Pub Date : 2012-11-01DOI: 10.1109/ITST.2012.6425195
Chih-Ta Yen, Wen-Bin Chen
This study proposes a new inter-vehicle communication (IVC) system based on optical spectral-amplitude-coding optical code division multiple access (SACOCDMA) systems architecture, then, analysis and calculate the system's performance by using analytic and simulation methods. The important feature of the SAC-OCDMA systems is that multiple access interference (MAI) can be eliminated by code sequences of a fixed in-phase cross-correlation value with balance detection schemes. The advantage of optical CDMA multiplexed method compared with electrical multiplexed method is no electromagnetic interference and security enhanced. The performance of modify prime codes (MPCs) and Walsh-Hadamard codes as signature codes for the SAC-OCDMA systems is analyzed. The simulation results of MPCs in SAC-OCDMA system structures are first presented by commercial simulation obtained using OptiSystem software. The simulation results show that the bit error rate (BER) through use of the MPCs is superior to the conventional Walsh-Hadamard codes, especially when the received effect power is large. The eye diagram also shows that the SAC-OCDMA system with MPCs exhibits a wider opening than the Walsh-Hadamard codes.
{"title":"An optical CDMA method for in-vehicle information service","authors":"Chih-Ta Yen, Wen-Bin Chen","doi":"10.1109/ITST.2012.6425195","DOIUrl":"https://doi.org/10.1109/ITST.2012.6425195","url":null,"abstract":"This study proposes a new inter-vehicle communication (IVC) system based on optical spectral-amplitude-coding optical code division multiple access (SACOCDMA) systems architecture, then, analysis and calculate the system's performance by using analytic and simulation methods. The important feature of the SAC-OCDMA systems is that multiple access interference (MAI) can be eliminated by code sequences of a fixed in-phase cross-correlation value with balance detection schemes. The advantage of optical CDMA multiplexed method compared with electrical multiplexed method is no electromagnetic interference and security enhanced. The performance of modify prime codes (MPCs) and Walsh-Hadamard codes as signature codes for the SAC-OCDMA systems is analyzed. The simulation results of MPCs in SAC-OCDMA system structures are first presented by commercial simulation obtained using OptiSystem software. The simulation results show that the bit error rate (BER) through use of the MPCs is superior to the conventional Walsh-Hadamard codes, especially when the received effect power is large. The eye diagram also shows that the SAC-OCDMA system with MPCs exhibits a wider opening than the Walsh-Hadamard codes.","PeriodicalId":143706,"journal":{"name":"2012 12th International Conference on ITS Telecommunications","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126921016","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2012-11-01DOI: 10.1109/ITST.2012.6425299
M. Miyaji
Driver's hasty state is one of psychosomatic states which may result in traffic accidents. This paper describes analytical effects on hasty state for driver's perception by means of detecting the change of driver's useful view of field and time to perception of moving objects. Then we proposed a concept of a function for detecting driver's hasty states for an intelligent driving support system. The function may become one of the content of the next generation Vehicle - Infrastructure cooperative safety system by means of using ultra high speed communication technology in the next stage.
{"title":"Study for the effect of hasty state while driving on potential risks","authors":"M. Miyaji","doi":"10.1109/ITST.2012.6425299","DOIUrl":"https://doi.org/10.1109/ITST.2012.6425299","url":null,"abstract":"Driver's hasty state is one of psychosomatic states which may result in traffic accidents. This paper describes analytical effects on hasty state for driver's perception by means of detecting the change of driver's useful view of field and time to perception of moving objects. Then we proposed a concept of a function for detecting driver's hasty states for an intelligent driving support system. The function may become one of the content of the next generation Vehicle - Infrastructure cooperative safety system by means of using ultra high speed communication technology in the next stage.","PeriodicalId":143706,"journal":{"name":"2012 12th International Conference on ITS Telecommunications","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126592883","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2012-11-01DOI: 10.1109/ITST.2012.6425282
K. Hashiura, H. Habuchi
A new selection method for the modified binary countdown scheme is proposed in this paper to make more effective use of VANET. The modified binary countdown scheme is fused with the binary countdown and slot distributed schemes. In the selection method, the transmission right of each node is kept equal because the node which transmitted a packet correctly chooses the low priority code. As the results of evaluating the average packet acquisition time and efficiency, we found that this scheme has immediacy and can tolerate changes in the number of nodes.
{"title":"Priority code selection method of the modified binary countdown scheme for VANET","authors":"K. Hashiura, H. Habuchi","doi":"10.1109/ITST.2012.6425282","DOIUrl":"https://doi.org/10.1109/ITST.2012.6425282","url":null,"abstract":"A new selection method for the modified binary countdown scheme is proposed in this paper to make more effective use of VANET. The modified binary countdown scheme is fused with the binary countdown and slot distributed schemes. In the selection method, the transmission right of each node is kept equal because the node which transmitted a packet correctly chooses the low priority code. As the results of evaluating the average packet acquisition time and efficiency, we found that this scheme has immediacy and can tolerate changes in the number of nodes.","PeriodicalId":143706,"journal":{"name":"2012 12th International Conference on ITS Telecommunications","volume":"269 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124272727","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2012-11-01DOI: 10.1109/ITST.2012.6425171
P. Tsao, P. Tsai
This paper presents a new cooperation scheme, i.e. partial cooperation, in MB-OFDM UWB systems for performance enhancement with high throughput and power efficiency. We first take advantage of the available subbands and design an efficient scheme in the time-frequency plane to deliver information bits to the relay node. Then, based on Game Theory, we propose to use hierarchical modulation, which is capable to offer adaptability and flexibilities to attract even a busy relay node that keeps its own communication link participating in cooperation. We also obtain the optimal power allocation coefficients for the proposed partial cooperation scheme. In addition, the optimal constellation priority parameter of hierarchical modulation is also evaluated. Both analytic and simulation results show that the proposed partial cooperation scheme not only achieves performance enhancement but also can upgrade system utilities of both links to get a win-win solution.
{"title":"Partial cooperation in MB-OFDM UWB systems with hierarchical modulation and power allocation","authors":"P. Tsao, P. Tsai","doi":"10.1109/ITST.2012.6425171","DOIUrl":"https://doi.org/10.1109/ITST.2012.6425171","url":null,"abstract":"This paper presents a new cooperation scheme, i.e. partial cooperation, in MB-OFDM UWB systems for performance enhancement with high throughput and power efficiency. We first take advantage of the available subbands and design an efficient scheme in the time-frequency plane to deliver information bits to the relay node. Then, based on Game Theory, we propose to use hierarchical modulation, which is capable to offer adaptability and flexibilities to attract even a busy relay node that keeps its own communication link participating in cooperation. We also obtain the optimal power allocation coefficients for the proposed partial cooperation scheme. In addition, the optimal constellation priority parameter of hierarchical modulation is also evaluated. Both analytic and simulation results show that the proposed partial cooperation scheme not only achieves performance enhancement but also can upgrade system utilities of both links to get a win-win solution.","PeriodicalId":143706,"journal":{"name":"2012 12th International Conference on ITS Telecommunications","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131405293","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2012-11-01DOI: 10.1109/ITST.2012.6425180
Yusuke Yoshida, Hiroyuki Hatano, K. Sugiyama
We focus on the reduction of the positioning errors on radar network systems. The radar network systems can achieve reliable detection and wide observation area by using multiple sensors. However, the accuracy of the positioning depends a great deal on the arrangement of the sensors. For example, if receivers were arranged on a straight line, the large error in the same direction of the line is generated. This is because the target is observed from only one direction, which is called as one side observation. In order to reduce the error, we proposed novel algorithm which uses not only a direct path but also reflected multipath. In this paper, we will introduce our method and present estimation performance by computer simulations.
{"title":"An evaluation of error reduction by indirect path in forward-looking radar network systems","authors":"Yusuke Yoshida, Hiroyuki Hatano, K. Sugiyama","doi":"10.1109/ITST.2012.6425180","DOIUrl":"https://doi.org/10.1109/ITST.2012.6425180","url":null,"abstract":"We focus on the reduction of the positioning errors on radar network systems. The radar network systems can achieve reliable detection and wide observation area by using multiple sensors. However, the accuracy of the positioning depends a great deal on the arrangement of the sensors. For example, if receivers were arranged on a straight line, the large error in the same direction of the line is generated. This is because the target is observed from only one direction, which is called as one side observation. In order to reduce the error, we proposed novel algorithm which uses not only a direct path but also reflected multipath. In this paper, we will introduce our method and present estimation performance by computer simulations.","PeriodicalId":143706,"journal":{"name":"2012 12th International Conference on ITS Telecommunications","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134498185","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2012-11-01DOI: 10.1109/ITST.2012.6425293
Jens Mittag, H. Hartenstein
The first generation of inter-vehicle communication networks will most likely be based on the IEEE 802.11p standard. That is, they are going to deploy Carrier Sense Multiple Access (CSMA) to coordinate channel access among neighboring vehicles. Recently, concerns have been raised that fast-fading propagation conditions, i.e. a time- and frequency-selective fading as reported by several measurement campaigns in highway environments, might challenge the effectiveness of CSMA. These concerns also lead to the situation that alternative medium access control solutions are being discussed in standardization bodies. In this paper, we evaluate whether these concerns are justified or not. In comparison to previous studies, we use a high fidelity network simulator to study the extent by which the effectiveness of CSMA is reduced if such fading propagation conditions are considered. We also resolve the two reasons that may cause incoordination - either simultaneous transmission times or hidden terminal situations - and conclude that CSMA is able to effectively coordinate multiple access in vehicular radio channels as long as the load offered to the channel does not approach the maximum capacity.
{"title":"Is CSMA able to coordinate multiple access in vehicular radio channels effectively?","authors":"Jens Mittag, H. Hartenstein","doi":"10.1109/ITST.2012.6425293","DOIUrl":"https://doi.org/10.1109/ITST.2012.6425293","url":null,"abstract":"The first generation of inter-vehicle communication networks will most likely be based on the IEEE 802.11p standard. That is, they are going to deploy Carrier Sense Multiple Access (CSMA) to coordinate channel access among neighboring vehicles. Recently, concerns have been raised that fast-fading propagation conditions, i.e. a time- and frequency-selective fading as reported by several measurement campaigns in highway environments, might challenge the effectiveness of CSMA. These concerns also lead to the situation that alternative medium access control solutions are being discussed in standardization bodies. In this paper, we evaluate whether these concerns are justified or not. In comparison to previous studies, we use a high fidelity network simulator to study the extent by which the effectiveness of CSMA is reduced if such fading propagation conditions are considered. We also resolve the two reasons that may cause incoordination - either simultaneous transmission times or hidden terminal situations - and conclude that CSMA is able to effectively coordinate multiple access in vehicular radio channels as long as the load offered to the channel does not approach the maximum capacity.","PeriodicalId":143706,"journal":{"name":"2012 12th International Conference on ITS Telecommunications","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129696989","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2012-11-01DOI: 10.1109/ITST.2012.6425201
Weihsin Lin, Yi-ru Su, Francis Chang, Kluo-Yueh Chen, Shin-Hshien Huang
This paper compares three evaluation approaches of energy saving and carbon reduction benefits for arterial signal retiming, including simulation of VISSIM and IDAS software and traffic survey of intersection stop delay. A signal retiming project of 18 intersections is evaluated by these approaches. Since the simulation of VISSIM is performed by each vehicle and second, its evaluation benefits are the highest among these approaches. IDAS is a macro-scope simulation software and utilizes link average speed increase to estimate benefits with no considering of the reduction of intersection delay. Thus its benefits are the lowest. Evaluation benefits of the intersection stop delay survey are between VISSIM and IDAS results. From analysis of these results, the future application of these evaluation approaches is proposed.
{"title":"Evaluation approaches of fuel saving and carbon reduction benefits for arterial signal retiming","authors":"Weihsin Lin, Yi-ru Su, Francis Chang, Kluo-Yueh Chen, Shin-Hshien Huang","doi":"10.1109/ITST.2012.6425201","DOIUrl":"https://doi.org/10.1109/ITST.2012.6425201","url":null,"abstract":"This paper compares three evaluation approaches of energy saving and carbon reduction benefits for arterial signal retiming, including simulation of VISSIM and IDAS software and traffic survey of intersection stop delay. A signal retiming project of 18 intersections is evaluated by these approaches. Since the simulation of VISSIM is performed by each vehicle and second, its evaluation benefits are the highest among these approaches. IDAS is a macro-scope simulation software and utilizes link average speed increase to estimate benefits with no considering of the reduction of intersection delay. Thus its benefits are the lowest. Evaluation benefits of the intersection stop delay survey are between VISSIM and IDAS results. From analysis of these results, the future application of these evaluation approaches is proposed.","PeriodicalId":143706,"journal":{"name":"2012 12th International Conference on ITS Telecommunications","volume":"206 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132222451","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2012-11-01DOI: 10.1109/ITST.2012.6425159
C. Chen, C. Hsu, Chi-Chun Yao
This paper proposed an obstacle orientation algorithm and a path planning of multi-turn mode to apply in automatic parking systems. The vehicle parks at a low velocity by developing a braking strategy. In addition to the design of controllers, a speed trajectory consisting of acceleration, constant speed, and deceleration is planned in order to provide the driver more comfortable feeling. According to the result of the verification tests, the obstacle orientation algorithm could accurately identify the 2D coordinate. And the proposed path planning of multi-turn mode saves one meter than the traditional two-turn mode. It makes the parking space only need 1.28 times the vehicle length. The vehicle control is implemented using Fuzzy-PID tracking control. System performance and tracking ability are verified in hardware and software implementations with very low cost.
{"title":"A novel design for full automatic parking system","authors":"C. Chen, C. Hsu, Chi-Chun Yao","doi":"10.1109/ITST.2012.6425159","DOIUrl":"https://doi.org/10.1109/ITST.2012.6425159","url":null,"abstract":"This paper proposed an obstacle orientation algorithm and a path planning of multi-turn mode to apply in automatic parking systems. The vehicle parks at a low velocity by developing a braking strategy. In addition to the design of controllers, a speed trajectory consisting of acceleration, constant speed, and deceleration is planned in order to provide the driver more comfortable feeling. According to the result of the verification tests, the obstacle orientation algorithm could accurately identify the 2D coordinate. And the proposed path planning of multi-turn mode saves one meter than the traditional two-turn mode. It makes the parking space only need 1.28 times the vehicle length. The vehicle control is implemented using Fuzzy-PID tracking control. System performance and tracking ability are verified in hardware and software implementations with very low cost.","PeriodicalId":143706,"journal":{"name":"2012 12th International Conference on ITS Telecommunications","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133070338","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2012-11-01DOI: 10.1109/ITST.2012.6425182
Huei-Ru Tseng
The concept of vehicle-to-grid (V2G) is that electric vehicles (EVs) communicate with the smart grid to sell demand response services by delivering electricity into the grid. By letting EVs discharge during peak hours and charge during off-peak hours, V2G networks could bring numerous social and technical benefits to the smart grid. Due to the scale of the network, the speed of the vehicles, their geographic positions, and the very sporadic connectivity between them, V2G communications have the crucial requirements of fast authentication. In 2011, Guo et al. proposed a unique batch authentication protocol for V2G communications. They claimed their protocol is strong enough to defend against security attacks. In this paper, we investigate the security of Guo et al.'s protocol. More precisely, we show that either the vehicle or aggregator can easily generate a collection of bogus signatures that satisfies the batch verification criterion, i.e., forgery attacks. Any attackers can easily forge signatures satisfying the batch verification criterion without the knowledge of the signer's private key. Consequently, Guo et al.'s protocol is not secure at all.
{"title":"On the security of a unique batch authentication protocol for vehicle-to-grid communications","authors":"Huei-Ru Tseng","doi":"10.1109/ITST.2012.6425182","DOIUrl":"https://doi.org/10.1109/ITST.2012.6425182","url":null,"abstract":"The concept of vehicle-to-grid (V2G) is that electric vehicles (EVs) communicate with the smart grid to sell demand response services by delivering electricity into the grid. By letting EVs discharge during peak hours and charge during off-peak hours, V2G networks could bring numerous social and technical benefits to the smart grid. Due to the scale of the network, the speed of the vehicles, their geographic positions, and the very sporadic connectivity between them, V2G communications have the crucial requirements of fast authentication. In 2011, Guo et al. proposed a unique batch authentication protocol for V2G communications. They claimed their protocol is strong enough to defend against security attacks. In this paper, we investigate the security of Guo et al.'s protocol. More precisely, we show that either the vehicle or aggregator can easily generate a collection of bogus signatures that satisfies the batch verification criterion, i.e., forgery attacks. Any attackers can easily forge signatures satisfying the batch verification criterion without the knowledge of the signer's private key. Consequently, Guo et al.'s protocol is not secure at all.","PeriodicalId":143706,"journal":{"name":"2012 12th International Conference on ITS Telecommunications","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132477255","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2012-11-01DOI: 10.1109/ITST.2012.6425244
Yen-Ting Chen, Hung-Yi Teng, Ren-Hung Hwang, Jeng-Farn Lee
With widespread adoption of wireless local area networks (WLANs), video dissemination over wireless links such as video telephony, video gaming, and mobile TV broadcasting have become fast growing applications. Since wireless channel is error-prone, the receiving data rate of mobile stations (MSs) needs to be selected properly to avoid high packet loss rate and serious service quality degradation. In addition, to enhance reliability of video multicasting, application-layer forward error correction (AL-FEC) is a promising approach against packet losses. However, at the WLAN access point (AP), how to adaptively select a proper combination of transmission rate and AL-FEC code rate to multicast layered videos in WLANs becomes an important issue. In this paper, we propose a reward-based bandwidth adaptation mechanism to dynamically determine the best combination of transmission rate and AL-FEC code rate to multicast layered video in IEEE 802.11 WLANs. Our goal is to maximize the system reward which represents the video quality experienced on all users, under a given resource budget. A reward-based policy iteration algorithm is proposed as a heuristic approach to solve the optimization problem and its performance is compared with that of two baseline algorithms: exhaustive search and genetic algorithm. We demonstrate the performance of our approach via simulations. The simulation results show our approach can provide better service quality even through system resource is sparse.
{"title":"Optimal bandwidth adaptation for layered video multicasting in IEEE 802.11 WLANs","authors":"Yen-Ting Chen, Hung-Yi Teng, Ren-Hung Hwang, Jeng-Farn Lee","doi":"10.1109/ITST.2012.6425244","DOIUrl":"https://doi.org/10.1109/ITST.2012.6425244","url":null,"abstract":"With widespread adoption of wireless local area networks (WLANs), video dissemination over wireless links such as video telephony, video gaming, and mobile TV broadcasting have become fast growing applications. Since wireless channel is error-prone, the receiving data rate of mobile stations (MSs) needs to be selected properly to avoid high packet loss rate and serious service quality degradation. In addition, to enhance reliability of video multicasting, application-layer forward error correction (AL-FEC) is a promising approach against packet losses. However, at the WLAN access point (AP), how to adaptively select a proper combination of transmission rate and AL-FEC code rate to multicast layered videos in WLANs becomes an important issue. In this paper, we propose a reward-based bandwidth adaptation mechanism to dynamically determine the best combination of transmission rate and AL-FEC code rate to multicast layered video in IEEE 802.11 WLANs. Our goal is to maximize the system reward which represents the video quality experienced on all users, under a given resource budget. A reward-based policy iteration algorithm is proposed as a heuristic approach to solve the optimization problem and its performance is compared with that of two baseline algorithms: exhaustive search and genetic algorithm. We demonstrate the performance of our approach via simulations. The simulation results show our approach can provide better service quality even through system resource is sparse.","PeriodicalId":143706,"journal":{"name":"2012 12th International Conference on ITS Telecommunications","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114334370","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}