Traffic Congestion Reduction and Accident Circumvention System via Incorporation of CAV and VANET

2021 ◽  
Vol 12 (1) ◽  
pp. 53-72
Author(s):  
Mohsin Khan ◽  
Bhavna Arora

Connected automated vehicle (CAV) technology is the core for the new age vehicles in research phase to communicate with one another and assimilation of vehicular ad-hoc network (VANET) for the transference of data between vehicles at a quantified place and time. This manuscript is an enactment of the algorithms associated to the maintenance of secure distance amongst vehicles, lane shifting, and overtaking, which will diminish the occurrence of collisions and congestions especially phantom jams. Those implementations are centered over CAV and VANET technology for the interconnection of the vehicles and the data transmission. The data is associated to the aspects of a vehicle such as speed, position, acceleration, and acknowledgements, which acts as the fundamentals for the computation of variables. In accordance with the environment of a particular vehicle (i.e., its surrounding vehicles), real-time decisions are taken based on the real-time computation of the variables in a discrete system.

2021 ◽  
Vol 2021 ◽  
pp. 1-9
Author(s):  
Mohammad Sirajuddin ◽  
Ch. Rupa ◽  
Celestine Iwendi ◽  
Cresantus Biamba

Mobile ad hoc network (MANET) is a miscellany of versatile nodes that communicate without any fixed physical framework. MANETs gained popularity due to various notable features like dynamic topology, rapid setup, multihop data transmission, and so on. These prominent features make MANETs suitable for many real-time applications like environmental monitoring, disaster management, and covert and combat operations. Moreover, MANETs can also be integrated with emerging technologies like cloud computing, IoT, and machine learning algorithms to achieve the vision of Industry 4.0. All MANET-based sensitive real-time applications require secure and reliable data transmission that must meet the required QoS. In MANET, achieving secure and energy-efficient data transmission is a challenging task. To accomplish such challenging objectives, it is necessary to design a secure routing protocol that enhances the MANET’s QoS. In this paper, we proposed a trust-based multipath routing protocol called TBSMR to enhance the MANET’s overall performance. The main strength of the proposed protocol is that it considers multiple factors like congestion control, packet loss reduction, malicious node detection, and secure data transmission to intensify the MANET’s QoS. The performance of the proposed protocol is analyzed through the simulation in NS2. Our simulation results justify that the proposed routing protocol exhibits superior performance than the existing approaches.


2021 ◽  
Author(s):  
Samson Chung Fai Chan

This thesis presents several simple and effective QoS schemes aimed to support VoIP in the IEEE 802.11 network. The proposed schemes are called dynamic backoff adjustment (DBA), high priority DCF (HP-DCF), adaptive DCF (ADCF) and direct priority DCF (DP-DCF). All four schemes utilize the contention mechanism and are compatible with the IEEE 802.11 standard. The first three schemes use dynamic adjustment approach to improve the delay of high-priority traffic in infrastructure network and the last schemes is designed for use in ad-hoc network. From the simulation results, the DBA scheme shows better bandwidth utilization over DCF and provides better differentiated service performance than EDCF. Whereas, the HP-DCF and AP schemes give better protection of the real-time traffic classes from the excessive best-effort traffic load in the infrastructure mode. Moreover, the DP-DCF also shows its ability in protecting the real-time traffic class in the ad-hoc environment.


2021 ◽  
Author(s):  
Samson Chung Fai Chan

This thesis presents several simple and effective QoS schemes aimed to support VoIP in the IEEE 802.11 network. The proposed schemes are called dynamic backoff adjustment (DBA), high priority DCF (HP-DCF), adaptive DCF (ADCF) and direct priority DCF (DP-DCF). All four schemes utilize the contention mechanism and are compatible with the IEEE 802.11 standard. The first three schemes use dynamic adjustment approach to improve the delay of high-priority traffic in infrastructure network and the last schemes is designed for use in ad-hoc network. From the simulation results, the DBA scheme shows better bandwidth utilization over DCF and provides better differentiated service performance than EDCF. Whereas, the HP-DCF and AP schemes give better protection of the real-time traffic classes from the excessive best-effort traffic load in the infrastructure mode. Moreover, the DP-DCF also shows its ability in protecting the real-time traffic class in the ad-hoc environment.


2012 ◽  
Vol 241-244 ◽  
pp. 2504-2509
Author(s):  
Yan Li ◽  
Qiao Xiang Gu

The equipment, called detection platform of the cylinders, is used for detecting cylinders so that cylinders can be at ease use. In order to transmit the real-time detection data to PC for further processing, the platform should be connected with PC. Cable connection, in some production and environmental conditions, is limited. Under the circumstance, building wireless network is the better choice. Through comparative studying, ZigBee is chosen to be the technology for building wireless network. ZigBee chip and ZigBee2006 protocol stack are the core components in the ZigBee nodes.


2016 ◽  
Vol 8 (2) ◽  
pp. 1 ◽  
Author(s):  
Samira Harrabi ◽  
Ines Ben Jaafar ◽  
Khaled Ghedira

Vehicular Ad-hoc Network (VANET) is a sub-family of Mobile Ad-hoc Network (MANET).The means goal of VANET is to provide communications between nearby nodes or between nodes and fixed infrastructure. Despite that VANET is considered as a subclass of MANET, it has for particularity the high mobility of vehicles producing the frequent changes of network topology that involve changing of road, varying node density and locations of vehicles existing in this road. That‘s why, the most proposed clustering algorithms for MANET are unsuitable for VANET. Various searches have been recently published deal with clustering for VANETs. But most of them are focused on minimizing network overhead value, number of created clusters and had not considered the vehicles interests which defined as any related data used to differentiate vehicle from another (such as traffic congestion, looking for free parking space etc). In this paper, we propose a novel clustering algorithm based on agent technology to solve the problems mentioned above and improve routing in VANET. Experimental part show promising results regarding the adoption of the proposed approach.


2019 ◽  
Vol 12 (2) ◽  
pp. 145-150
Author(s):  
Vasudevan Alasingachar

This article addresses two vectors of VUCA interwoven in the narratives, a summary of personal theories about VUCA. Such theories are anchored and arise from experiential learning in my practice as HR/L&D and OD consultants over the past four decades. The implication for HR and OD profession is to consider their relevance when organisations navigate VUCA. Next is the culling out of the specific learning about HR and OD interphases that has worked in my experience, supported by examples and metaphors. The premise I put forward as conclusion are: In order to be at the centre stage of partnering with business, HR and OD have to complement and innovate new-age VUCA strategies. VUCA competencies with appropriate metrics are in the formative stage. The competencies are emerging from the real-time stories of consultants, companies and academia (TATA 26/11 and DuPont safety mandate). Only when HR and OD integrate and work together can the future of leadership or start-up entrepreneurs learn from their insights to ‘thrive in VUCA’.


2015 ◽  
Vol 2015 ◽  
pp. 1-7
Author(s):  
Xue Liu ◽  
Xiaoping Zeng ◽  
Zhiming Wang ◽  
Li Chen ◽  
Yuemei Jin

Taking the safe distance between two adjacent planes in the same airline into account, we give a model for the multiairline aeronautical ad hoc network (AANET). Based on our model, we analyze the plane’s degree distribution of any arbitrary AANET. Then, the expressions of the degree distributions of one single plane and the whole networks are both worked out and verified by the simulations, in which we generate several random AANETs. Since our model is a reasonable abstraction of the real situation, the theoretical result we get is very close to the result of the real networks, which is also shown in the simulations.


Sign in / Sign up

Export Citation Format

Share Document