scholarly journals An Emergency Alert Broadcast Based on the Convergence of 5G and ATSC 3.0

Electronics ◽  
2021 ◽  
Vol 10 (6) ◽  
pp. 758
Author(s):  
Yoon-Kwan Byun ◽  
Sekchin Chang ◽  
Seong Jong Choi

We propose a novel emergency alert broadcast mechanism for mobile phone users, which is based on the convergence of 5G and ATSC 3.0. Cellular networks including 5G adopt a broadcast technique for emergency alert. This technique just delivers a text-based message. Moreover, the message only includes a limited number of characters. Therefore, cellular networks cannot afford to provide abundant information in emergency cases. Broadcast networks such as ATSC 3.0 also offer an emergency alert broadcast service. This service can deliver a multimedia-based message in emergency cases. Therefore, the ATSC 3.0 supports more abundant information in the cases of emergency alert broadcasts. Especially, the ATSC 3.0 employs wake-up functionality and location information, which enables the delivery of emergency alerts to idle-state receivers in emergency areas. However, it is unlikely that the wake-up functionality and the location information are directly applicable to mobile phone users due to some practical issues. In order to improve the emergency alert broadcast service in mobile environments, we converge the 5G and the ATSC 3.0 networks, which effectively exploits the advantages of the networks. For the convergence network, we suggest a modified table, which associates the 5G message with the ATSC 3.0 message in the cases of emergency alerts. We also present a novel scenario for delivery of the emergency alert messages. Simulation results show that the convergence significantly enhances the receiver performance for emergency alert broadcast.

Author(s):  
Satyasrikanth Palle ◽  
Shivashankar

Objective: The demand for Cellular based multimedia services is growing day by day, in order to fulfill such demand the present day cellular networks needs to be upgraded to support excessive capacity calls along with high data accessibility. Analysis of traffic and huge network size could become very challenging issue for the network operators for scheduling the available bandwidth between different users. In the proposed work a novel QoS Aware Multi Path scheduling algorithm for smooth CAC in wireless mobile networks. The performance of the proposed algorithm is assessed and compared with existing scheduling algorithms. The simulation results show that the proposed algorithm outperforms existing CAC algorithms in terms of throughput and delay. The CAC algorithm with scheduling increases end-to-end throughput and decreases end-to-end delay. Methods: The key idea to implement the proposed research work is to adopt spatial reuse concept of wireless sensor networks to mobile cellular networks. Spatial reusability enhances channel reuse when the node pairs are far away and distant. When Src and node b are communicating with each other, the other nodes in the discovered path should be idle without utilizing the channel. Instead the other nodes are able to communicate parallelly the end-to-end throughput can be improved with acceptable delay. Incorporating link scheduling algorithms to this key concept further enhances the end-to-end throughput with in the turnaround time. So, in this research work we have applied spatial reuse concept along with link scheduling algorithm to enhance end-to-end throughput with in turnaround time. The proposed algorithm not only ensures that a connection gets the required bandwidth at each mobile node on its way by scheduling required slots to meet the QoS requirements. By considering the bandwidth requirement of the mobile connections, the CAC module at the BS not only considers the bandwidth requirement but also conforming the constrains of system dealy and jitter are met. Result: To verify the feasibility and effectiveness of our proposed work, with respect to scheduling the simulation results clearly shows the throughput improvement with Call Admission Control. The number of dropped calls is significantly less and successful calls are more with CAC. The percentage of dropped calls is reduced by 9 % and successful calls are improved by 91%. The simulation is also conducted on time constraint and ratio of dropped calls are shown. The total time taken to forward the packets and the ration of dropped calls is less when compared to non CAC. On a whole the CAC with scheduling algorithms out performs existing scheduling algorithms. Conclusion: In this research work we have proposed a novel QoS aware scheduling algorithm that provides QoS in Wireless Cellular Networks using Call Admission Control (CAC). The simulation results show that the end-to-end throughput has been increased by 91% when CAC is used. The proposed algorithm is also compared with existing link scheduling algorithms. The results reveal that CAC with scheduling algorithm can be used in Mobile Cellular Networks in order to reduce packet drop ratio. The algorithm is also used to send the packets within acceptable delay.


2012 ◽  
Vol 6-7 ◽  
pp. 783-789
Author(s):  
Jian Feng Dong ◽  
Tian Yang Dong ◽  
Jia Jie Yao ◽  
Ling Zhang

With the rapid development of smart-phone applications, how to make the ordering process via smart-phones more convenient and intelligent has become a hotspot. This paper puts forward a method of restaurant dish recommendation relying on position information and association rules. In addition, this paper has designed and developed a restaurant recommendation system based on mobile phone. The system would fetch the real-time location information via smart-phones, and provide customers personalized restaurant and dish recommendation service. According to the related applications, this system can successfully recommend the related restaurants and food information to customers.


2012 ◽  
Vol 2012 ◽  
pp. 1-13 ◽  
Author(s):  
Qiang Yan ◽  
Lianren Wu ◽  
Lanli Yi

Through analyzing the data about the releases, comment, and forwarding of 120,000 microblog messages in a year, this paper finds out that the intervals between information releases and comment follow a power law; besides, the analysis of data in each 24 hours reveals obvious differences between microblogging and website visit, email, instant communication, and the use of mobile phone, reflecting how people use fragments of time via mobile internet technology. The paper points out the significant influence of the user's activity on the intervals of information releases and thus demonstrates a positive correlation between the activity and the power exponent. The paper also points out that user's activity is influenced by social identity in a positive way. The simulation results based on the social identity mechanism fit well with the actual data, which indicates that this mechanism is a reasonable way to explain people's behavior in the mobile Internet.


2009 ◽  
Vol 5 (1) ◽  
pp. 33-52 ◽  
Author(s):  
Saoucene Mahfoudh ◽  
Pascale Minet

In wireless ad hoc and sensor networks, an analysis of the node energy consumption distribution shows that the largest part is due to the time spent in the idle state. This result is at the origin of SERENA, an algorithm to SchEdule RoutEr Nodes Activity. SERENA allows router nodes to sleep, while ensuring end-to-end communication in the wireless network. It is a localized and decentralized algorithm assigning time slots to nodes. Any node stays awake only during its slot and the slots assigned to its neighbors, it sleeps the remaining time. Simulation results show that SERENA enables us to maximize network lifetime while increasing the number of user messages delivered. SERENA is based on a two-hop coloring algorithm, whose complexity in terms of colors and rounds is evaluated. We then quantify the slot reuse. Finally, we show how SERENA improves the node energy consumption distribution and maximizes the energy efficiency of wireless ad hoc and sensor networks. We compare SERENA with classical TDMA and optimized variants such as USAP in wireless ad hoc and sensor networks.


Author(s):  
Yan Cai ◽  
Liang Ran ◽  
Jun Zhang ◽  
Hongbo Zhu

AbstractEdge offloading, including offloading to edge base stations (BS) via cellular links and to idle mobile users (MUs) via device-to-device (D2D) links, has played a vital role in achieving ultra-low latency characteristics in 5G wireless networks. This paper studies an offloading method of parallel communication and computation to minimize the delay in multi-user systems. Three different scenarios are explored, i.e., full offloading, partial offloading, and D2D-enabled partial offloading. In the full offloading scenario, we find a serving order for the MUs. Then, we jointly optimize the serving order and task segment in the partial offloading scenario. For the D2D-enabled partial offloading scenario, we decompose the problem into two subproblems and then find the sub-optimal solution based on the results of the two subproblems. Finally, the simulation results demonstrate that the offloading method of parallel communication and computing can significantly reduce the system delay, and the D2D-enabled partial offloading can further reduce the latency.


Author(s):  
Ling Pei ◽  
Robert Guinness ◽  
Jyrki Kaistinen

A boom of various sensor options gives a mobile phone the capability for sensing the social context and makes a mobile phone an attractive “cognitive” platform, which has great potential to model and cognize human behavior. A review of the history, current state, and future directions of the cognitive phone are outlined in this article. An implementation example of a cognitive phone is presented, and a Location-Motion-Context (LoMoCo) model is introduced, to combine personal location information and motion states to infer a corresponding context. Future possibilities of cognitive phones in behavior detection and change are outlined.


Author(s):  
K. N. Rama Mohan Babu ◽  
K.N. Balasubramanya Murthy ◽  
G.V. Pavithra ◽  
K.R Mamatha

Handling of emergency calls in wireless cellular networks is one of the major issues. The main objective here is to improve quality of service by efficient channel utilization. In this paper, a new scheme called probabilistic emergency prioritization scheme (PEPS) is proposed which provides highest priority for emergency calls. The proposed method minimizes the dropping or blocking of emergency calls even if the number of emergency calls are more than 25% of the calls. Monte Carlo simulation results show that the proposed scheme works better than the existing adaptive probabilistic scheduling scheme (APS).


Author(s):  
Xuefeng Zhao ◽  
Niannian Wang ◽  
Linan Wang ◽  
Yan Yu ◽  
Mingchu Li ◽  
...  

Some of The Great Wall relics are destroyed or even disappeared. The existing studies relied on field surveys are costly and time consuming. So a new cloud monitoring system based on smart phones is proposed. The system, which consists of three modules, image acquisition, questionnaire and real-time location, can realize rapid acquisition of information. Firstly, using smart phones, some photos of the Great Wall can be obtained. Then, the typical integrity damage information and location information can be obtained, including structure crack, human-caused destruction, the vegetation growth, etc. Secondly, analyzing the typical integrity damage information, the evaluation results are obtained. Then, the Great Wall information in the form of questionnaire is posted on the Great Wall integrity monitoring system. Mobile phone users who logged in the system can upload photos, and fill in the questionnaires. Through taking pictures and filling in the questionnaires, the required information can be obtained.


2013 ◽  
Vol 694-697 ◽  
pp. 1055-1059
Author(s):  
Guang Xiong Huang ◽  
Zhi Long Shan

Localization is an essential technology in the application of wireless sensor network. As a range-free localization algorithm, DV-Hop works well in dense and isotropic networks, but not much in irregular and sparse topologies, especially in the big curvature of shortest path case. In this paper, location information beyond the communication range was obtained by means of variable transmission power of enhanced nodes. Besides, three schemes was proposed to meet the need of different scenarios. Moreover, the simulation results validate that our method can improve position accuracy about 20% and ameliorate the performance of DV-Hop in irregular scenario.


Sign in / Sign up

Export Citation Format

Share Document