• Title/Summary/Keyword: Mobility Simulation

Search Result 814, Processing Time 0.025 seconds

A Study on Voice Communication Quality Criteria Under Mobile-VoIP Environments

  • Choi, Jae-Hun;Seol, Soon-Uk;Chang, Joon-Hyuk
    • The Journal of the Acoustical Society of Korea
    • /
    • v.28 no.2E
    • /
    • pp.35-42
    • /
    • 2009
  • In this paper, we present criteria of objective measurement of speech quality to provide the mobile-VoIP services efficiently over wireless mobile internet. The mobile-VoIP service, which is based on mobility and is error-prone compared to conventional VoIP over wired network, is about to be launched, but there have not been adequate quality indexes and the Quality of Service (QoS) standards for evaluating speech quality of Mobile-VoIP. In addition, there are many factors influencing on the speech quality in packet network of which packet loss contribute directly to the overall voice communication quality. For this reason, we adopt the Gilbert-Elliot Channel Model for modeling packet network based on IP and assess the voice quality through the objective speech method of ITU-T P. 862 PESQ and ITU-T P. 862.1 MOS-LQO under various packet loss rates in the transmission channel environments. Our simulation results address the specific criteria and QoS for the mobile-VoIP services in terms of the various packet loss environments.

Quantum Modeling of Nanoscale Symmetric Double-Gate InAlAs/InGaAs/InP HEMT

  • Verma, Neha;Gupta, Mridula;Gupta, R.S.;Jogi, Jyotika
    • JSTS:Journal of Semiconductor Technology and Science
    • /
    • v.13 no.4
    • /
    • pp.342-354
    • /
    • 2013
  • The aim of this work is to investigate and study the quantum effects in the modeling of nanoscale symmetric double-gate InAlAs/InGaAs/InP HEMT (High Electron Mobility Transistor). In order to do so, the carrier concentration in InGaAs channel at gate lengths ($L_g$) 100 nm and 50 nm, are modelled by a density gradient model or quantum moments model. The simulated results obtained from the quantum moments model are compared with the available experimental results to show the accuracy and also with a semi-classical model to show the need for quantum modeling. Quantum modeling shows major variation in electron concentration profiles and affects the device characteristics. The two triangular quantum wells predicted by the semi-classical model seem to vanish in the quantum model as bulk inversion takes place. The quantum effects thus become essential to incorporate in nanoscale heterostructure device modeling.

A Localization Scheme Using Mobile Robot in Wireless Sensor Networks (무선 센서 네트워크에서 이동성 로봇을 이용한 센서 위치 인식 기법에 관한 연구)

  • Kim, Woo-Hyun
    • Journal of the Korean Society of Industry Convergence
    • /
    • v.10 no.2
    • /
    • pp.105-113
    • /
    • 2007
  • Accurate and low-cost sensor localization is a critical requirement for the deployment of wireless sensor networks in a wide variety of application. Sensor position is used for its data to be meaningful and for energy efficient data routing algorithm especially geographic routing. The previous works for sensor localization utilize global positioning system(GPS) or estimate unknown-location nodes position with help of some small reference nodes which know their position previously. However, the traditional localization techniques are not well suited in the senor network for the cost of sensors is too high. In this paper, we propose the sensor localization method with a mobile robot, which knows its position, moves through the sensing field along pre-scheduled path and gives position information to the unknown-location nodes through wireless channel to estimate their position. We suggest using the sensor position estimation method and an efficient mobility path model. To validate our method, we carried out a computer simulation, and observed that our technique achieved sensor localization more accurately and efficiently than the conventional one.

  • PDF

Lightweight Acknowledgement-Based Method to Detect Misbehavior in MANETs

  • Heydari, Vahid;Yoo, Seong-Moo
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.9 no.12
    • /
    • pp.5150-5169
    • /
    • 2015
  • Mobile Ad hoc NETworks (MANETs) are the best choice when mobility, scalability, and decentralized network infrastructure are needed. Because of critical mission applications of MANETs, network security is the vital requirement. Most routing protocols in MANETs assume that every node in the network is trustworthy. However, due to the open medium, the wide distribution, and the lack of nodes' physical protection, attackers can easily compromise MANETs by inserting misbehaving nodes into the network that make blackhole attacks. Previous research to detect the misbehaving nodes in MANETs used the overhearing methods, or additional ACKnowledgement (ACK) packets to confirm the reception of data packets. In this paper a special lightweight acknowledgement-based method is developed that, contrary to existing methods, it uses ACK packets of MAC layer instead of adding new ACK packets to the network layer for confirmations. In fact, this novel method, named PIGACK, uses ACK packets of MAC 802.11 to piggyback confirmations from a receiver to a sender in the same transmission duration that the sender sends a data packet to the receiver. Analytical and simulation results show that the proposed method considerably decreases the network overhead and increases the packet delivery ratio compared to the well-known method (2ACK).

A Prediction-based Energy-conserving Approximate Storage and Query Processing Schema in Object-Tracking Sensor Networks

  • Xie, Yi;Xiao, Weidong;Tang, Daquan;Tang, Jiuyang;Tang, Guoming
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.5 no.5
    • /
    • pp.909-937
    • /
    • 2011
  • Energy efficiency is one of the most critical issues in the design of wireless sensor networks. In object-tracking sensor networks, the data storage and query processing should be energy-conserving by decreasing the message complexity. In this paper, a Prediction-based Energy-conserving Approximate StoragE schema (P-EASE) is proposed, which can reduce the query error of EASE by changing its approximate area and adopting predicting model without increasing the cost. In addition, focusing on reducing the unnecessary querying messages, P-EASE enables an optimal query algorithm to taking into consideration to query the proper storage node, i.e., the nearer storage node of the centric storage node and local storage node. The theoretical analysis illuminates the correctness and efficiency of the P-EASE. Simulation experiments are conducted under semi-random walk and random waypoint mobility. Compared to EASE, P-EASE performs better at the query error, message complexity, total energy consumption and hotspot energy consumption. Results have shown that P-EASE is more energy-conserving and has higher location precision than EASE.

A Study on Dynamic Modeling for Underwater Tracked Vehicle (트랙기반 수중건설로봇의 운동 모델링에 관한 연구)

  • Choi, Dong-Ho;Lee, Young-Jin;Hong, Sung-Min;Vu, Mai The;Choi, Hyeung-Sik;Kim, Joon-Young
    • Journal of Ocean Engineering and Technology
    • /
    • v.29 no.5
    • /
    • pp.386-391
    • /
    • 2015
  • The mobility of tracked vehicles is mainly influenced by the interaction between the tracks and soil. When the track of a tracked vehicle rotates, there will be a slip effect between the track and the soil, which creates a track shear force and the vehicle’s driving force. In this paper, the modeling of a working tool such as a trenching cutter and a tracked vehicle that is the lower frame of a track-based operating robot was performed. In addition, a numerical simulation was executed to verify the performance of the design objectives and the motion characteristics of the combined system.

(Performance Evaluation of Proxy-based Mobile Agent Model for Hierarchical Management Domains) (계층형 관리 도메인을 위한 프록시 기반의 이동 에이전트 모델의 성능 평가)

  • 박상윤
    • Journal of the Korea Computer Industry Society
    • /
    • v.3 no.8
    • /
    • pp.1049-1062
    • /
    • 2002
  • As the distributed resources in the networks have become increasingly popular, the accesses to these resources having been activated. Especially, the accesses to the distributed resources using the mobile agent technologies provide the mechanisms supporting mobility with mobile users as well as the dynamic accesses to the resources in the fixed networks. Proxy-based mobile agent model is defined as mobile agent network model which allocates the hierarchical domains to the distributed resources changed dynamically, assigns one proxy server for each domain, and promotes the management and the cooperation of the mobile agents. In this paper, we introduce the architecture and the execution scenario for proxy-based mobile agent model which is suitable for the hierarchical management domains. In simulation, we evaluate the proxy server's route optimization functionality and the performance reducing execution time of the mobile agents.

  • PDF

A Connection Entropy-based Multi-Rate Routing Protocol for Mobile Ad Hoc Networks

  • Hieu, Cao Trong;Hong, Choong-Seon
    • Journal of Computing Science and Engineering
    • /
    • v.4 no.3
    • /
    • pp.225-239
    • /
    • 2010
  • This paper introduces a new approach to modeling relative distance among nodes under a variety of communication rates, due to node's mobility in Mobile Ad-hoc Networks (MANETs). When mobile nodes move to another location, the relative distance of communicating nodes will directly affect the data rate of transmission. The larger the distance between two communicating nodes is, the lower the rate that they can use for transferring data will be. The connection certainty of a link also changes because a node may move closer to or farther away out of the communication range of other nodes. Therefore, the stability of a route is related to connection entropy. Taking into account these issues, this paper proposes a new routing metric for MANETs. The new metric considers both link weight and route stability based on connection entropy. The problem of determining the best route is subsequently formulated as the minimization of an object function formed as a linear combination of the link weight and the connection uncertainty of that link. The simulation results show that the proposed routing metric improves end-to-end throughput and reduces the percentage of link breakages and route reparations.

A study on helper node selection mechanisms in cooperative communications (협력통신에서 도움노드 선정방법에 대한 비교연구)

  • Jang, Jae-Shin
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.16 no.7
    • /
    • pp.1397-1405
    • /
    • 2012
  • Cooperative communications play a important role in increasing frame transmission rate at wireless communication networks where frequency resource is strictly limited. In this paper, we did a research on how to select the helper nodes that are very import in cooperative communications. As a prelude study in this research field, we carried out performance comparison of three helper node selection schemes using computer simulation. The system throughput was used as the performance measure and the random way point mobility model, where every communicating nodes move around within the designated communication range, was used.

CACH Distributed Clustering Protocol Based on Context-aware (CACH에 의한 상황인식 기반의 분산 클러스터링 기법)

  • Mun, Chang-Min;Lee, Kang-Whan
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.13 no.6
    • /
    • pp.1222-1227
    • /
    • 2009
  • In this paper, we proposed a new method, the CACH(Context-aware Clustering Hierarchy) algorithm in Mobile Ad-hoc Network(MANET) systems. The proposed CACH algorithm based on hybrid and clustering protocol that provide the reliable monitoring and control of a variety of environments for remote place. To improve the routing protocol in MANET, energy efficient routing protocol would be required as well as considering the mobility would be needed. The proposed analysis could help in defining the optimum depth of hierarchy architecture CACH utilize. Also, the proposed CACH could be used localized condition to enable adaptation and robustness for dynamic network topology protocol and this provide that our hierarchy to be resilient. As a result, our simulation results would show that a new method for CACH could find energy efficient depth of hierarchy of a cluster.