ID 8094 Paper Title Design and Application of the PECAS Land Use Modelling System Contact Author John Douglas Hunt (author1) Email jdhunt@ucalgary.ca Phone +1-403-220-8793
论文题目PECAS土地利用建模系统的设计与应用联系作者John Douglas Hunt(作者1)Email jdhunt@ucalgary.ca电话+1-403-220-8793
{"title":"Cover page","authors":"J. Hunt","doi":"10.1093/chromsci/bmv231","DOIUrl":"https://doi.org/10.1093/chromsci/bmv231","url":null,"abstract":"ID 8094 Paper Title Design and Application of the PECAS Land Use Modelling System Contact Author John Douglas Hunt (author1) Email jdhunt@ucalgary.ca Phone +1-403-220-8793","PeriodicalId":338777,"journal":{"name":"2017 10th IFIP Wireless and Mobile Networking Conference (WMNC)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123966562","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-09-01DOI: 10.1109/WMNC.2017.8248842
J. Lorca, E. Serna, L. Campoy
One of the most serious impairments when deploying wireless Orthogonal Frequency Division Multiplexing (OFDM) networks with frequency-reuse one is cell-edge performance. Standard interference coordination approaches, like enhanced Inter-Cell Interference Coordination (eICIC) and Coordinated Multi-Point (CoMP), can improve performance at the cell-edge, but improvements are only significant when ideal or almost ideal backhaul is considered. Moreover, interferences from uncoordinated cells and from cells belonging to other clusters are not properly considered in the standards. This paper proposes an alternative Discrete Fourier Transform (DFT)-based clustered coordination technique for the downlink, wherein intra-cluster interference is effectively rejected, and interferences from other clusters and uncoordinated cells are reduced by a factor equal to the cluster size. The proposed coordination technique does not require costly exchange of user plane data among the cells involved, therefore being applicable in non-ideal backhaul scenarios. Simulations show significant performance improvements in low signal to noise and interference conditions.
{"title":"DFT-based coordination mechanism for inter-cell interference mitigation in wireless OFDM systems","authors":"J. Lorca, E. Serna, L. Campoy","doi":"10.1109/WMNC.2017.8248842","DOIUrl":"https://doi.org/10.1109/WMNC.2017.8248842","url":null,"abstract":"One of the most serious impairments when deploying wireless Orthogonal Frequency Division Multiplexing (OFDM) networks with frequency-reuse one is cell-edge performance. Standard interference coordination approaches, like enhanced Inter-Cell Interference Coordination (eICIC) and Coordinated Multi-Point (CoMP), can improve performance at the cell-edge, but improvements are only significant when ideal or almost ideal backhaul is considered. Moreover, interferences from uncoordinated cells and from cells belonging to other clusters are not properly considered in the standards. This paper proposes an alternative Discrete Fourier Transform (DFT)-based clustered coordination technique for the downlink, wherein intra-cluster interference is effectively rejected, and interferences from other clusters and uncoordinated cells are reduced by a factor equal to the cluster size. The proposed coordination technique does not require costly exchange of user plane data among the cells involved, therefore being applicable in non-ideal backhaul scenarios. Simulations show significant performance improvements in low signal to noise and interference conditions.","PeriodicalId":338777,"journal":{"name":"2017 10th IFIP Wireless and Mobile Networking Conference (WMNC)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134224218","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-09-01DOI: 10.1109/WMNC.2017.8248846
Mozhdeh Gholibeigi, Nora Sarrionandia, M. Karimzadeh, Mitra Baratchi, H. V. D. Berg, G. Heijenk
With the ever-increasing call for connected vehicles and intelligent transportation applications, vehicular networking have been of significant focus recently. Demands for highly reliable communication challenge the current underlying technology and transformations in vehicular communication are discussed. The uMTC service of the next generation mobile networking system (i.e. 5G), which is based on D2D broadcast communication, is a promising enabler for broadcast-based C-ITS applications with strict reliability requirements. In this paper, we look at the resource management aspect of D2D communication technology to contribute to vehicular broadcasting with a higher level of reliability. In this regard, we propose a resource allocation scheme which is adaptive to the varying state of a vehicular network. With focus on the network load and topology as the main criteria, our scheme aims for management of the system capacity and interference situations, in order to meet the performance requirement of D2D vehicular broadcast, in terms of reliability. The results confirm the effectiveness of our approach and provide insight on the optimal network design regarding the allowed data rate and resource assignment according to application requirements.
{"title":"Reliable vehicular broadcast using 5G device-to-device communication","authors":"Mozhdeh Gholibeigi, Nora Sarrionandia, M. Karimzadeh, Mitra Baratchi, H. V. D. Berg, G. Heijenk","doi":"10.1109/WMNC.2017.8248846","DOIUrl":"https://doi.org/10.1109/WMNC.2017.8248846","url":null,"abstract":"With the ever-increasing call for connected vehicles and intelligent transportation applications, vehicular networking have been of significant focus recently. Demands for highly reliable communication challenge the current underlying technology and transformations in vehicular communication are discussed. The uMTC service of the next generation mobile networking system (i.e. 5G), which is based on D2D broadcast communication, is a promising enabler for broadcast-based C-ITS applications with strict reliability requirements. In this paper, we look at the resource management aspect of D2D communication technology to contribute to vehicular broadcasting with a higher level of reliability. In this regard, we propose a resource allocation scheme which is adaptive to the varying state of a vehicular network. With focus on the network load and topology as the main criteria, our scheme aims for management of the system capacity and interference situations, in order to meet the performance requirement of D2D vehicular broadcast, in terms of reliability. The results confirm the effectiveness of our approach and provide insight on the optimal network design regarding the allowed data rate and resource assignment according to application requirements.","PeriodicalId":338777,"journal":{"name":"2017 10th IFIP Wireless and Mobile Networking Conference (WMNC)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116875589","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-09-01DOI: 10.1109/WMNC.2017.8248853
N. Saxena, N. Chaudhari
This paper deals with the security vulnerabilities of the cryptographic algorithms A3, A8, and A5 existing in the GSM network. We review these algorithms and propose new secure algorithms named NewA3, NewA8, and NewA5 algorithms with respect to the A3, A8, and A5 algorithms. Our NewA5 algorithm is based on block ciphers, but we also propose NewA5 algorithm with Cipher Feedback, Counter, and Output Feedback modes to convert block cipher into stream cipher. However, stream cipher algorithms are slower than the block cipher algorithm. These new algorithms are proposed to use with a secure and efficient authentication and key agreement (AKA) protocol in the GSM network. The proposed architecture is secure against partition attack, narrow pipe attack, collision attack, interleaving attack, and man-in-the-middle attack. The security analysis of the proposed algorithms are discussed with respect to the cryptanalysis, brute force analysis, and operational analysis. We choose the NewA3 and NewA8 algorithms for challenge-response and key generation, respectively. Furthermore, the NewA5 is suitable for encryption as it is efficient than the existing A5/1 and A5/2 algorithms. In case when stream cipher algorithms are required to use, our new algorithms, NewA5-CTR, NewA5-CFB, and NewA5-OFB can be used for specific applications. These algorithms are completely secure and better than the existing A5/1 and A5/2 in terms of resistant to attacks.
{"title":"Secure algorithms for SAKA protocol in the GSM network","authors":"N. Saxena, N. Chaudhari","doi":"10.1109/WMNC.2017.8248853","DOIUrl":"https://doi.org/10.1109/WMNC.2017.8248853","url":null,"abstract":"This paper deals with the security vulnerabilities of the cryptographic algorithms A3, A8, and A5 existing in the GSM network. We review these algorithms and propose new secure algorithms named NewA3, NewA8, and NewA5 algorithms with respect to the A3, A8, and A5 algorithms. Our NewA5 algorithm is based on block ciphers, but we also propose NewA5 algorithm with Cipher Feedback, Counter, and Output Feedback modes to convert block cipher into stream cipher. However, stream cipher algorithms are slower than the block cipher algorithm. These new algorithms are proposed to use with a secure and efficient authentication and key agreement (AKA) protocol in the GSM network. The proposed architecture is secure against partition attack, narrow pipe attack, collision attack, interleaving attack, and man-in-the-middle attack. The security analysis of the proposed algorithms are discussed with respect to the cryptanalysis, brute force analysis, and operational analysis. We choose the NewA3 and NewA8 algorithms for challenge-response and key generation, respectively. Furthermore, the NewA5 is suitable for encryption as it is efficient than the existing A5/1 and A5/2 algorithms. In case when stream cipher algorithms are required to use, our new algorithms, NewA5-CTR, NewA5-CFB, and NewA5-OFB can be used for specific applications. These algorithms are completely secure and better than the existing A5/1 and A5/2 in terms of resistant to attacks.","PeriodicalId":338777,"journal":{"name":"2017 10th IFIP Wireless and Mobile Networking Conference (WMNC)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115807257","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-09-01DOI: 10.1109/WMNC.2017.8248840
J. Lorca, Carlos F. López
Modern Forward Error Correction (FEC) techniques can involve significant processing delays associated to FEC decoding. So-called centralized RAN (C-RAN) networks can be impaired when FEC processing is centralized, particularly if large bandwidths are foreseen (like in mm-wave systems), because of the tight delay requirements imposed by Hybrid Automatic Repeat Request (HArQ). Decoupling HARQ from FEC decoding has the potential advantage of relaxing the transport network requirements by predicting errors prior to performing FEC decoding. In this paper we propose a technique to predict packet errors in FEC-encoded systems based on statistical analysis of soft metrics after very few FEC decoding iterations. Simulations confirm the suitability of the proposed technique for 256-bit Turbo encoded packets with rate 1/3 and two decoding iterations, by defining appropriate uncertainty regions outside which the probability of false decisions is bounded. Analysis of other block sizes and encoding rates suggests the existence of an optimum packet size and number of iterations as functions of the encoding rate for error prediction.
{"title":"Early prediction of packet errors in FEC-encoded systems with very few decoding iterations","authors":"J. Lorca, Carlos F. López","doi":"10.1109/WMNC.2017.8248840","DOIUrl":"https://doi.org/10.1109/WMNC.2017.8248840","url":null,"abstract":"Modern Forward Error Correction (FEC) techniques can involve significant processing delays associated to FEC decoding. So-called centralized RAN (C-RAN) networks can be impaired when FEC processing is centralized, particularly if large bandwidths are foreseen (like in mm-wave systems), because of the tight delay requirements imposed by Hybrid Automatic Repeat Request (HArQ). Decoupling HARQ from FEC decoding has the potential advantage of relaxing the transport network requirements by predicting errors prior to performing FEC decoding. In this paper we propose a technique to predict packet errors in FEC-encoded systems based on statistical analysis of soft metrics after very few FEC decoding iterations. Simulations confirm the suitability of the proposed technique for 256-bit Turbo encoded packets with rate 1/3 and two decoding iterations, by defining appropriate uncertainty regions outside which the probability of false decisions is bounded. Analysis of other block sizes and encoding rates suggests the existence of an optimum packet size and number of iterations as functions of the encoding rate for error prediction.","PeriodicalId":338777,"journal":{"name":"2017 10th IFIP Wireless and Mobile Networking Conference (WMNC)","volume":"179 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121729166","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-09-01DOI: 10.1109/WMNC.2017.8248847
T. Hou
Device-to-device (D2D) communication has been proposed to improve the throughput of multicast from the base station to user equipment (UE) in LTE-based access networks. Such a multicast is divided into two stages where the first stage is from the base station to one or more relay UEs, while the second stage is from the relay UE(s) to the rest of UEs via D2D communication, where D2D-capable UEs form clusters to maintain their short-range transmission characteristic. Previous works did not consider taking advantage of D2D's capability of reusing uplink resource blocks that have been allocated to ordinary UEs (or CUE, cellular-network UE). Previous works also mainly focused on maximizing the throughput sum of firststage and second-stage transmissions. We note that the multicast delay is a more meaningful performance metric for time-sensitive streaming data multicast and high throughput sum does not directly translate to low delay. In this paper, we study the D2D-assisted two-stage multicast that allows D2D communication to reuse CUEs' uplink resource blocks. We choose the multicast delay as the main performance objective and evaluate two relay UE selection schemes in their effectiveness in minimizing the multicast delay in comparison to one-stage multicast. Our results show that two-stage multicast performs better than one-stage multicast in both minimizing delay and maximizing resource efficiency when the cluster is far away from the base station and the cluster size is small. 1
{"title":"Minimizing delay in D2D-assisted resource-efficient two-stage multicast in LTE access networks","authors":"T. Hou","doi":"10.1109/WMNC.2017.8248847","DOIUrl":"https://doi.org/10.1109/WMNC.2017.8248847","url":null,"abstract":"Device-to-device (D2D) communication has been proposed to improve the throughput of multicast from the base station to user equipment (UE) in LTE-based access networks. Such a multicast is divided into two stages where the first stage is from the base station to one or more relay UEs, while the second stage is from the relay UE(s) to the rest of UEs via D2D communication, where D2D-capable UEs form clusters to maintain their short-range transmission characteristic. Previous works did not consider taking advantage of D2D's capability of reusing uplink resource blocks that have been allocated to ordinary UEs (or CUE, cellular-network UE). Previous works also mainly focused on maximizing the throughput sum of firststage and second-stage transmissions. We note that the multicast delay is a more meaningful performance metric for time-sensitive streaming data multicast and high throughput sum does not directly translate to low delay. In this paper, we study the D2D-assisted two-stage multicast that allows D2D communication to reuse CUEs' uplink resource blocks. We choose the multicast delay as the main performance objective and evaluate two relay UE selection schemes in their effectiveness in minimizing the multicast delay in comparison to one-stage multicast. Our results show that two-stage multicast performs better than one-stage multicast in both minimizing delay and maximizing resource efficiency when the cluster is far away from the base station and the cluster size is small. 1","PeriodicalId":338777,"journal":{"name":"2017 10th IFIP Wireless and Mobile Networking Conference (WMNC)","volume":"111 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126215033","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-09-01DOI: 10.1109/WMNC.2017.8248854
Javier Rocher, Miran Taha, L. Parra, Jaime Lloret
Fish farms pretend to be the sustainable option to provide fish. The water quality is very important to ensure the fish performance. Thus, the monitoring of the water quality is crucial in order to automatize different process in facilities. In this paper, we present a system to monitor the turbidity in fish farms. First, the sensors and wireless nodes are defined. We use an optical sensor for turbidity monitoring and a Flyport as a node. Then, the topology and operation process are detailed. An extended star is proposed as network topology with a wireless connection between Flyports and the Access Points. Finally, the network performance is tested. The main issue is that in the fish farms there is a harsh environment and it is needed to minimize the number of Access Points employed, but maintaining good network performance. With 5 Flyports sharing one Access Point there is a packet loss rate close to 0.5%. Moreover, the appearance of the windows to visualize the data in the server and the alarms sent are shown. It is possible to select different tank types and tank numbers on the server to see the data. In the alarm message, it is possible to see the type of alarm, the affected tank and the timer of this alarm.
{"title":"Design and deployment of a WSN for water turbidity monitoring in fish farms","authors":"Javier Rocher, Miran Taha, L. Parra, Jaime Lloret","doi":"10.1109/WMNC.2017.8248854","DOIUrl":"https://doi.org/10.1109/WMNC.2017.8248854","url":null,"abstract":"Fish farms pretend to be the sustainable option to provide fish. The water quality is very important to ensure the fish performance. Thus, the monitoring of the water quality is crucial in order to automatize different process in facilities. In this paper, we present a system to monitor the turbidity in fish farms. First, the sensors and wireless nodes are defined. We use an optical sensor for turbidity monitoring and a Flyport as a node. Then, the topology and operation process are detailed. An extended star is proposed as network topology with a wireless connection between Flyports and the Access Points. Finally, the network performance is tested. The main issue is that in the fish farms there is a harsh environment and it is needed to minimize the number of Access Points employed, but maintaining good network performance. With 5 Flyports sharing one Access Point there is a packet loss rate close to 0.5%. Moreover, the appearance of the windows to visualize the data in the server and the alarms sent are shown. It is possible to select different tank types and tank numbers on the server to see the data. In the alarm message, it is possible to see the type of alarm, the affected tank and the timer of this alarm.","PeriodicalId":338777,"journal":{"name":"2017 10th IFIP Wireless and Mobile Networking Conference (WMNC)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121287836","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-09-01DOI: 10.1109/WMNC.2017.8248857
Ricardo Silveira Rodrigues, M. Pasin, Renato B. Machado
Position tracking is a key service in the context of vehicular networks. It serves as a basis for other services such as navigation, traffic regulation and statistical reporting. Position tracking can not depend exclusively on satellite signals, since those are usually not totally available for indoor applications. The approach of using fixed anchors helps to fill this gap and allows better result in terms of accuracy than ordinary GPS services. This work presents an implementation of an indoor position tracking service for a vehicular network by using the Arduino mobile platform with a vehicle robot. We use a set of low cost sensors to perform an experiment where we investigate and evaluate the performance of new possible solutions.
{"title":"Indoor position tracking: An application using the Arduino mobile platform","authors":"Ricardo Silveira Rodrigues, M. Pasin, Renato B. Machado","doi":"10.1109/WMNC.2017.8248857","DOIUrl":"https://doi.org/10.1109/WMNC.2017.8248857","url":null,"abstract":"Position tracking is a key service in the context of vehicular networks. It serves as a basis for other services such as navigation, traffic regulation and statistical reporting. Position tracking can not depend exclusively on satellite signals, since those are usually not totally available for indoor applications. The approach of using fixed anchors helps to fill this gap and allows better result in terms of accuracy than ordinary GPS services. This work presents an implementation of an indoor position tracking service for a vehicular network by using the Arduino mobile platform with a vehicle robot. We use a set of low cost sensors to perform an experiment where we investigate and evaluate the performance of new possible solutions.","PeriodicalId":338777,"journal":{"name":"2017 10th IFIP Wireless and Mobile Networking Conference (WMNC)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117124711","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-09-01DOI: 10.1109/WMNC.2017.8248841
Marie-Line Alberi-Morel, S. Randriamasy
Fifth-generation (5G) mobile networks are geared to support future services such as enhanced Mobile BroadBand. They already face dramatic data traffic increase mainly due to the generalized demand by mobile consumers for Full High Definition/High Definition (Full HD/HD) video services. The most viable solution to solve this problem is to deploy heterogeneous cellular networks, which involve a massive deployment of densified low power cells. However, in heterogeneous cellular networks, coordination of cell scheduling is required to efficiently distribute the resources and mitigate inter-cell interference. To puzzle out this issue, a novel approach based on game theory that optimizes cell time transmission muting and user attachment is proposed. Its novelty consists in directly involving user Quality of Experience (QoE) in the maximization of an overall video utility instead of a global network utility, aiming at driving inter-cell interference coordination algorithms with user satisfaction. The proposed solution is compared with a state-of-the-art strategy. The numerical results show how QoE awareness significantly improves the efficiency of inter-cell interference management in heterogeneous cellular networks and increases the density of users requesting higher quality videos.
{"title":"Quality of experience-aware enhanced inter-cell interference coordination for self organized HetNet","authors":"Marie-Line Alberi-Morel, S. Randriamasy","doi":"10.1109/WMNC.2017.8248841","DOIUrl":"https://doi.org/10.1109/WMNC.2017.8248841","url":null,"abstract":"Fifth-generation (5G) mobile networks are geared to support future services such as enhanced Mobile BroadBand. They already face dramatic data traffic increase mainly due to the generalized demand by mobile consumers for Full High Definition/High Definition (Full HD/HD) video services. The most viable solution to solve this problem is to deploy heterogeneous cellular networks, which involve a massive deployment of densified low power cells. However, in heterogeneous cellular networks, coordination of cell scheduling is required to efficiently distribute the resources and mitigate inter-cell interference. To puzzle out this issue, a novel approach based on game theory that optimizes cell time transmission muting and user attachment is proposed. Its novelty consists in directly involving user Quality of Experience (QoE) in the maximization of an overall video utility instead of a global network utility, aiming at driving inter-cell interference coordination algorithms with user satisfaction. The proposed solution is compared with a state-of-the-art strategy. The numerical results show how QoE awareness significantly improves the efficiency of inter-cell interference management in heterogeneous cellular networks and increases the density of users requesting higher quality videos.","PeriodicalId":338777,"journal":{"name":"2017 10th IFIP Wireless and Mobile Networking Conference (WMNC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122631237","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-09-01DOI: 10.1109/WMNC.2017.8248849
Thomas Blazek, C. Mecklenbräuker, Christian Backfrieder, G. Ostermayer
Safety messaging among Intelligent Transport Systems relies on guaranteed timely delivery. The reliability of such a system is strongly dependent on the channel load, the channel quality and the number of hops necessary to convey information between nodes. While a lot of research has been conducted on the subject, the vehicular density is usually given, and thus, channel overloading remains a threat. In this paper, we approach the topic from the opposite direction, by allowing the vehicle traffic to be routed such that individual traveling times are minimized using the PCMA∗ algorithm, and analyzing the impact on the safety message dissemination. We formulate a reliability definition by introducing key parameters for analysis via the probability of timely channel access, the hidden node potential and the mean hop count. We then use simulations of real life urban scenarios that we model as communication graphs, and compare the performance of medium access with and without cooperative driving. Our results show that optimizing driving routes cooperatively with respect to driving time and fuel consumption achieves geographic distributions of the communication nodes that ensures degrees of reliability not possible in egoistic driving scenarios.
{"title":"Improving communication reliability in intelligent transport systems through cooperative driving","authors":"Thomas Blazek, C. Mecklenbräuker, Christian Backfrieder, G. Ostermayer","doi":"10.1109/WMNC.2017.8248849","DOIUrl":"https://doi.org/10.1109/WMNC.2017.8248849","url":null,"abstract":"Safety messaging among Intelligent Transport Systems relies on guaranteed timely delivery. The reliability of such a system is strongly dependent on the channel load, the channel quality and the number of hops necessary to convey information between nodes. While a lot of research has been conducted on the subject, the vehicular density is usually given, and thus, channel overloading remains a threat. In this paper, we approach the topic from the opposite direction, by allowing the vehicle traffic to be routed such that individual traveling times are minimized using the PCMA∗ algorithm, and analyzing the impact on the safety message dissemination. We formulate a reliability definition by introducing key parameters for analysis via the probability of timely channel access, the hidden node potential and the mean hop count. We then use simulations of real life urban scenarios that we model as communication graphs, and compare the performance of medium access with and without cooperative driving. Our results show that optimizing driving routes cooperatively with respect to driving time and fuel consumption achieves geographic distributions of the communication nodes that ensures degrees of reliability not possible in egoistic driving scenarios.","PeriodicalId":338777,"journal":{"name":"2017 10th IFIP Wireless and Mobile Networking Conference (WMNC)","volume":"398 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132218630","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}