• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 77
  • 11
  • 8
  • 5
  • 2
  • 1
  • 1
  • 1
  • 1
  • 1
  • Tagged with
  • 126
  • 126
  • 62
  • 60
  • 41
  • 37
  • 25
  • 25
  • 24
  • 23
  • 23
  • 22
  • 19
  • 18
  • 16
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
111

On the Performance Analysis of Cooperative Vehicular Communication

Feteiha, Mohamed January 2012 (has links)
Vehicular networking is envisioned to be a key technology area for significant growth in the coming years. Although the expectations for this emerging technology are set very high, many practical aspects remain still unsolved for a vast deployment of vehicular networks. This dissertation addresses the enabling physical layer techniques to meet the challenges in vehicular networks operating in mobile wireless environments. Considering the infrastructure-less nature of vehicular networks, we envision cooperative diversity well positioned to meet the demanding requirements of vehicular networks with their underlying distributed structure. Cooperative diversity has been proposed as a powerful means to enhance the performance of high-rate communications over wireless fading channels. It realizes spatial diversity advantages in a distributed manner where a node uses others antennas to relay its message creating a virtual antenna array. Although cooperative diversity has garnered much attention recently, it has not yet been fully explored in the context of vehicular networks considering the unique characteristics of vehicular networks, this dissertation provides an error performance analysis study of cooperative transmission schemes for various deployment and traffic scenarios. In the first part of this dissertation, we investigate the performance of a cooperative vehicle-to-vehicle (V2V) system with amplify-and-forward relaying for typical traffic scenarios under city/urban settings and a highway area. We derive pairwise error probability (PEP) expressions and demonstrate the achievable diversity gains. The effect of imperfect channel state information (CSI) is also studied through an asymptotical PEP analysis. We present Monte-Carlo simulations to confirm the analytical derivations and present the error rate performance of the vehicular scheme with perfect and imperfect-CSI. In the second part, we consider road-to-vehicle (R2V) communications in which roadside access points use cooperating vehicles as relaying terminals. Under the assumption of decode-and-forward relaying, we derive PEP expressions for single-relay and multi-relay scenarios. In the third part, we consider a cooperative multi-hop V2V system in which direct transmission is not possible and investigate its performance through the PEP derivation and diversity gain analysis. Monte-Carlo simulations are further provided to con firm the analytical derivations and provide insight into the error rate performance improvement.
112

Stratégies de routage multi-chemin dans les réseaux sans fil multi-sauts / Multipath routing techniques for wireless multi-hop networks

Doghri, Inès 30 May 2012 (has links)
Un réseau sans fil multi-saut est un ensemble d’entités mobiles et/ou fixes formant un réseau dynamique temporaire avec ou sans l’aide de toute administration centralisée. Cette particularité rend le routage problématique en cas d’instabilité des éléments qui composent les communications non directes. Afin de palier ces problèmes, de nouvelles formes de routage sont utilisées comme le routage multi-chemin (MC). Le routage MC permet d’envoyer les données sur des chemins multiples et semble être une solution efficace pour ces réseaux. Le but de cette thèse est d’étudier les techniques de routage MC dans un contexte sans fil multi-saut en vue d’obtenir de meilleures performances. Nous avons choisi pour notre étude une extension MC du protocole OLSR, appelée MP-OLSR. Nous évaluons ses performances sous divers scénarios sous NS-2. Ces tests d’évaluation nous ont amenés à mettre en ´evidence deux problèmes dans MP-OLSR : la réactivité du protocole de routage MC suite à des ruptures de route et la stratégie de répartition des données sur les chemins multiples. Nous avons étudié la réactivité de tels mécanismes dans MP-OLSR. Nous avons proposé trois nouvelles techniques de réparation de pannes qui diminuent les temps de rétablissement d’une route et réduisent le taux de perte des flux transmis. Nous proposons aussi un mécanisme qui détecte la dégradation de la qualité des liens durant le transfert d’un trafic de données. Les informations déduites de ce mécanisme servent à adapter la proportion de trafic à affecter à chaque chemin selon les conditions réseaux. Cette nouvelle variante du protocole MP-OLSR est évaluée par simulation. / Wireless multi-hop networks consist of a collection of mobile and/or fixed nodes which dynamically exchange data with (or without) reliance on a (any) centralized administration. They are by definition self-organized. The frequent topological changes make multi-hop routing a crucial issue for these networks. To overcome these problems, new forms of routing schemes are used as the multipath routing (MP). MP routing uses multiple paths to send data and can be regarded as an effective solution for these networks. The purpose of this PhD thesis is to study the MP routing techniques in a wirelessmulti-hop context for better performance. We choose for our study a MP extension of OLSR, called MP-OLSR. We evaluate its performance under various scenarios in NS-2. These tests have led us to highlight two problems in MP-OLSR : the long recovery delays when facing network failure situations and the allocation strategy of data on multiple paths. We define and seek to evaluate the latency introduced by both protocols OLSR and MP-OLSR to find a new path after a link failure. We propose three new different recovery schemes and accordingly extend these original protocols in order to decrease theexpected latency and reduce the packet loss rate of transmitted flow. We also propose a mechanism which is able to detect the deterioration of the link quality during the transfer of data traffic. The information derived from this mechanism is used to adjust the proportion of traffic to be assigned to each path according to network conditions. This new version of MP-OLSR protocol is evaluated by simulation.
113

Stochastic Geometry Based Analysis of Capacity, Mobility and Energy Efficiency for Dense Heterogeneous Networks

Merwaday, Arvind 29 March 2016 (has links)
In recent years, the increase in the population of mobile users and the advances in computational capabilities of mobile devices have led to an exponentially increasing traffic load on the wireless networks. This trend is foreseen to continue in the future due to the emerging applications such as cellular Internet of things (IoT) and machine type communications (MTC). Since the spectrum resources are limited, the only promising way to keep pace with the future demand is through aggressive spatial reuse of the available spectrum which can be realized in the networks through dense deployment of small cells. There are many challenges associated with such densely deployed heterogeneous networks (HetNets). The main challenges which are considered in this research work are capacity enhancement, velocity estimation of mobile users, and energy efficiency enhancement. We consider different approaches for capacity enhancement of the network. In the first approach, using stochastic geometry we theoretically analyze time domain inter-cell interference coordination techniques in a two-tier HetNet and optimize the parameters to maximize the capacity of the network. In the second approach, we consider optimization of the locations of aerial bases stations carried by the unmanned aerial vehicles (UAVs) to enhance the capacity of the network for public safety and emergency communications, in case of damaged network infrastructure. In the third approach, we introduce a subsidization scheme for the service providers through which the network capacity can be improved by using regulatory power of the government. Finally, we consider the approach of device-to-device communications and multi-hop transmissions for enhancing the capacity of a network. Velocity estimation of high speed mobile users is important for effective mobility management in densely deployed small cell networks. In this research, we introduce two novel methods for the velocity estimation of mobile users: handover-count based velocity estimation, and sojourn time based velocity estimation. Using the tools from stochastic geometry and estimation theory, we theoretically analyze the accuracy of the two velocity estimation methods through Cramer-Rao lower bounds (CRLBs). With the dense deployment of small cells, energy efficiency becomes crucial for the sustained operation of wireless networks. In this research, we jointly study the energy efficiency and the spectral efficiency in a two-tier HetNet. We optimize the parameters of inter-cell interference coordination technique and study the trade-offs between the energy efficiency and spectral efficiency of the HetNet.
114

Agrégation de trafic pour réduire la consommation énergétique globale dans les réseaux sans fil multi-sauts / Traffic aggregation for global energy savings in multi-hop wireless networks

Laubé, Alexandre 25 September 2017 (has links)
Les incitations économiques et environnementales poussent dorénavant à intégrer des considérations énergétiques dès les premiers stades de développement des réseaux. Dans les réseaux sans fil multi-sauts, l'approche la plus courante consiste à répartir le trafic sur l'ensemble des nœuds afin de réduire équitablement la consommation énergétique de chacun, avec pour objectif la maximisation de la durée de vie du réseau. Or cette approche n'est pas optimale vis-à-vis de la consommation globale du réseau, le niveau d'activité d'un nœud n'ayant souvent que peu d'influence sur sa propre consommation. Nous montrons que la meilleure approche consiste à éteindre un maximum de nœuds. Parmi les travaux réalisés, nous avons développé une solution s'appuyant sur de la programmation linéaire en nombres entiers et des simulations de graphes et de réseaux. La solution proposée permet ainsi une agrégation de flux optimale, réduisant significativement le nombre de nœuds utilisés dans le réseau. Afin de la rendre applicable en pratique, une heuristique est détaillée permettant une mise en œuvre distribuée grâce à l'utilisation d'une métrique de routage. Ainsi, tout algorithme de plus court chemin peut nativement réaliser de l'agrégation de flux efficace. Il est important de souligner que la qualité de service en termes de débit est respectée. En effet, les interférences sont prises en compte et il est possible de profiter de la synergie offerte par l'utilisation conjointe de l'agrégation de flux et du codage réseau. Nos résultats améliorent significativement les méthodes d'économie d'énergie basées sur l'extinction des nœuds en leur permettant d'en éteindre davantage. / Economic and ecologic incentives are now leading people to design networks with energetic considerations at early stages of development. Most of the works for multi-hop wireless networks tend to spread the traffic uniformly over the network to reduce the energy consumption of each node individually. However, considering that the traffic of a node doesn't impact significantly its energy consumption, this approach is not optimal regarding the global energy consumption of the network. Finding a way to turnoff as much node as possible seems then to be a better way. This PhD thesis focus on routing a set of flows over a multi-hop wireless network while minimizing the number of used nodes. This is done by using a distributed metric that allows the shortest path routing algorithms to perform flow aggregation. Using integer linear programming and simulations, we proposed an efficient solution to aggregate flows to significantly reduce the number of nodes used in the network. It allows, then, to improve algorithms that reduce the energy consumption of networks by increasing the number of nodes that can be turned off.
115

Evaluation of the influence of channel conditions on Car2X Communication

Minack, Enrico 14 November 2005 (has links)
The C2X Communication is of high interest to the automotive industry. Ongoing research on this topic mainly bases on the simulation of Vehicular Ad Hoc Networks. In order to estimate the necessary level of simulation details their impact on the results needs to be examined. This thesis focuses on different channel models as the freespace, shadowing, and Ricean model, along with varying parameters. For these simulations the network simulator ns-2 is extended to provide IEEE 802.11p compliance. However, the WAVE mode is not considered since it is still under development and not finally approved. Besides a more sophisticated packet error model than the existing implementation, as well as a link adaptation algorithm, is added. In this thesis several simulations examine specific details of wireless communication systems such as fairness of multiple access, interferences, throughput, and variability. Furthermore, the simulation points out some unexpected phenomena as starving nodes and saturation effects in multi hop networks. Those led to the conclusion that the IEEE 802.11 draft amendment does not solve known problems of the original IEEE 802.11 standard.
116

Design and optimization of access control protocols in Vehicular Ad Hoc Networks (VANETs) / Conception et optimisation de protocoles de contrôle d’accès pour les réseaux véhiculaires VANETs

Hadded, Mohamed 30 November 2016 (has links)
Les accidents routiers et leurs dommages représentent un problème croissant dans le monde entier. Dans ce contexte, les réseaux véhiculaires (VANETs) peuvent être déployés pour réduire les risques et pour améliorer le confort. Ils permettent aux véhicules d'échanger différents types de données qui vont des applications de sécurité et de gestion du trafic aux applications de confort. De nos jours, les applications de sécurité sont l’objet de beaucoup d'attention des chercheurs ainsi que des fabricants d'automobiles. Dans cette thèse, nous étudierons les applications critiques pour la sécurité routière visant à fournir une assistance dans des situations dangereuses ou difficiles. Notre objectif principal sera de proposer de nouveaux protocoles de contrôle d'accès au support de transmission (MAC) et de routage, qui peuvent s’adapter dynamiquement aux changements fréquents de topologies des VANETs. Après un aperçu des protocoles d’accès sans contention dans les VANETs, nous proposons des solutions basées sur la technique de division du temps: Time Division Multiple Access (TDMA). D’abord, nous nous concentrons sur le développement d’un nouveau protocole distribué (DTMAC), qui ne repose pas sur l’utilisation d’infrastructure. DTMAC utilise les informations de localisation et un mécanisme de réutilisation des slots pour assurer que les véhicules accèdent au canal efficacement et sans collision. Les résultats obtenus ont confirmé l’efficacité de notre protocole, DTMAC se comporte très significativement mieux que VeMAC (protocole MAC basé sur TDMA.) Ensuite nous proposons TRPM, un protocole de routage basé sur une approche cross-layer. Dans TRPM, l’ordonnancement des slots TDMA construit par DTMAC et la position de la destination sont utilisés pour choisir le meilleur relais. Les résultats montrent que TRPM offre de meilleures performances, du nombre moyen de relais et de la fiabilité de livraison des messages comparé à d’autres protocoles. Dans la deuxième partie de cette thèse, nous nous focaliserons sur les mécanismes centralisés d’allocation de slots qui utilisent des coordinateurs. D’abord, nous proposons CTMAC, un protocole basé sur TDMA centralisé utilisant les RSUs (RoadSide Units) pour créer et maintenir les ordonnancements. CTMAC met en œuvre un mécanisme qui permet d’empêcher les “Access Collisions” de se produire plus que deux fois entre les véhicules qui tentent d’acquérir un même slot disponible. Les résultats ont montré que CTMAC permet de mieux minimiser les collisions, ainsi que le surcoût généré pour créer et maintenir les ordonnancements par rapport aux protocoles MAC, basés sur TDMA distribué. Cependant, dans CTMAC, les véhicules roulant vite devront acquérir des nouveaux slots après une courte période de temps à chaque fois qu’ils quittent les zones de leurs RSUs courants. Cette situation rend les protocoles centralisés inefficaces et couteux dans les réseaux à grande vitesse. Afin de pallier à ce problème inhérent à l’utilisation des RSUs, nous adaptons un algorithme d’ordonnancement basé sur le clustering dans lequel certains véhicules sont élus pour gérer l'accès au canal. Ceci permet aux véhicules de rester attachés à leurs clusters plus longtemps. Pour ce faire, nous proposons 1- un protocole de clustering nommé AWCP afin de former des clusters stables avec une longue durée de vie. AWCP est basé sur l’algorithme de clustering pour les réseaux mobiles WCA dans lequel les têtes des clusters sont élues en se basant sur une fonction de poids. 2- Nous formulons le réglage des paramètres de protocole AWCP comme un problème d’optimisation multi-objective et nous proposons un outil d’optimisation qui combine la version multi-objective de l’algorithme génétique appelé NSGA-II avec le simulateur de réseau ns-2 pour trouver les meilleurs paramètres du protocole AWCP. 3- Nous proposons ASAS, une stratégie adaptative pour l’attribution des slots temporels basée sur une approche cross-layer entre TDMA et AWCP / Road crashes and their damages represent a serious issue and are one of the main causes of people death. In this context, Vehicular Ad hoc NETworks (VANETs) are deployed to reduce the risk of road accident as well as to improve passengers’ comfort by allowing vehicles to exchange different kinds of data which ranges widely from road safety and traffic management to infotainment. Nowadays, safety applications are receiving a great deal of attention from researchers as well as from automobile manufacturers. In this thesis, we particularly focus on safety-critical applications, designed to provide drivers assistance in dangerous situations and to avoid accidents in highway environments. Such applications must guarantee to the vehicles access to the medium and have strict requirements regarding end-to-end delay and packet loss ratio. Therefore, our main goal is to propose new medium access control and routing protocols, which can efficiently adapt to frequent changing VANET network topologies. After a comprehensive overview of free-contention MAC protocols, we propose several solutions, based on Time Division Multiple Access Technique (TDMA). We have designed DTMAC, a fully distributed TDMA-based MAC protocol, which does not rely on an expensive infrastructure. DTMAC uses vehicles’ locations and a slot reuse concept to ensure that vehicles in adjacent areas have collision-free schedule. Using simulations, we prove that DTMAC provides a lower rate of access and merging collisions than VeMAC, a well-known TDMA based MAC protocol in VANET. Then, in order to ensure that event-driven safety messages can be sent over a long distance, we propose TRPM, a TDMA aware Routing Protocol for Multi-hop communication. Our routing scheme is based on a cross layer approach between the MAC and the routing layers, in which the intermediate vehicles are selected using TDMA scheduling information. Simulation results show that TRPM provides better performances in terms of average end-to-end delay, average number of hops and average delivery ratio. In the second part, we focus on coordinator-based TDMA scheduling mechanisms. First, we propose the Centralized TDMA based MAC protocol (CTMAC) which uses Road Side Units (RSUs) as a central coordinator to create and maintain the TDMA schedules. CTMAC implements an Access Collision Avoidance mechanism that can prevent the access collision problem occurring more than twice between the same vehicles that are trying to access the channel at the same time. Using simulation we show an improvement in terms of access and merging collisions as well as the overhead required to create and maintain the TDMA schedules compared to distributed scheduling mechanisms. However, in the CTMAC protocol, fast moving vehicles will need to compete for new slots after a short period of time when they leave their current RSU area, which makes a centralized scheduling approach very expensive. In order to further improve the performance of coordinator-based TDMA scheduling mechanisms, we focus on cluster-based TDMA MAC protocols in which some vehicles in the network are elected to coordinate the channel access, allowing the vehicles to remain connected with their channel coordinator for a longer period of time. To this end, first we propose an adaptive weighted clustering protocol, named AWCP, which is road map dependent and uses road IDs and vehicle directions to make the clusters’ structure as stable as possible. Then, we formulate the AWCP parameter tuning as a multi-objective problem and we propose an optimization tool to find the optimal parameters of AWCP to ensure its QoS. Next, we propose ASAS, an adaptive slot assignment strategy for a cluster-based TDMA MAC protocol. This strategy is based on a cross layer approach involving TDMA and AWCP. The objective is to overcome the inter-cluster interference issue in overlapping areas by taking into account vehicles’ locations and directions when the cluster head assign slots
117

Gestion de confiance et solutions de sécurité pour les réseaux véhiculaires / Trust management and security solutions for vehicular networks

Hasrouny, Hamssa 24 July 2018 (has links)
Les réseaux véhiculaires sont constitués de véhicules capables de s’échanger des informations par voie radio afin d'améliorer la sécurité routière (diffusion de messages d'alerte en cas d’accident ou de ralentissement anormal, conduite collaborative entre véhicules…) ou de permettre aux passager d’accéder à l’Internet (applications de réseaux collaboratifs, jeux interactifs, gestion des espaces libres dans les parkings…). Malheureusement, les messages liés à la sécurité routière échangés entre les véhicules peuvent être falsifiés ou éliminés par des entités malveillantes afin de causer des accidents et mettre en péril la vie des personnes. Dans cette thèse, nous nous concentrons particulièrement sur la définition, conception et l’évaluation d’une solution de sécurité pour les communications entre véhicules afin d’assurer une communication sécurisée et un bon niveau de confiance entre les différents véhicules participants. En adoptant un modèle basé sur la formation de groupes, nous procédons à l'évaluation de niveau de confiance des véhicules participants à ces réseaux et nous développons un modèle de confiance qui sert à analyser leurs comportements dans leurs groupes respectifs tout en respectant la vie privée des participants et en maintenant une surcharge minimale dans le réseau. Ensuite, nous proposons un modèle hiérarchique et modulaire permettant la détection de comportement malveillant et la gestion de la révocation des certificats des véhicules concernés / VANETs (Vehicular Ad-hoc Networks) consist of vehicles capable of exchanging information by radio to improve road safety (alerts in case of accidents or in case of abnormal slowdowns, collaborative driving…) or allow internet access for passengers (collaborative networks, infotainment, etc.). Road safety messages exchanged between vehicles may be falsified or eliminated by malicious entities in order to cause accidents and endanger people life. In this thesis, we focus on defining, designing and evaluating a security solution for V2V communications in VANET, to ensure a secure communication and a good level of confidence between the different participating vehicles. Adopting a group-based model, we consider the Trustworthiness evaluation of vehicles participating in VANET and we develop a Trust Model to analyze the behavior of the vehicles in the group while preserving the privacy of the participants and maintaining low network overhead. We then propose a hierarchical and modular framework for Misbehavior Detection and Revocation Management
118

Reproducibility and Applicability of a Fuzzy-based Routing Algorithm in Wireless Sensor Networks

Rönningen, Hannes, Olofsson, Erik January 2023 (has links)
Wireless sensor networks is a broad subject with many applications and interesting research areas, such as optimization within connectivity and energy efficiency. One problem is that most published articles in this field use customized simulation environments and do not provide source code of their implementation. By not including aspects of implementation, it becomes difficult to determine how the results are achieved, which questions the validity and reliability of the works. This thesis aims to reproduce one of these researched methods, an algorithm that balances battery life with efficient routing within a network using fuzzy logic, with the goal to increase the reliability of the methodology within its field. The research question constructed on the foundation of these premises is thus “Is reproducibility satisfactory in a research work on a multi-objective routing algorithm, using fuzzy logic, in wireless sensor networks?, a case study by Minhas et al”. Two additional research questions emerge from the first one: “How does the reproduced algorithm perform in comparison to a selection of dif erent routing algorithms?” and “Is the reproduced algorithm, as is, applicable to a less idealistic environment?” To answer the research questions a computer simulation method is used to build, execute, and analyze the output of the algorithms. The results show that the implemented algorithm performs noticeably better in both lifetime and ratio to the shortest path compared with the original implementation, hinting towards the implementation and reproducibility deviating from expected results. The reproduced algorithm is also compared to two other algorithms under a different simulation environment, where it performs better in lifetime and packet delivery rate whilst performing slightly worse in energy efficiency and total energy consumption. Due to the significant differences in performance against the reproduced article’s implementation the study concludes that the reproducibility is not satisfactory. Lastly, it concludes that it does not perform well in a less idealistic simulation environment, making it less applicable.
119

Secure and Privacypreserving V2X multicast DNS

Atif, Ayub, Arieltan, Justin January 2020 (has links)
The Domain Name System is a hierarchical naming system that provides information of network resources or services given domain names. DNS applications in vehicular networks raise new challenges with regards to security and privacy of vehicles. In particular, vehicular communications outside the coverage of roadside infrastructure needs to be preserved. Multicast DNS is proposed as a method to restrict queries to vehicles in a Vehicle-to-Everything environment which could include other connected devices. Contemporary DNS applications rely on robust security protocols provided by the DNS Security Extensions to authenticate responses and verify resource records. Vehicular DNS communications need authentication to verify the source and legitimacy of DNS resource records. This can be achieved through multihop Vehicle- to-Vehicle communications to reach a name server supplemented by a novel approach to verify records using the Bloom filter.In this thesis, we analyze the security and privacy risks posed by a non-authenticated baseline communication protocol. We then build a secure and privacy-preserving networked system based on pseudonym certificate-based public key infrastructure solution. The experimental analysis confirmed the improvement on security and privacy at the cost of communication and computation overhead. / Domännamnssystemet är en hierarkisk benämningssystem som ger information om nätverksresurser eller tjänster för givna domännamn. DNS application i fordon nätverk framkallar nya utmaningar när det handlar om datasäkerhet och fordons integritet. Det är särskilt fordon kommunikation utanför vägkant-infrastrukturens räckvidd som behöver bevara och försäkra operationer av DNS applikation i fordon nätverk. Multicast DNS är en föreslagen metod för att begränsa förfrågan till fordon i en fordon-till-all-miljö som kan inkludera andra anslutna enheter. Nuvarande applikationer förlitar sig på en robust säkerhetsprotokoll som kommer från DNS säkerhetsförlängning för att autentisera svar och verifiera resurs rekord. Fordon DNS kommunikationer behöver autentisering för att verifiera källor och legitimitet av DNS resurs rekord. Detta kan uppnås genom multihop fordon-till-fordon kommunikation för att ansluta sig till en namn server med hjälp av en ny metod för att verifiera uppgifter med hjälp av bloomfilter datastruktur.I tesen analyserar vi risken som finns i en icke-autentiserad integritets-läckande kommunikationsprotokoll. Vi bygger sedan ett nätverk och använder en pseudonym certifikatbaserad publik nyckel infrastruktur lösning för att undersöka förbättringar inom säkerhet och integritet. Analysen från experimenten visar att det finns en förbättring för säkerhet och integritet i utbyte mot tidsprestanda, vilket är en intressant kompromiss.
120

Providing QoS in Autonomous and Neighbor-aware multi-hop Wireless Body Area Networks

Iyengar, Navneet 15 October 2015 (has links)
No description available.

Page generated in 0.0611 seconds