A Multi-Hop Grouping Scheme for Assisting Handoff Procedure in Vehicular Networks

2011 ◽  
Vol 121-126 ◽  
pp. 3719-3725
Author(s):  
Yan Jin ◽  
Kee Wook Rim ◽  
Kee Cheon Kim ◽  
Min Wei

The duplicate address detection (DAD) has been a time-costly and a bottleneck in IP address configuration. The dynamic host configuration protocol (DHCP) was proposed and adopted to effectively assign unique address to a host. However, DHCP is not suitable for networks with a large number of nodes, and address renumbering under DHCP would be much more complicated than that under stateless auto-configuration. In vehicular networks, moving vehicles get connected to the Internet through the access point set up by the road. The handoff operation is supposed to happen frequently due to the fast moving of vehicles. Therefore, the performance of handoff becomes one of the most important issues to maintain seamlessly connection to the Internet in vehicular environment. In this paper, we propose a multi-hop group assisted handoff algorithm to effectively reduce handoff latency for avoiding the impact of time-consuming from IP configuration operation.

2011 ◽  
Vol 90-93 ◽  
pp. 1106-1111
Author(s):  
Hong Xia Tan ◽  
Zheng Qing Chen

This paper studies the dynamic response and the impact factor of the concrete-filled steel tubular (CFST) arch bridge named Hejiang River Bridge under the moving vehicles. Research shows that the impact factor of CFST arch bridge at the vault and 1/4 arch rib is greatly influenced by the road surface roughness (RSR), and it is increased with the grade of RSR increases, meanwhile it is different at apiece section position of the arch bridge. The impact factor doesn't vary monotonically with the speed of vehicle, it appears the maximum when the speed of vehicle is between 20-25 km/h and 35-50 km/h, and the impact factors of different cross-sections are not just the same with the changing regularity of speed. Therefore, the dynamic characteristics of different structural components should be calculated in designing CFST arch bridge for discrepant dynamic characteristics of various constructional elements.


2016 ◽  
Vol 2016 ◽  
pp. 1-18 ◽  
Author(s):  
Wei Yan ◽  
Youwei Li ◽  
Ying Wu ◽  
Mark Palmer

Organizing and managing channels of distribution is an important marketing task. Due to the emergence of electronic commerce on the Internet, e-channel distribution systems have been adopted by many manufacturers. However, academic and anecdotal evidence both point to the pressures arising from this new e-channel manufacturing environment. Question marks therefore remain on how the addition of this e-channel affects the traditional marketing strategies of leasing and selling. We set up several two-period dual-channel models in which a manufacturer sells a durable product through both a manufacturer-owned e-channel and an independent reseller (leaser) who adopts selling (leasing) to consumers. Our main results indicate that, direct selling cost aside, product durability plays an important role in shaping the strategies of all members. With either marketing strategy, the additional expansion of an e-channel territory may secure Pareto gains, in which all members benefit.


Sensors ◽  
2018 ◽  
Vol 18 (9) ◽  
pp. 2744 ◽  
Author(s):  
Dmitry Bankov ◽  
Evgeny Khorov ◽  
Andrey Lyakhov ◽  
Ekaterina Stepanova ◽  
Le Tian ◽  
...  

Wi-Fi HaLow is an adaptation of the widespread Wi-Fi technology for the Internet of Things scenarios. Such scenarios often involve numerous wireless stations connected to a shared channel, and contention for the channel significantly affects the performance in such networks. Wi-Fi HaLow contains numerous solutions aimed at handling the contention between stations, two of which, namely, the Centralized Authentication Control (CAC) and the Distributed Authentication Control (DAC), address the contention reduction during the link set-up process. The link set-up process is special because the access point knows nothing of the connecting stations and its means of control of these stations are very limited. While DAC is self-adaptive, CAC does require an algorithm to dynamically control its parameters. Being just a framework, the Wi-Fi HaLow standard neither specifies such an algorithm nor recommends which protocol, CAC or DAC, is more suitable in a given situation. In this paper, we solve both issues by developing a novel robust close-to-optimal algorithm for CAC and compare CAC and DAC in a vast set of experiments.


Researchers found that Internet Protocol Version 6 (IPv6) can be considered since it is the important communication protocol for internet access during driving, location privacy in Vehicular Adhoc Networks (VANET). TCP/IP allows devices to interact online. A unique IP address allows each device to communicate with each other over the internet. From the desktop computers to tablets, to PS4s, to mobile phones, to cars, to airplanes, to IP enabled washers and dryers, lot of things will be connected online. It needs a lot more addresses than that are available today. IPv6 was created in the mid-’90s to make the internet grow. It is not backward compatible with IP version 4, but both IPv4 and IPv6 protocols can run simultaneously over the same wires. This requires a transition from IPv4 to IPv6 and vice-versa. The IPv6 layer is a vital issue in the field of Intelligent Transportation System (ITS). The vehicles possess heterogeneous devices like sensors, Global Positioning System (GPS), IPv4 addressing and IPv6 addressing. IPv4 addresses are depleting and IPv6 addressing came into existence. When the Road Side Unit (RSU) communicate with gateway and with vehicular cloud using IPv4 and IPv6 addressing, compatibility issues occur. This paper mainly focuses on the IPv4/IPv6 compatibility issues and the possible solutions to overcome the compatibility issues during the dissemination of data in VANET


2015 ◽  
Vol 764-765 ◽  
pp. 900-904
Author(s):  
Yu Hsiang Hsneh ◽  
Fu Hau Hsu ◽  
Shih Jen Chen ◽  
Yao Hsin Chen ◽  
Yan Ling Hwang ◽  
...  

An evil twin is a kind of rogue Wi-Fi access point (AP) which has the same SSID name to the legitimate one and is set up by an adversary. The user who associates to the evil twin, adversary may eaves-drops sensitive data on wireless communications to the Internet. Most of existing detection solutions are administrator-based, which is used by wireless network administrator to verify whether a given AP is in an authorized list or not. Such administrator-based solutions are limited, hardly maintained, and difficult to protect users timely when the attack is launched. Hence, we propose a client-based detection by operating the wireless network interface controller (WNIC) in monitor mode and capturing the Internet packets. Through analyzing the captured packets, client users can easily and precisely detect the evil twin attack even in a complicated AP scenario as well as avoid any threat arisen from connecting to an AP. Our method does not need to know any authorized AP list, and does not rely on data training or machine learning technique of target wireless network. Finally, we implemented a detecting system on Windows 7, which is widely used nowadays.


2014 ◽  
Vol 912-914 ◽  
pp. 1432-1435 ◽  
Author(s):  
Yin Yin Wang

With the rapid development of the Internet and handle devices rapidly growing popularity, especially 3G / 4G network continues to develop, making the mobile shopping. Mobile Internet and other services are no longer out of reach. Enterprises in order to provide consumers with a better service must proceed from the perspective of consumers. Their double clear consumer mobile shopping and influencing factors have factors on the impact of consumers. Using mobile shopping can develop effective marketing strategy, and actively seeking to develop the road, so as to continuously promote the development of mobile shopping. This paper analyzes the characteristics of mobile shopping behavior of consumers, identifies the factors affecting consumer mobile shopping, and concludes with recommendations for the development of mobile shopping.


Author(s):  
Mohammad Mubarak Al-hjouj

The study aimed to identify the effects faced by radio from new technologies and applications that have been able to attract a lot of audience traditional media, especially radio. To achieve this goal descriptive approach used methods, a tactic survey the public media, using the tool questionnaire, and then applied on a random sample of the Jordanian public in order to stand on their attitudes towards the Internet and its applications on the effects of listening to the radio. The study proved that the Internet and its applications impacted adversely on listening to the radio, where the ratio came from listening to the Jordanian public 39% versus 61% for to the radio. The study showed that the most important reasons for the Jordanian public to listen to radio stations is to satisfy recreational, cultural and scientific desires, and love of the Jordanian public to some of the broadcasters who provide programs and radio stations will help to know what is going on from the events. The study showed that there is dissatisfaction by the Jordanian public about the programs offered by the radio, where he said that 55% of the study sample who listen to the radio. From these results will be achieved hypotheses and the study of the theory relied on by the study and followed the approach uses the theory. The study recommends the importance of working to improve the quality of programs offered by the radio and to the satisfaction of listeners, and to increase the broadcast hours of programs that attract public radio institutions. Reconnaissance work ray studies to the public periodically to learn about their needs and desires. Supplying radio institutions modern techniques that would maintain the audience, and supplement her human cadres qualified and capable of using communication technology and increased awareness among workers about the concept of communication technology to the technique of active impact on the performance of radio stations, and set up special centers set the media production enterprise quality media. The study recommends researchers to conduct further research and studies for the radio service and support for its survival in the media arena.


2021 ◽  
pp. 1-23
Author(s):  
Fabio Aiolli ◽  
Mauro Conti ◽  
Stjepan Picek ◽  
Mirko Polato

Nowadays, online services, like e-commerce or streaming services, provide a personalized user experience through recommender systems. Recommender systems are built upon a vast amount of data about users/items acquired by the services. Such knowledge represents an invaluable resource. However, commonly, part of this knowledge is public and can be easily accessed via the Internet. Unfortunately, that same knowledge can be leveraged by competitors or malicious users. The literature offers a large number of works concerning attacks on recommender systems, but most of them assume that the attacker can easily access the full rating matrix. In practice, this is never the case. The only way to access the rating matrix is by gathering the ratings (e.g., reviews) by crawling the service’s website. Crawling a website has a cost in terms of time and resources. What is more, the targeted website can employ defensive measures to detect automatic scraping. In this paper, we assess the impact of a series of attacks on recommender systems. Our analysis aims to set up the most realistic scenarios considering both the possibilities and the potential attacker’s limitations. In particular, we assess the impact of different crawling approaches when attacking a recommendation service. From the collected information, we mount various profile injection attacks. We measure the value of the collected knowledge through the identification of the most similar user/item. Our empirical results show that while crawling can indeed bring knowledge to the attacker (up to 65% of neighborhood reconstruction on a mid-size dataset and up to 90% on a small-size dataset), this will not be enough to mount a successful shilling attack in practice.


2021 ◽  
Vol 235 ◽  
pp. 03030
Author(s):  
Tian Jing

In 2020, Huize insurance came to the market in the United States, which will again push the Inter net insurance industry to the peak of social concern. As the one of three pillars of the financial industry, the Internet insurance industry is generated with the promotion of Internet finance. After experiencing a blowou t growth around 2015, the Internet insurance industry bypassed the monopoly of traditional insurance indust ry, At that time, big and small companies had their own characteristics. But as the policy tightens, Internet i nsurance suffers. With the impact of the epidemic in 2020, people’s insurance awareness is constantly streng thened, and the Internet insurance industry will usher in a spring with its unique advantages. This paper com prehensively reviews the development of Internet insurance, analyzes the main problems of the Internet ind ustry, and put forward development recommendations based on Huize’s business model, explore methods th e Internet industry in the social sense of responsibility, product design, and connect with the epidemic, comb ine with the government, to strengthen the construction of preferential and universal insurance, innovate the PPP mode, combine insurance technology to carry on the prospect.


Crisis ◽  
2017 ◽  
Vol 38 (3) ◽  
pp. 207-209 ◽  
Author(s):  
Florian Arendt ◽  
Sebastian Scherr

Abstract. Background: Research has already acknowledged the importance of the Internet in suicide prevention as search engines such as Google are increasingly used in seeking both helpful and harmful suicide-related information. Aims: We aimed to assess the impact of a highly publicized suicide by a Hollywood actor on suicide-related online information seeking. Method: We tested the impact of the highly publicized suicide of Robin Williams on volumes of suicide-related search queries. Results: Both harmful and helpful search terms increased immediately after the actor's suicide, with a substantial jump of harmful queries. Limitations: The study has limitations (e.g., possible validity threats of the query share measure, use of ambiguous search terms). Conclusion: Online suicide prevention efforts should try to increase online users' awareness of and motivation to seek help, for which Google's own helpline box could play an even more crucial role in the future.


Sign in / Sign up

Export Citation Format

Share Document