• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 49
  • 8
  • 5
  • 4
  • 2
  • 1
  • 1
  • Tagged with
  • 78
  • 78
  • 15
  • 14
  • 14
  • 14
  • 13
  • 13
  • 12
  • 12
  • 11
  • 11
  • 10
  • 10
  • 10
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
1

Trajectory Data Mining in the Design of Intelligent Vehicular Networks

Soares de Sousa, Roniel 02 November 2022 (has links)
Vehicular networks are a promising technology to help solve complex problems of modern society, such as urban mobility. However, the vehicular environment has some characteristics that pose challenges for wireless communication in vehicular networks not usually found in traditional networks. Therefore, the scientific community is yet investigating alternative techniques to improve data delivery in vehicular networks. In this context, the recent and increasing availability of trajectory data offers us valuable information in many research areas. These data comprise the so-called "big trajectory data" and represent a new opportunity for improving vehicular networks. However, there is a lack of specific data mining techniques to extract the hidden knowledge from these data. This thesis explores vehicle trajectory data mining to design intelligent vehicular networks. In the first part of this thesis, we deal with errors intrinsic to vehicle trajectory data that hinder their applicability. We propose a trajectory reconstruction framework composed of several preprocessing techniques to convert flawed GPS-based data to road-network constrained trajectories. This new data representation reduces trajectory uncertainty and removes problems such as noise and outliers compared to raw GPS trajectories. After that, we develop a novel and scalable cluster-based trajectory prediction framework that uses enhanced big trajectory data. Besides the prediction framework, we propose a new hierarchical agglomerative clustering algorithm for road-network constrained trajectories that automatically detects the most appropriate number of clusters. The proposed clustering algorithm is one of the components that allow the prediction framework to process large-scale datasets. The second part of this thesis applies the enhanced trajectory representation and the prediction framework to improve the vehicular network. We propose the VDDTP algorithm, a novel vehicle-assisted data delivery algorithm based on trajectory prediction. VDDTP creates an extended trajectory model and uses predicted road-network constrained trajectories to calculate packet delivery probabilities. Then, it applies the predicted trajectories and some proposed heuristics in a data forwarding strategy, aiming to improve the vehicular network's global metrics (i.e., delivery ratio, communication overhead, and delivery delay). In this part, we also propose the DisTraC protocol to demonstrate the applicability of vehicular networks to detect traffic congestion and improve urban mobility. DisTraC uses V2V communication to measure road congestion levels cooperatively and reroute vehicles to reduce travel time. We evaluate the proposed solutions through extensive experiments and simulations. For that, we prepare a new large-scale and real-world dataset based on the city of Rio de Janeiro, Brazil. We also use other real-world datasets publicly available. The results demonstrate the potential of the proposed data mining techniques (i.e., trajectory reconstruction and prediction frameworks) and vehicular networks algorithms.
2

Reliable Safety Broadcasting in Vehicular Ad hoc Networks using Network Coding

Hassanabadi, Behnam 09 January 2014 (has links)
We study the application of network coding in periodic safety broadcasting in Vehicular Ad hoc Networks. We design a sub-layer in the application layer of the WAVE architecture. Our design uses rebroadcasting of network coded safety messages, which considerably improves the overall reliability. It also tackles the synchronized collision problem stated in the IEEE 1609.4 standard as well as congestion problem and vehicle-to-vehicle channel loss. We study how massage repetition can be used to optimize the reliability in combination with a simple congestion control algorithm. We analytically evaluate the application of network coding using a sequence of discrete phase-type distributions. Based on this model, a tight safety message loss probability upper bound is derived. Completion delay is defined as the delay that a node receives the messages of its neighbour nodes. We provide asymptotic delay analysis and prove a general and a restricted tighter asymptotic upper bound for the completion delay of random linear network coding. For some safety applications, average vehicle to vehicle reception delay is of interest. An instantly decodable network coding based on heuristics of index coding problem is proposed. Each node at each transmission opportunity tries to XOR some of its received original messages. The decision is made in a greedy manner and based on the side information provided by the feedback matrix. A distributed feedback mechanism is also introduced to piggyback the side information in the safety messages. We also construct a Tanner graph based on the feedback information and use the Belief Propagation algorithm as an efficient heuristic similar to LDPC decoding. Layered BP is shown to be an effective algorithm for our application. Lastly, we present a simple experimental framework to evaluate the performance of repetition based MAC protocols. We conduct an experiment to compare the POC-based MAC protocol with a random repetition-based MAC.
3

Reliable Safety Broadcasting in Vehicular Ad hoc Networks using Network Coding

Hassanabadi, Behnam 09 January 2014 (has links)
We study the application of network coding in periodic safety broadcasting in Vehicular Ad hoc Networks. We design a sub-layer in the application layer of the WAVE architecture. Our design uses rebroadcasting of network coded safety messages, which considerably improves the overall reliability. It also tackles the synchronized collision problem stated in the IEEE 1609.4 standard as well as congestion problem and vehicle-to-vehicle channel loss. We study how massage repetition can be used to optimize the reliability in combination with a simple congestion control algorithm. We analytically evaluate the application of network coding using a sequence of discrete phase-type distributions. Based on this model, a tight safety message loss probability upper bound is derived. Completion delay is defined as the delay that a node receives the messages of its neighbour nodes. We provide asymptotic delay analysis and prove a general and a restricted tighter asymptotic upper bound for the completion delay of random linear network coding. For some safety applications, average vehicle to vehicle reception delay is of interest. An instantly decodable network coding based on heuristics of index coding problem is proposed. Each node at each transmission opportunity tries to XOR some of its received original messages. The decision is made in a greedy manner and based on the side information provided by the feedback matrix. A distributed feedback mechanism is also introduced to piggyback the side information in the safety messages. We also construct a Tanner graph based on the feedback information and use the Belief Propagation algorithm as an efficient heuristic similar to LDPC decoding. Layered BP is shown to be an effective algorithm for our application. Lastly, we present a simple experimental framework to evaluate the performance of repetition based MAC protocols. We conduct an experiment to compare the POC-based MAC protocol with a random repetition-based MAC.
4

Design of a Fast Location-Based Handoff Scheme for Vehicular Networks

Wang, Yikun 24 October 2013 (has links)
IEEE 802.11 is an economical and efficient standard that has been applied to vehicular networks. However, the long handoff latency of the standard handoff scheme for IEEE 802.11 has become an important issue for seamless roaming in vehicular environments, as more handoffs may be triggered due to the higher mobility of vehicles. This thesis presents a new and fast location-based handoff scheme particularly designed for vehicular environments. With the position and movement direction of a vehicle and the locations of the surrounding APs, our protocol is able to accurately predict several possible APs that the vehicle may visit in the future and to assign these APs different priority levels. APs on higher priority levels will be first scanned. Once a response to scanning from an AP is received, the scanning process ends immediately. A blacklist scheme is also used to exclude those APs that showed no response to the scanning during previous handoffs. Thus, time spent on scanning APs is supposed to be significantly reduced. The simulation results show that the proposed scheme attains not only a lower prediction error rate, but also a lower MAC layer handoff latency, and that it has a smaller influence on jitter and throughput; moreover, these results show that the proposed scheme has a smaller total number of handoffs than other handoff schemes.
5

Proactive traffic control strategies for sensor-enabled cars

Wang, Ziyuan January 2009 (has links)
TRAFFIC congestions and accidents are major concerns in today’s transportation systems. This thesis investigates how to improve traffic throughput by reducing or eliminating bottlenecks on highways, in particular for merging situations such as intersections where a ramp leads onto the highway. In our work, cars are equipped with sensors that can measure distance to neighboring cars, and communicate their velocity and acceleration readings with one another. Sensor-enabled cars can locally exchange sensed information about the traffic and adapt their behavior much earlier than regular cars. / We propose proactive algorithms for merging different streams of sensor-enabled cars into a single stream. A proactive merging algorithm decouples the decision point from the actual merging point. Sensor-enabled cars allow us to decide where and when a car merges before it arrives at the actual merging point. This leads to a significant improvement in traffic flow as velocities can be adjusted appropriately. We compare proactive merging algorithms against the conventional priority-based merging algorithm in a controlled simulation environment. Experimental results show that proactive merging algorithms outperform the priority-based merging algorithm in terms of flow and delay. / More importantly, the imprecise information (errors in sensor measurements) is a major challenge for merging algorithms, because inaccuracies can potentially lead to unsafe merging behaviors. In this thesis, we investigate how the accuracy of sensors impacts merging algorithms, and design robust merging algorithms that tolerate sensor errors. Experimental results show that one of our proposed merging algorithms, which is based on the theory of time geography, is able to guarantee safe merging while tolerating two to four times more imprecise positioning information, and can double the road capacity and increase the traffic flow by 25%.
6

Proactive traffic control strategies for sensor-enabled cars

Wang, Ziyuan January 2009 (has links)
TRAFFIC congestions and accidents are major concerns in today’s transportation systems. This thesis investigates how to improve traffic throughput by reducing or eliminating bottlenecks on highways, in particular for merging situations such as intersections where a ramp leads onto the highway. In our work, cars are equipped with sensors that can measure distance to neighboring cars, and communicate their velocity and acceleration readings with one another. Sensor-enabled cars can locally exchange sensed information about the traffic and adapt their behavior much earlier than regular cars. / We propose proactive algorithms for merging different streams of sensor-enabled cars into a single stream. A proactive merging algorithm decouples the decision point from the actual merging point. Sensor-enabled cars allow us to decide where and when a car merges before it arrives at the actual merging point. This leads to a significant improvement in traffic flow as velocities can be adjusted appropriately. We compare proactive merging algorithms against the conventional priority-based merging algorithm in a controlled simulation environment. Experimental results show that proactive merging algorithms outperform the priority-based merging algorithm in terms of flow and delay. / More importantly, the imprecise information (errors in sensor measurements) is a major challenge for merging algorithms, because inaccuracies can potentially lead to unsafe merging behaviors. In this thesis, we investigate how the accuracy of sensors impacts merging algorithms, and design robust merging algorithms that tolerate sensor errors. Experimental results show that one of our proposed merging algorithms, which is based on the theory of time geography, is able to guarantee safe merging while tolerating two to four times more imprecise positioning information, and can double the road capacity and increase the traffic flow by 25%.
7

Design of a Fast Location-Based Handoff Scheme for Vehicular Networks

Wang, Yikun January 2013 (has links)
IEEE 802.11 is an economical and efficient standard that has been applied to vehicular networks. However, the long handoff latency of the standard handoff scheme for IEEE 802.11 has become an important issue for seamless roaming in vehicular environments, as more handoffs may be triggered due to the higher mobility of vehicles. This thesis presents a new and fast location-based handoff scheme particularly designed for vehicular environments. With the position and movement direction of a vehicle and the locations of the surrounding APs, our protocol is able to accurately predict several possible APs that the vehicle may visit in the future and to assign these APs different priority levels. APs on higher priority levels will be first scanned. Once a response to scanning from an AP is received, the scanning process ends immediately. A blacklist scheme is also used to exclude those APs that showed no response to the scanning during previous handoffs. Thus, time spent on scanning APs is supposed to be significantly reduced. The simulation results show that the proposed scheme attains not only a lower prediction error rate, but also a lower MAC layer handoff latency, and that it has a smaller influence on jitter and throughput; moreover, these results show that the proposed scheme has a smaller total number of handoffs than other handoff schemes.
8

Fast Layer-3 handover in Vehicular Networks

Alvi, Ahmad Naseem, Babakhanyan, Tsovinar January 2009 (has links)
<p>Wireless communication is of great importance for safety and entertainment purposes in vehicular networks. Vehicles on roads are required to share sensor data, road traffic information or digital maps with other vehicles on the road. To be able to do this, vehicles require to either communicate directly with each other or to be connected to a wireless communication-based access points on the road side. These wireless access points support short to medium range wireless communication through the protocol 802.11p. 802.11p is designed specifically for vehicular communication and it is an amended form of the widely used 802.11 protocol suit for wireless local area networks (WLAN). Vehicles are able to be associated with these wireless access points for exchange of information. While vehicles move along the road infrastructure, they change their point of attachment from one wireless access point to another wireless access point. During this process, connectivity to the access point breaks down until the vehicle is connected to a new access point in its area. This disconnection causes an interruption in the data flow. This interruption increases when vehicle requires a new IP address, i.e. when the vehicle is going to attach to an access point which is part of another network. In this thesis report, we give an overview of standard handover methods and their enhancements and propose a fast handover scheme for layer 3 of the communication stack. Based on the assumption that vehicles know their route in advance, we enhance the handover process and improve seamless connectivity. We also discuss different issues which are the cause of delay and how they can be overcome in our proposed solution.</p>
9

Video Streaming and Multimedia Broadcasting Over Vehicular Ad Hoc Networks

Naeimipoor, Farahnaz 30 January 2013 (has links)
Video dissemination capabilities are crucial for the deployment of many services over VANETs. These services range from enhancing safety via the dissemination of video from the scene of an accident, to advertisement of local services or businesses. This work considers the infrastructure-less scenario of VANETs and dissemination of video content over this network environment, which is extremely challenging mainly due to its dynamic topology and stringent requirements for video streaming. This study discusses issues and challenges that need to be tackled for disseminating high-quality video over VANETs. Furthermore it surveys and analyzes the suitability of different existing solutions aimed towards effective and efficient techniques for video dissemination in vehicular networks. As a result, a set of the most promising techniques are selected, described in detail and evaluated based on standard terms in quality of service. This thesis also discusses efficiency and suitability of these techniques for video dissemination and compares their performance over the same network condition. In addition, a detailed study on the effect of network coding on video dissemination protocols has been conducted to guide how to employ this technique properly for video streaming over VANETs. From this study, a summary of the observations was obtained and used to design a new hybrid solution by deploying robust and efficient techniques in number of existing protocols in an optimal manner. The proposed hybrid video dissemination protocol outperforms other protocols in term of delivery ratio and complies with other quality-of-service requirements for video broadcasting over vehicular environments.
10

Fast Layer-3 handover in Vehicular Networks

Alvi, Ahmad Naseem, Babakhanyan, Tsovinar January 2009 (has links)
Wireless communication is of great importance for safety and entertainment purposes in vehicular networks. Vehicles on roads are required to share sensor data, road traffic information or digital maps with other vehicles on the road. To be able to do this, vehicles require to either communicate directly with each other or to be connected to a wireless communication-based access points on the road side. These wireless access points support short to medium range wireless communication through the protocol 802.11p. 802.11p is designed specifically for vehicular communication and it is an amended form of the widely used 802.11 protocol suit for wireless local area networks (WLAN). Vehicles are able to be associated with these wireless access points for exchange of information. While vehicles move along the road infrastructure, they change their point of attachment from one wireless access point to another wireless access point. During this process, connectivity to the access point breaks down until the vehicle is connected to a new access point in its area. This disconnection causes an interruption in the data flow. This interruption increases when vehicle requires a new IP address, i.e. when the vehicle is going to attach to an access point which is part of another network. In this thesis report, we give an overview of standard handover methods and their enhancements and propose a fast handover scheme for layer 3 of the communication stack. Based on the assumption that vehicles know their route in advance, we enhance the handover process and improve seamless connectivity. We also discuss different issues which are the cause of delay and how they can be overcome in our proposed solution.

Page generated in 0.0854 seconds