scholarly journals Smart Handoff Technique for Internet of Vehicles Communication using Dynamic Edge-Backup Node

Electronics ◽  
2020 ◽  
Vol 9 (3) ◽  
pp. 524 ◽  
Author(s):  
Khalid Mahmood Awan ◽  
Malik Nadeem ◽  
Ali Safaa Sadiq ◽  
Abdullah Alghushami ◽  
Imran Khan ◽  
...  

A vehicular adhoc network (VANET) recently emerged in the the Internet of Vehicles (IoV); it involves the computational processing of moving vehicles. Nowadays, IoV has turned into an interesting field of research as vehicles can be equipped with processors, sensors, and communication devices. IoV gives rise to handoff, which involves changing the connection points during the online communication session. This presents a major challenge for which many standardized solutions are recommended. Although there are various proposed techniques and methods to support seamless handover procedure in IoV, there are still some open research issues, such as unavoidable packet loss rate and latency. On the other hand, the emerged concept of edge mobile computing has gained crucial attention by researchers that could help in reducing computational complexities and decreasing communication delay. Hence, this paper specifically studies the handoff challenges in cluster based handoff using new concept of dynamic edge-backup node. The outcomes are evaluated and contrasted with the network mobility method, our proposed technique, and other cluster-based technologies. The results show that coherence in communication during the handoff method can be upgraded, enhanced, and improved utilizing the proposed technique.

2016 ◽  
Vol 2016 ◽  
pp. 1-13 ◽  
Author(s):  
Chi Guo ◽  
Guangyi Cao ◽  
Jieru Zeng ◽  
Jinsong Cui ◽  
Rong Peng

Perceiving the location of dangerous moving vehicles and broadcasting this information to vehicles nearby are essential to achieve active safety in the Internet of Vehicles (IOV). To address this issue, we implement a real-time high-precision lane-level danger region service for moving vehicles. A traditional service depends on static geofencing and fails to deal with dynamic vehicles. To overcome this defect, we devised a new type of IOV service that manages to track dangerous moving vehicles in real time and recognize their danger regions quickly and accurately. Next, we designed algorithms to distinguish the vehicles in danger regions and broadcast the information to these vehicles. Our system can simultaneously manipulate a mass of danger regions for various dangerous vehicles and broadcast this information to surrounding vehicles at a large scale. This new system was tested in Shanghai, Guangzhou, Wuhan, and other cities; the data analysis is presented in this paper as well.


Author(s):  
Dao Van Thanh ◽  
Nguyen Van Tam ◽  
Vu Duy Loi

Mobile Ipv6 (MIPv6) is designed to support IP mobility management in the Internet. The fast handovef fof Mobile Ipv6 (FMIPv6) is an extension of Mobile Ipv6. Because FMIPv6 provides the information for layer 2 (L2) handover in advance, the layer 3 handover procedure could start early in order to reduce the handover latency. However, the handover latency of FMIPv6 is still remaining large which is hardly to meet the requirements of real-time applications. To deal with this, we propose a modified fast handover scheme named as Improvement FMIPv6 (called I-FMIPv6) to reduce the overall latency on handover. In I-FMIPv6, when the Mobile Node (MN) receives a Fast Binding Acknowledgment (FBAck) message with the New Care- of Address (NcoA) acceptance, it will send an Binding Update (BU) message to the Correspondent Nodes (CNs) to update the MN’s new CoA before the 1.2 handover occurs. Thus, -FMIPv6 con void circle routing, wrong order and handover latency can be reduces up to 16.79%, the average throughput measured since MN lost connection to Previous Acces Router (PAR) till getting stable connection to New Access Router (NAR) can be increases up to 2.57% compared with FMIPv6 at the speed of the moving vehicles in the inner city.


2019 ◽  
Vol 6 (1) ◽  
pp. 42
Author(s):  
Benson Nwaorgu

In this research paper, the researcher focused on the opining mining of expatriate adjustment and the significant roleof social media in real life. It is also one of the significant research issues for the person who are having citizenshipof one country and living in another country with a cross-cultural environment. The researcher would identify thefactors of a cross-cultural environment which are suitable and significant for the expatriate adjustment with the helpof social media. The social media is having of its own significant role in adjusting expatriate with respect to opinionmining. The opinion mining is one of the processes of seeking innovation of ideas and thought on the basis ofexisting or currently available in the real world. The social media is playing one of the biggest enablers for expatriatein a cross-cultural environment. The objective of this research paper is to identify the factors which are significantwith respect to opinion mining and social media in a cross-cultural environment. The researcher emphasized that thereason for online communication with respect to social media that flows are concept and opinion which thus play asignificant role in the cohesion and transformation of society. Its minimal concern on the emergence of opinions,widespread, and get benefits. The researcher used the social media for the adjustment with respect to expatriate’sadjustment.


Electronics ◽  
2020 ◽  
Vol 9 (3) ◽  
pp. 520
Author(s):  
Bander A. Alzahrani ◽  
Shehzad Ashraf Chaudhry ◽  
Ahmed Barnawi ◽  
Abdullah Al-Barakati ◽  
Taeshik Shon

Two party authentication schemes can be good candidates for deployment in Internet of Things (IoT)-based systems, especially in systems involving fast moving vehicles. Internet of Vehicles (IoV) requires fast and secure device-to-device communication without interference of any third party during communication, and this task can be carried out after registration of vehicles with a trusted certificate issuing party. Recently, several authentication protocols were proposed to enable key agreement in two party settings. In this study, we analyze two recent protocols and show that both protocols are insecure against key compromise impersonation attack (KCIA) as well as both lack of user anonymity. Therefore, this paper proposes an improved protocol that does not only resist KCIA and related attacks, but also offers comparable computation and communication. The security of proposed protocol is tested under formal model as well as using well known Burrows–Abadi–Needham (BAN) logic along with a discussion on security features. While resisting the KCIA and related attacks, proposed protocol also provides comparable trade-of between security features and efficiency and completes a round of key agreement in just 13.42 ms, which makes it a promising candidate to be deployed in IoT environments.


Author(s):  
Amber Yayin Wang ◽  
Wan-Jeng Chang

To expand global and intercultural communication, the effectiveness of asynchronous online communication devices, especially email, have been discussed in the area of foreign language teaching. A lack of specific research exists that addresses the application of online voicemail. This paper reports on a five month period of voicemail exchanges between 53 EFL learners in Taiwan and 56 CFL learners in the United States. The authors examine the responses of EFL students to this cross–cultural voicemail project and assess their progress in intercultural awareness and English speaking proficiency before and after the project. This study concludes that the use of voicemail creates an impact on the English speaking performance and intercultural awareness of EFL students and increases the motivation of EFL students in using English to express ideas. Further implications for teaching are discussed.


2014 ◽  
Vol 2014 ◽  
pp. 1-14 ◽  
Author(s):  
Omar Tayan ◽  
Muhammad N. Kabir ◽  
Yasser M. Alginahi

This paper addresses the problems and threats associated with verification of integrity, proof of authenticity, tamper detection, and copyright protection for digital-text content. Such issues were largely addressed in the literature for images, audio, and video, with only a few papers addressing the challenge of sensitive plain-text media under known constraints. Specifically, with text as the predominant online communication medium, it becomes crucial that techniques are deployed to protect such information. A number of digital-signature, hashing, and watermarking schemes have been proposed that essentially bind source data or embed invisible data in a cover media to achieve its goal. While many such complex schemes with resource redundancies are sufficient in offline and less-sensitive texts, this paper proposes a hybrid approach based on zero-watermarking and digital-signature-like manipulations for sensitive text documents in order to achieve content originality and integrity verification without physically modifying the cover text in anyway. The proposed algorithm was implemented and shown to be robust against undetected content modifications and is capable of confirming proof of originality whilst detecting and locating deliberate/nondeliberate tampering. Additionally, enhancements in resource utilisation and reduced redundancies were achieved in comparison to traditional encryption-based approaches. Finally, analysis and remarks are made about the current state of the art, and future research issues are discussed under the given constraints.


2018 ◽  
Vol 7 (2.31) ◽  
pp. 117
Author(s):  
Mohammed Abdulraheem Fadhel ◽  
Omran Al-Shamaa ◽  
Bahaa Husain Taher

With the growth of the electronic and communication devices, computer vision has become an significant application of smart cities. A smart city is controlled by smart autonomous systems. Many algorithms have been developed to satisfy these smart cities. This paper concerned with addressing the moving objects (vehicles) by using morphological techniques. For computational cheapness. The simulation has been built by a MATLAB 2012a and its implementation was done using Xilinx-ISE 14.6 (2013) XC3S700A-FPGA board that provides an exceptional tool for mixing between two platforms, the ISE 14.6(2013) and the MATLAB (2012a) platforms. MATLAB provides components for FPGA that invoke Verilog code of Xilinx platform, to avoid the size weakness of XC3S700A-FPGA board. 


Author(s):  
P.E. Russell ◽  
I.H. Musselman

Scanning tunneling microscopy (STM) has evolved rapidly in the past few years. Major developments have occurred in instrumentation, theory, and in a wide range of applications. In this paper, an overview of the application of STM and related techniques to polymers will be given, followed by a discussion of current research issues and prospects for future developments. The application of STM to polymers can be conveniently divided into the following subject areas: atomic scale imaging of uncoated polymer structures; topographic imaging and metrology of man-made polymer structures; and modification of polymer structures. Since many polymers are poor electrical conductors and hence unsuitable for use as a tunneling electrode, the related atomic force microscopy (AFM) technique which is capable of imaging both conductors and insulators has also been applied to polymers.The STM is well known for its high resolution capabilities in the x, y and z axes (Å in x andy and sub-Å in z). In addition to high resolution capabilities, the STM technique provides true three dimensional information in the constant current mode. In this mode, the STM tip is held at a fixed tunneling current (and a fixed bias voltage) and hence a fixed height above the sample surface while scanning across the sample surface.


Sign in / Sign up

Export Citation Format

Share Document