles
Uma. S, M J Carmel Mary Belinda
Abstract - In Wireless Sensor Networks, diverse nodes are associated with each other for monitoring definite circumstances. So, sensors are considerably utilized in distinct real-time utilizations namely remote operated unmanned vehicle, atmospheric surveillance, disaster management, and so on. Transmitting data from a remote operated unmanned vehicle to server via Long Term Evolution (LTE) with the harmony of Bluetooth Low Energy (BLE) relaying remains the core of significant data transmission in wireless networks. The utilization of Unmanned Aerial Vehicles (UAVs) for wireless networks is swiftly heightening as the driving force of new applications due to their distinctive resources for improving coverage and energy efficiency of wireless network UAVs act as base stations. In other condition, data-driven Deep Learning-assisted (DL) strategies using multilayer perceptron are acquiring an increasing interest for not utilizing huge frequency of generated data, however ensuring network procedure in an optimal manner and hence providing QoS requirements of wireless networks. But, UAVs is resource-constrained devices specifically in power resources and data transmission. With traditional DL scheme being cloud-centric necessitate UAVs' data are stored in centralized server, therefore generating huge communication overhead and thus result in network bandwidth and energy inefficiency of UAV devices. To address these issues in this work, a Fully Recursive Long Short Term Memory (FR-LSTM) for improving data transmission rates and quality of service in wireless networks is proposed. Initially, Deep Learning-based model was designed in Long Term Evolution (LTE) Dominant Influencing Criterions (DIC) estimation. The applications of power resources and bandwidth allocation (PRBA) in self-organizing LTE small cell network, therefore minimizing RMSE and average end-to-end delay involved in transmission. Next, a Fully Recursive Perceptron Network (FRPC) and LSTM model was utilized and applied for DIC to resolve the UAV position which reduces overall system performance and user throughput. Hence, for classification regression tasks, when is there no LTE signal, data can be transmitted to another device through BLE (Bluetooth Low Energy), therefore ensuring throughput and ensuring minimum latency. The effectiveness of FR-LSTM is yet to be validated using four kinds of evaluation metrics with diverse number of nodes, namely, RMSE, throughput, average end-to-end delay, and latency.
Published: 2021Read / Download
A Survey of Medium Access Control Protocols for Unmanned Aerial Vehicle (UAV) Networks
Jyoti, Ranbir Singh Batth, Sahil Vashisht
Abstract - The use of Unmanned Aerial Vehicles is growing increasingly across many civil benefits, including real-time monitoring, medical emergencies, surveillance, and defence. Many different types of UAVs are being developed to meet the demands of diverse users. Therefore, the research areas in the UAV domain are evolving as the types and number of UAVs increase. UAV's faces numerous problems in channel accessing, radio allotment, latency and most of these issues are because of the ineffective MAC protocols, moreover MAC is also important because it affects not only the system performance but also the energy efficiency in battery-powered sensor nodes. In this research article various Medium access control (MAC) protocols discussed and qualitatively compared on the basis of various Quality-of-Service (QoS) parameters.
Published: 2021Read / Download
Ensemble Miscellaneous Classifiers Based Misbehavior Detection Model for Vehicular Ad-Hoc Network Security
S. Sumithra, R. Vadivel
Abstract - Vehicular Ad-Hoc Network is an emerging technology, mainly developed for road safety applications, entertainment applications, and effective traffic conditions. VANET applications work based on the accurate mobility information shared among the vehicles. Sometimes attackers manipulate the mobility information shared by the adjacent vehicle or neighboring vehicle, which results in terrible consequences. To deal with the illusion-based type of attacks, researchers have proposed enormous solutions. Unfortunately, those solutions could not deal with the dynamic vehicle conditions and variable cyber malfunctions, which reduces the misbehavior detection accurateness and increases the false-positive rate. In this paper, the dynamic vehicle context is taken into account to propose a two solutions such as Miscellaneous VANET Classifiers based Misbehavior Detection Model (MVC-MDM) and Ensemble Miscellaneous VANET Classifiers based Misbehavior Detection Model (EMVC-MDM). This model is constructed based on the Mobility Data Gathering phase, Mobility Context Feature Extraction phase, Mobility Context Feature Level Fixing phase, Hampel Filter based.......................
Published: 2021Read / Download
A Comparative Study on Efficient Path Finding Algorithms for Route Planning in Smart Vehicular Networks
Gurpreet Singh Shahi, Ranbir Singh Batth, Simon Egerton
Abstract - With the rise in the economy and population of various developing and developed nations leads to an increase in the number of vehicles on the road to manifolds recently. In the smart vehicular networks, there are numerous vehicle transportation problems (VTP) exists. The main or the most common problem is the congestion occurrence due to traffic jams and road accidents, especially in urban areas. So route planning to find the optimal route for a vehicle that is moving from source to destination is an important and challenging task as the route conditions change with the traffic conditions, hence the shortest and optimal route needs to be re-evaluated. This manuscript presents a study and comparison of various pathfinding algorithms which include Dijkstra, A Star, CH, and Floyd Warshall algorithms which are available as optimal route finding algorithms. The simulation of working algorithms with comparison has been performed using SUMO with TRACI and using python coding. The simulation is performed on real maps of urban areas. The parameters used for the comparative study are travel time, distance travelled, and speeds of vehicles.
Published: 2020Read / DownloadMultipath Routing for Internet of Vehicles using Master of Controller in Road Awareness (MRMOC-IOV)
Piyush Chouhan, Swapnil Jain
Abstract - Internet of Vehicles (IOV) is the recent advancement in the field of transportation which contains smart devices to make transportation easy and reliable. Road awareness also makes use of the internet of vehicles with the help of a master of control, so it needs a secure routing approach to provide the scalability to the architecture and to increase the flexibility of the system as well. This work proposed a multipath routing with extension (MDR-Ext) approach for road awareness by making use of the master of control (MOC) for establishing the network of vehicles. The system works by getting the frequent information of the vehicle details in the network by the brink controller (BC). The BC receives this data from vehicles that proceed to the MOC controller to calculate the shortest path for communication between vehicles with data packets. The path is interpreted by the MOC controller and path updating is done by the values receiving from BC at a regular interval. The proposed approach works well and the shattering of the network due to mobility is overcome through the BC. In this proposed approach packet delivery ratio................................
Published: 2020Read / Download
Partial Topology-Aware Data Distribution within Large Unmanned Surface Vehicle Teams
Agyemang Isaac Osei, Adjei-Mensah Isaac
Abstract - In a distributed team of Unmanned Surface Vehicles (USV), distributing data to attain full coverage but not to overwhelm the network is a peculiar problem as in most cases USV's within the overlay network formed have little knowledge about the network. This is associated to decision theoretical problems thus NEXPTIME. This paper presents a novel data distribution approach based on Distributed Hash Table (DHT). The proposed mechanism is partially proactive, USV's relay data to its neighbors by selecting a neighbor with the closest hash to the data hash. The data distribution is decomposed into three stages: initial data distribution, data request, and data forwarding. The decomposition leads to a very simple but effective and efficient data distribution mechanism. Presentation of the details of the proposed data distribution algorithm is presented in respective sections of this paper with further discussions and simulated results ..................................
Published: 2020Read / DownloadLane Id based Selective Emergency Message Forwarding Scheme for VANET
Getamesay Haile, Dereje Yohannes, Kebebew Ababu
Abstract - In this paper we proposed a novel emergency message forwarding scheme for VANET (Vehicular Ad-hoc Network) which can capable of tackling broadcast storm problem by reducing unwanted network traffic. Safety application of VANET by its nature is time critical and it needs low delay and needs to be disseminated on time. So applying broadcasting technique is the best option in safety application for VANET. But applying simple broadcasting causes broadcast storm problem due to high number of unwanted network traffic. Unwanted network traffic happens when the number of nodes to rebroadcast the emergency message is increased. The numbers of forwarder node to re-transmit the emergency message have high effect on the network. So, one of the solution to reduce unwanted traffic is applying selective forwarding scheme to broadcast emergency message.................................
Published: 2019Read / Download
MNP: Malicious Node Prevention in Vehicular Ad hoc Networks
Syed Rameem Zahra
Abstract - Today, traffic security has become an obligation rather than a necessity. Hence to secure the traffic, provide comfort to the driver and the passengers, ensure safety of the pedestrians, infrastructure as well as the one's sitting inside the cars, Intelligent Transport System (ITS) was created. The base of ITS is formed by a class of networks called as VANET. The VANETs make communication between vehicles and vehicle to infrastructure possible. They vary from other Ad-hoc network because of their rare characteristics. VANETs are the networks which lack centralized control and infrastructure, in which the nodes are highly mobile, topology is extremely dynamic and the links are volatile. Consequently, VANET security is threatened- the network is vulnerable to number of mischief. The easiest of all the attacks on VANETs is that on the availability - the Black-hole attack. This attack is carried out by the malicious nodes which can even be the authentic ...........................
Published: 2018Read / DownloadMobility Management Scheme Based on Smart Buffering for Vehicular Networks
Nihal H. A. Mohammed, Heba N. El-Moafy, Salah M. Abdel-Mageid, Mahmoud I. Marie
Abstract - Mobility management in vehicular networks is our case study is to provide internet connectivity without any interruption and with no packet loss, even in V2I (Vehicular to Infrastructure) or V2V (Vehicular to Vehicular) communications. Handover delay is one of critical parameters in QoS measurements in addition to packet loss, throughput and data transmission delay. In this paper, the idea of Smart Buffering is proposed to enhance HI-NEMO protocol. In this extension of NEMO, the combining cross-layer mechanism and resource allocation have been performed. It is used to reduce latency and packet loss during handovers with high performance in its proactive mode. However, it is noticed that packets loss exists.....................
Published: 2017Read / Download
Connectivity Based Positioning System for Underground Vehicular Ad Hoc Networks
Salah Abdel Mageid
Abstract - Underground vehicular ad-hoc networks are indorsing wireless networks because they can realize many goals such as improving the driving safety and monitoring the emergency alerts in underground environments (i.e., road tunnels). It is necessary for vehicular nodes to recognize their positions to achieve these goals. However, Global Positioning System (GPS) devices cannot operate in underground environments; furthermore, the signal propagation faces many effects such as attenuation, multipath and shadow fading. Traditional distance measurement techniques are inadequate to estimate vehicular node locations in underground environments because the expected measurement errors lead to poor positioning. In this paper, the network connectivity is exploited .............................
Published: 2017Read / DownloadSelf-Correcting Localization Scheme for Vehicle to Vehicle Communication
Salah Abdel Mageid
Abstract - Vehicle to Vehicle communication (V2V) has taken place in research interest for many purposes such as road safety and traffic management. An accurate estimation for vehicular node position is important for such type of communication. A vehicular node can be equipped with Global Positioning Systems (GPS) to estimate its position. In practice, many vehicular nodes may lose GPS signals in rural regions due to dense foliage, or in urban regions due to compact high buildings. In this paper, the received signal strength indication (RSSI) is exploited to assist vehicular nodes to estimate their locations using inter-vehicle communication. High dynamic network topology in V2V is expected due to high node mobility. As a result, the localization error due to signal strength measurements clearly increases compared to low dynamic network topology. The proposed scheme is ...........................
Published: 2016Read / Download
Prioritized and Secured Data Dissemination Technique in VANET Based on Optimal Blowfish Algorithm and Signcryption Method
M. Selvi, B. Ramakrishnan
Abstract - All the way through cooperative behaviour of the vehicular nodes information dissemination in VANETs occurs. Vital information like traffic jam, emergency brake procedures, road conditions, accident warnings, bad weather conditions, etc are messages transmitted in vehicular network. Misbehaviours and false hindering is a serious issue in VANET if any vehicles maliciously send messages. Deviation from the average behaviour of other vehicular nodes in the Consecutively to make VANET a secure network, detection of misbehaviors and the malicious vehicular nodes concerned in such misconducts is tremendously imperative. In this paper we have proposed a message broadcasting and message priority assignment in vehicular networks to resolve this problem. Initially the messages are prioritized using SMTP ............................
Published: 2015Read / DownloadAdaptive Routing Protocol based on Cuckoo Search algorithm (ARP-CS) for secured Vehicular Ad hoc network (VANET)
B. Ramakrishnan, S. R. Sreedivya, M. Selvi
Abstract - A wide range of protocols are used to achieve secured message broadcasting in VANET. Most commonly used protocols are topology based routing and geography based routing protocols. In order to overcome the issues of these 2 protocols, we proposed a design of Adaptive routing protocol based on Cuckoo search algorithm (ARP-CS). The adaptive protocol combines the features of both topology routing and geographic routing protocols which ensures the secured transmission of data with less delay and high packet delivery ratio. ARP-CS provides reliable and secure routes between source and destination node with optimal distance and low routing overheads. ARP-CS uses a local stochastic broadcasting to find routes which reduces the network congestion thereby improving the packet delivery ratio.
Published: 2015Read / Download