WorldWideScience

Sample records for broadcast mobile ad

  1. Energy Efficient Probabilistic Broadcasting for Mobile Ad-Hoc Network

    Science.gov (United States)

    Kumar, Sumit; Mehfuz, Shabana

    2017-06-01

    In mobile ad-hoc network (MANETs) flooding method is used for broadcasting route request (RREQ) packet from one node to another node for route discovery. This is the simplest method of broadcasting of RREQ packets but it often results in broadcast storm problem, originating collisions and congestion of packets in the network. A probabilistic broadcasting is one of the widely used broadcasting scheme for route discovery in MANETs and provides solution for broadcasting storm problem. But it does not consider limited energy of the battery of the nodes. In this paper, a new energy efficient probabilistic broadcasting (EEPB) is proposed in which probability of broadcasting RREQs is calculated with respect to remaining energy of nodes. The analysis of simulation results clearly indicate that an EEPB route discovery scheme in ad-hoc on demand distance vector (AODV) can increase the network lifetime with a decrease in the average power consumption and RREQ packet overhead. It also decreases the number of dropped packets in the network, in comparison to other EEPB schemes like energy constraint gossip (ECG), energy aware gossip (EAG), energy based gossip (EBG) and network lifetime through energy efficient broadcast gossip (NEBG).

  2. Intelligent Broadcasting in Mobile Ad Hoc Networks: Three Classes of Adaptive Protocols

    Directory of Open Access Journals (Sweden)

    Michael D. Colagrosso

    2006-11-01

    Full Text Available Because adaptability greatly improves the performance of a broadcast protocol, we identify three ways in which machine learning can be applied to broadcasting in a mobile ad hoc network (MANET. We chose broadcasting because it functions as a foundation of MANET communication. Unicast, multicast, and geocast protocols utilize broadcasting as a building block, providing important control and route establishment functionality. Therefore, any improvements to the process of broadcasting can be immediately realized by higher-level MANET functionality and applications. While efficient broadcast protocols have been proposed, no single broadcasting protocol works well in all possible MANET conditions. Furthermore, protocols tend to fail catastrophically in severe network environments. Our three classes of adaptive protocols are pure machine learning, intra-protocol learning, and inter-protocol learning. In the pure machine learning approach, we exhibit a new approach to the design of a broadcast protocol: the decision of whether to rebroadcast a packet is cast as a classification problem. Each mobile node (MN builds a classifier and trains it on data collected from the network environment. Using intra-protocol learning, each MN consults a simple machine model for the optimal value of one of its free parameters. Lastly, in inter-protocol learning, MNs learn to switch between different broadcasting protocols based on network conditions. For each class of learning method, we create a prototypical protocol and examine its performance in simulation.

  3. Intelligent Broadcasting in Mobile Ad Hoc Networks: Three Classes of Adaptive Protocols

    Directory of Open Access Journals (Sweden)

    Colagrosso Michael D

    2007-01-01

    Full Text Available Because adaptability greatly improves the performance of a broadcast protocol, we identify three ways in which machine learning can be applied to broadcasting in a mobile ad hoc network (MANET. We chose broadcasting because it functions as a foundation of MANET communication. Unicast, multicast, and geocast protocols utilize broadcasting as a building block, providing important control and route establishment functionality. Therefore, any improvements to the process of broadcasting can be immediately realized by higher-level MANET functionality and applications. While efficient broadcast protocols have been proposed, no single broadcasting protocol works well in all possible MANET conditions. Furthermore, protocols tend to fail catastrophically in severe network environments. Our three classes of adaptive protocols are pure machine learning, intra-protocol learning, and inter-protocol learning. In the pure machine learning approach, we exhibit a new approach to the design of a broadcast protocol: the decision of whether to rebroadcast a packet is cast as a classification problem. Each mobile node (MN builds a classifier and trains it on data collected from the network environment. Using intra-protocol learning, each MN consults a simple machine model for the optimal value of one of its free parameters. Lastly, in inter-protocol learning, MNs learn to switch between different broadcasting protocols based on network conditions. For each class of learning method, we create a prototypical protocol and examine its performance in simulation.

  4. Broadcast scheduling for mobile advertising

    OpenAIRE

    De Reyck, B.; Degraeve, Z.

    2003-01-01

    We describe a broadcast scheduling system developed for a precision marketing firm specialized in location-sensitive permission-based mobile advertising using SMS (Short Message Service) text messaging. Text messages containing advertisements were sent to registered customers when they were shopping in one of two shopping centers in the vicinity of London. The ads typically contained a limited-time promotional offer. The company's problem was deciding which ads to send out to which customers ...

  5. Broadcast Expenses Controlling Techniques in Mobile Ad-hoc Networks: A Survey

    Directory of Open Access Journals (Sweden)

    Naeem Ahmad

    2016-07-01

    Full Text Available The blind flooding of query packets in route discovery more often characterizes the broadcast storm problem, exponentially increases energy consumption of intermediate nodes and congests the entire network. In such a congested network, the task of establishing the path between resources may become very complex and unwieldy. An extensive research work has been done in this area to improve the route discovery phase of routing protocols by reducing broadcast expenses. The purpose of this study is to provide a comparative analysis of existing broadcasting techniques for the route discovery phase, in order to bring about an efficient broadcasting technique for determining the route with minimum conveying nodes in ad-hoc networks. The study is designed to highlight the collective merits and demerits of such broadcasting techniques along with certain conclusions that would contribute to the choice of broadcasting techniques.

  6. Seamless Mobile Multimedia Broadcasting Using Adaptive Error Recovery

    Directory of Open Access Journals (Sweden)

    Carlos M. Lentisco

    2017-01-01

    Full Text Available Multimedia services over mobile networks present several challenges, such as ensuring a reliable delivery of multimedia content, avoiding undesired service disruptions, or reducing service latency. HTTP adaptive streaming addresses these problems for multimedia unicast services, but it is not efficient from the point of view of radio resource consumption. In Long-Term Evolution (LTE networks, multimedia broadcast services are provided over a common radio channel using a combination of forward error correction and unicast error recovery techniques at the application level. This paper discusses how to avoid service disruptions and reduce service latency for LTE multimedia broadcast services by adding dynamic adaptation capabilities to the unicast error recovery process. The proposed solution provides a seamless mobile multimedia broadcasting without compromising the quality of the service perceived by the users.

  7. Broadcast design in cognitive radio ad hoc networks

    CERN Document Server

    Song, Yi

    2014-01-01

    This SpringerBrief investigates the special challenges of broadcast design in cognitive radio (CR) ad hoc networks. It introduces two broadcast protocols in CR ad hoc networks: a quality-of-service based broadcast protocol under blind information and a fully-distributed broadcast protocol with collision avoidance. A novel unified analytical model is also presented to analyze the performance of the broadcast protocols. This is the first book dedicated to the unique broadcast design challenges in CR ad hoc networks. The authors also discuss the recent research on the performance analysis of broa

  8. Selective epidemic broadcast algorithm to suppress broadcast storm in vehicular ad hoc networks

    Directory of Open Access Journals (Sweden)

    M. Chitra

    2018-03-01

    Full Text Available Broadcasting in Vehicular Ad Hoc Networks is the best way to spread emergency messages all over the network. With the dynamic nature of vehicular ad hoc networks, simple broadcast or flooding faces the problem called as Broadcast Storm Problem (BSP. The issue of the BSP will degrade the performance of a message broadcasting process like increased overhead, collision and dissemination delay. The paper is motivated to solve the problems in the existing Broadcast Strom Suppression Algorithms (BSSAs like p-Persistence, TLO, VSPB, G-SAB and SIR. This paper proposes to suppress the Broadcast Storm Problem and to improve the Emergency Safety message dissemination rate through a new BSSA based on Selective Epidemic Broadcast Algorithm (SEB. The simulation results clearly show that the SEB outperforms the existing algorithms in terms of ESM Delivery Ratio, Message Overhead, Collision Ratio, Broadcast Storm Ratio and Redundant Rebroadcast Ratio with decreased Dissemination Delay.

  9. Minimizing Broadcast Expenses in Clustered Ad-hoc Networks

    Directory of Open Access Journals (Sweden)

    S. Zeeshan Hussain

    2018-01-01

    Full Text Available One way to minimize the broadcast expenses of routing protocols is to cluster the network. In clustered ad-hoc networks, all resources can be managed easily by resolving scalability issues. However, blind query broadcast is a major issue that leads to the broadcast storm problem in clustered ad-hoc networks. This query broadcast is done to carry out the route-search task that leads to the unnecessary propagation of route-query even after route has been found. Hence, this query propagation poses the problem of congestion in the network. In particular this motivates us to propose a query-control technique in such networks which works based on broadcast repealing. A huge amount of work has been devoted to propose the query control broadcasting techniques. However, such techniques used in traditional broadcasting mechanisms need to be properly extended for use in the cluster based routing architecture. In this paper, query-control technique is proposed for cluster based routing technique to reduce the broadcast expenses. Finally, we report some experiments which compare the proposed technique to other commonly used techniques including standard one-class AODV that follows TTL-sequence based broadcasting technique.

  10. Clustering of Mobile Ad Hoc Networks: An Adaptive Broadcast Period Approach

    OpenAIRE

    Gavalas, Damianos; Pantziou, Grammati; Konstantopoulos, Charalampos; Mamalis, Basilis

    2011-01-01

    Organization, scalability and routing have been identified as key problems hindering viability and commercial success of mobile ad hoc networks. Clustering of mobile nodes among separate domains has been proposed as an efficient approach to address those issues. In this work, we introduce an efficient distributed clustering algorithm that uses both location and energy metrics for cluster formation. Our proposed solution mainly addresses cluster stability, manageability and energy efficiency i...

  11. Hierarchical Broadcasting in the Future Mobile Internet

    NARCIS (Netherlands)

    Hesselman, C.E.W.; Eertink, E.H.; Fernandez, Milagros; Crnkovic, Ivica; Fohler, Gerhard; Griwodz, Carsten; Plagemann, Thomas; Gruenbacher, Paul

    2002-01-01

    We describe an architecture for the hierarchical distribution of multimedia broadcasts in the future mobile Internet. The architecture supports network as well as application-layer mobility solutions, and uses stream control functions that are influenced by available network resources, user-defined

  12. EBAA: An efficient broadcast authentication scheme for ADS-B communication based on IBS-MR

    Directory of Open Access Journals (Sweden)

    Yang Haomiao

    2014-06-01

    Full Text Available Automatic dependent surveillance-broadcast (ADS-B systems can broadcast satellite-based aircraft position, identification, etc., periodically, and are now on track to replace radar to become the backbone of next-generation air traffic management (ATM systems. However, ADS-B systems suffer severe cyber-security problems due to the broadcast-type data link and the lack of designed-in security measures. Especially, since ADS-B messages are unauthenticated, it is easy to insert fake aircraft into a system via spoofing or insertion of false messages. Unfortunately, the authentication for ADS-B messages has not yet been well studied. In this paper, based on identity-based signature with message recovery (IBS-MR, an efficient broadcast authentication scheme for ADS-B messages is proposed. The security analysis demonstrates that the scheme can achieve authenticity and integrity of ADS-B broadcast messages, as well as adaptive evolution of broadcasters’ private keys. The performance evaluation shows that the scheme is computationally efficient for typical avionics devices with limited resources. Furthermore, the scheme achieves low communication overhead since broadcast messages can be recovered from signatures, and thus it is suitable for low-bandwidth ADS-B data link.

  13. Adaptive Probabilistic Broadcasting over Dense Wireless Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    Victor Gau

    2010-01-01

    Full Text Available We propose an idle probability-based broadcasting method, iPro, which employs an adaptive probabilistic mechanism to improve performance of data broadcasting over dense wireless ad hoc networks. In multisource one-hop broadcast scenarios, the modeling and simulation results of the proposed iPro are shown to significantly outperform the standard IEEE 802.11 under saturated condition. Moreover, the results also show that without estimating the number of competing nodes and changing the contention window size, the performance of the proposed iPro can still approach the theoretical bound. We further apply iPro to multihop broadcasting scenarios, and the experiment results show that within the same elapsed time after the broadcasting, the proposed iPro has significantly higher Packet-Delivery Ratios (PDR than traditional methods.

  14. Restricted broadcast process theory

    NARCIS (Netherlands)

    F. Ghassemi; W.J. Fokkink (Wan); A. Movaghar; A. Cerone; S. Gruner

    2008-01-01

    htmlabstractWe present a process algebra for modeling and reasoning about Mobile Ad hoc Networks (MANETs) and their protocols. In our algebra we model the essential modeling concepts of ad hoc networks, i.e. local broadcast, connectivity of nodes and connectivity changes. Connectivity and

  15. On the analysis of human mobility model for content broadcasting in 5G networks

    KAUST Repository

    Lau, Chun Pong

    2018-02-15

    Today\\'s mobile service providers aim at ensuring end-to-end performance guarantees. Hence, ensuring an efficient content delivery to end users is highly required. Currently, transmitting popular contents in modern mobile networks rely on unicast transmission. This result into a huge underutilization of the wireless bandwidth. The urban scale mobility of users is beneficial for mobile networks to allocate radio resources spatially and temporally for broadcasting contents. In this paper, we conduct a comprehensive analysis on a human activity/mobility model and the content broadcasting system in 5G mobile networks. The objective of this work is to describe how human daily activities could improve the content broadcasting efficiency. We achieve the objective by analyzing the transition probabilities of a user traveling over several places according to the change of states of daily human activities. Using a reallife simulation, we demonstrate the relationship between the human mobility and the optimization objective of the content broadcasting system.

  16. System optimization for peer-to-peer multi hop video broadcasting in wireless ad hoc networks

    NARCIS (Netherlands)

    Dedeoglu, V.; Atici, C.; Salman, F.S.; Sunay, M.O.

    2008-01-01

    We consider peer-to-peer video broadcasting using cooperation among peers in an ad hoc wireless network. As opposed to the traditional single hop broadcasting, multiple hops cause an increase in broadcast video quality while creating interference and increasing transmission delay. We develop

  17. DVB-H vs. DVB-NGH: A survey and comparison for the evolution of mobile TV broadcasting

    CSIR Research Space (South Africa)

    Bembe, M

    2015-07-01

    Full Text Available DVB-NGH (Digital Video Broadcasting-Next Generation Handheld) is the next generation technology for mobile TV broadcasting. It integrates both satellite and terrestrial techniques, which is vital in supporting rich media content for mobile handheld...

  18. Integrated data lookup and replication scheme in mobile ad hoc networks

    Science.gov (United States)

    Chen, Kai; Nahrstedt, Klara

    2001-11-01

    Accessing remote data is a challenging task in mobile ad hoc networks. Two problems have to be solved: (1) how to learn about available data in the network; and (2) how to access desired data even when the original copy of the data is unreachable. In this paper, we develop an integrated data lookup and replication scheme to solve these problems. In our scheme, a group of mobile nodes collectively host a set of data to improve data accessibility for all members of the group. They exchange data availability information by broadcasting advertising (ad) messages to the group using an adaptive sending rate policy. The ad messages are used by other nodes to derive a local data lookup table, and to reduce data redundancy within a connected group. Our data replication scheme predicts group partitioning based on each node's current location and movement patterns, and replicates data to other partitions before partitioning occurs. Our simulations show that data availability information can quickly propagate throughout the network, and that the successful data access ratio of each node is significantly improved.

  19. Energy-efficient algorithm for broadcasting in ad hoc wireless sensor networks.

    Science.gov (United States)

    Xiong, Naixue; Huang, Xingbo; Cheng, Hongju; Wan, Zheng

    2013-04-12

    Broadcasting is a common and basic operation used to support various network protocols in wireless networks. To achieve energy-efficient broadcasting is especially important for ad hoc wireless sensor networks because sensors are generally powered by batteries with limited lifetimes. Energy consumption for broadcast operations can be reduced by minimizing the number of relay nodes based on the observation that data transmission processes consume more energy than data reception processes in the sensor nodes, and how to improve the network lifetime is always an interesting issue in sensor network research. The minimum-energy broadcast problem is then equivalent to the problem of finding the minimum Connected Dominating Set (CDS) for a connected graph that is proved NP-complete. In this paper, we introduce an Efficient Minimum CDS algorithm (EMCDS) with help of a proposed ordered sequence list. EMCDS does not concern itself with node energy and broadcast operations might fail if relay nodes are out of energy. Next we have proposed a Minimum Energy-consumption Broadcast Scheme (MEBS) with a modified version of EMCDS, and aimed at providing an efficient scheduling scheme with maximized network lifetime. The simulation results show that the proposed EMCDS algorithm can find smaller CDS compared with related works, and the MEBS can help to increase the network lifetime by efficiently balancing energy among nodes in the networks.

  20. Performance Analysis of Reuse Distance in Cooperative Broadcasting

    Directory of Open Access Journals (Sweden)

    Jimmi Grönkvist

    2016-01-01

    Full Text Available Cooperative broadcasting is a promising technique for robust broadcast with low overhead and delay in mobile ad hoc networks. The technique is attractive for mission-oriented mobile communication, where a majority of the traffic is of broadcast nature. In cooperative broadcasting, all nodes simultaneously retransmit packets. The receiver utilizes cooperative diversity in the simultaneously received signals. The retransmissions continue until all nodes are reached. After the packet has traveled a specific number of hops out from the source, denoted as reuse distance, the source node transmits a new broadcast packet in the time slot used for the previous broadcast packet. If the reuse distance is too small, interference causes packet loss in intermediate nodes. In the literature, a reuse distance of three is common. With an analysis based on a realistic interference model and real terrain data, we show that a reuse distance of at least four is necessary to avoid packet loss in sparsely connected networks, especially for high spectral efficiencies. For frequency hopping, widely used in military systems, we propose a novel method. This method almost eliminates interference for a reuse distance of three, increasing the throughput by 33% compared to systems with a reuse distance of four.

  1. Bluetooth broadcasting

    OpenAIRE

    Ho, Johan

    2006-01-01

    Background: The wireless technology Bluetooth has rapidly become more commonly supported by electronic devices like mobile phones and PDAs. Several companies are currently developing Bluetooth broadcasting systems to use for marketing. This report is a result of researching the use of Bluetooth broadcasting for delivering information for more general purposes, how well Bluetooth actually works for broadcasting, and also on the topic of user privacy. Results: Broadcasting with Bluetooth did w...

  2. Broadcast Scheduling Strategy Based on the Priority of Real.Time Data in a Mobile Environment

    Institute of Scientific and Technical Information of China (English)

    YangJin-cait; LiuYun-sheng

    2003-01-01

    Data broadcast is an important data dissemination approach in mobile environment. On broadcast channel,scalability and efficiency of data transmission are satisfied. In a mobile environment, there exists a kind of real-time database application in which both the transactions and data can have their timing constraints and priorities of different levels.In order to meet the requirement of real-time data disseminaring and retrieving, a broadcast scheduling strategy HPF-ED F (Highest Priority First with Earlier Deadline and Frequency) is proposed under the BoD (Broadcast on Demand) model. Using the strategy, data items are scheduled according to their priority the transaction imposed on them or system set for them. The strategy also considers other characteristics of data items such as deadline and popularity of data. The extensive simulation experiments have been conducted to evaluate the performance of the proposed algorithm. Results show that it can achieve excellent performance compared with existing strategies.

  3. Broadcast Scheduling Strategy Based on the Priority of Real- Time Data in a Mobile Environment

    Institute of Scientific and Technical Information of China (English)

    Yang Jin-cai; Liu Yun-sheng

    2003-01-01

    Data broadcast is an important data dissemina-tion approach in mobile environment. On broadcast channel,scalability and efficiency of data transmission are satisfied. In a mobile environment, there exists a kind of real-time data-base application in which both the transactions and data can have their timing constraints and priorities of different levels.In order to meet the requirement of real-time data dissemina-ting and retrieving, a broadcast scheduling strategy HPF-ED F(Highest Priority First with Earlier Deadline and Frequen-cy) is proposed under the BoD (Broadcast on Demand) mod-el. Using the strategy, data items are scheduled according to their priority the transaction imposed on them or system set for them. The strategy also considers other characteristics ofdata items such as deadline and popularity of data. The exten-sive simulation experiments have been conducted to evaluate the performance of the proposed algorithm. Results show that it can achieve excellent performance compared with existing strategies.

  4. Energy-Aware Broadcasting and Multicasting in Wireless Ad Hoc Networks: A Cross-Layering Approach

    National Research Council Canada - National Science Library

    Wieselthier, Jeffrey E; Nguyen, Gam D; Ephremides, Anthony

    2004-01-01

    ...) problems, especially when energy-aware operation is required. To address the specific problem of energy-aware tree construction in wireless ad hoc networks, we have developed the Broadcast Incremental Power (BIP...

  5. Mobile ad hoc networking

    CERN Document Server

    John Wiley & Sons

    2004-01-01

    "Assimilating the most up-to-date information on research and development activities in this rapidly growing area, Mobile Ad Hoc Networking covers physical, data link, network, and transport layers, as well as application, security, simulation, and power management issues in sensor, local area, personal, and mobile ad hoc networks. Each of the book's sixteen chapters has been written by a top expert and discusses in-depth the most important topics in the field. Mobile Ad Hoc Networking is an excellent reference and guide for professionals seeking an in-depth examination of topics that also provides a comprehensive overview of the current state-of-the-art."--Jacket.

  6. Security and Hyper-accurate Positioning Monitoring with Automatic Dependent Surveillance-Broadcast (ADS-B), Phase I

    Data.gov (United States)

    National Aeronautics and Space Administration — Lightning Ridge Technologies, working in collaboration with The Innovation Laboratory, Inc., extend Automatic Dependent Surveillance Broadcast (ADS-B) into a safe,...

  7. Security and Hyper-accurate Positioning Monitoring with Automatic Dependent Surveillance-Broadcast (ADS-B), Phase II

    Data.gov (United States)

    National Aeronautics and Space Administration — Lightning Ridge Technologies, LLC, working in collaboration with The Innovation Laboratory, Inc., extend Automatic Dependent Surveillance -- Broadcast (ADS-B) into a...

  8. A Mobility-aware Broadcasting Infrastructure for a Wireless Internet with Hotspots

    NARCIS (Netherlands)

    Hesselman, C.E.W.; Eertink, Henk; Eertink, E.H.; Widya, I.A.; Huizer, E.; Kermani, P.

    In this paper, we consider the problem of adaptively delivering live multimedia broadcasts (e.g., for applications such as TV, radio, or e-cinema) to a potentially large number of mobile hosts that roam about in a wireless internet with hotspots. We take a user-oriented approach based on an

  9. Cell broadcast trials in The Netherlands: Using mobile phone technology for citizens' alarming

    International Nuclear Information System (INIS)

    Jagtman, H.M.

    2010-01-01

    In emergency situations authorities need to warn the public. The conventionally used method for warning citizens in The Netherlands is the use of a siren. Modern telecommunication technologies, especially the use of text-based features of mobile phones, have great potential for warning the public. In the years 2005-2007 cell broadcast was tested during several large-scale field trials with citizens in The Netherlands. One of the questions was to determine the penetration of cell broadcast for citizens' alarming. This article argues that the definition of penetration in the light of warning citizens in case of emergencies should include the citizens' responses to warning messages. In addition, the approach to determining the penetration, the data and validity issues regarding these data is discussed. The trials have shown cell broadcast has potential to become an effective citizens' alarming technology. This however requires the entire technological and organisational chain of the warning system to function correctly. Attention is required to network management, handset improvements and correct communication to the public about the conditions under which a cell broadcast message can be received. The latter includes managing realistic expectations including circumstances in which cell broadcast will not reach a citizen.

  10. BROSMAP: A Novel Broadcast Based Secure Mobile Agent Protocol for Distributed Service Applications

    Directory of Open Access Journals (Sweden)

    Dina Shehada

    2017-01-01

    Full Text Available Mobile agents are smart programs that migrate from one platform to another to perform the user task. Mobile agents offer flexibility and performance enhancements to systems and service real-time applications. However, security in mobile agent systems is a great concern. In this paper, we propose a novel Broadcast based Secure Mobile Agent Protocol (BROSMAP for distributed service applications that provides mutual authentication, authorization, accountability, nonrepudiation, integrity, and confidentiality. The proposed system also provides protection from man in the middle, replay, repudiation, and modification attacks. We proved the efficiency of the proposed protocol through formal verification with Scyther verification tool.

  11. Probabilistic Modelling of Information Propagation in Wireless Mobile Ad-Hoc Network

    DEFF Research Database (Denmark)

    Schiøler, Henrik; Hansen, Martin Bøgsted; Schwefel, Hans-Peter

    2005-01-01

    In this paper the dynamics of broadcasting wireless ad-hoc networks is studied through probabilistic modelling. A randomized transmission discipline is assumed in accordance with existing MAC definitions such as WLAN with Decentralized Coordination or IEEE-802.15.4. Message reception is assumed...... to be governed by node power-down policies and is equivalently assumed to be randomized. Altogether randomization facilitates a probabilistic model in the shape of an integro-differential equation governing the propagation of information, where brownian node mobility may be accounted for by including an extra...... diffusion term. The established model is analyzed for transient behaviour and a travelling wave solution facilitates expressions for propagation speed as well as parametrized analysis of network reliability and node power consumption. Applications of the developed models for node localization and network...

  12. A Dynamic Probabilistic Based Broadcasting Scheme for MANETs

    Science.gov (United States)

    Shanmugam, Kannan; Subburathinam, Karthik; Velayuthampalayam Palanisamy, Arunachalam

    2016-01-01

    MANET is commonly known as Mobile Ad Hoc Network in which cluster of mobile nodes can communicate with each other without having any basic infrastructure. The basic characteristic of MANET is dynamic topology. Due to the dynamic behavior nature, the topology of the network changes very frequently, and this will lead to the failure of the valid route repeatedly. Thus, the process of finding the valid route leads to notable drop in the throughput of the network. To identify a new valid path to the targeted mobile node, available proactive routing protocols use simple broadcasting method known as simple flooding. The simple flooding method broadcasts the RREQ packet from the source to the rest of the nodes in mobile network. But the problem with this method is disproportionate repetitive retransmission of RREQ packet which could result in high contention on the available channel and packet collision due to extreme traffic in the network. A reasonable number of routing algorithms have been suggested for reducing the lethal impact of flooding the RREQ packets. However, most of the algorithms have resulted in considerable amount of complexity and deduce the throughput by depending on special hardware components and maintaining complex information which will be less frequently used. By considering routing complexity with the goal of increasing the throughput of the network, in this paper, we have introduced a new approach called Dynamic Probabilistic Route (DPR) discovery. The Node's Forwarding Probability (NFP) is dynamically calculated by the DPR mobile nodes using Probability Function (PF) which depends on density of local neighbor nodes and the cumulative number of its broadcast covered neighbors. PMID:27019868

  13. Queueing Models for Mobile Ad Hoc Networks

    NARCIS (Netherlands)

    de Haan, Roland

    2009-01-01

    This thesis presents models for the performance analysis of a recent communication paradigm: \\emph{mobile ad hoc networking}. The objective of mobile ad hoc networking is to provide wireless connectivity between stations in a highly dynamic environment. These dynamics are driven by the mobility of

  14. An algorithm for generating data accessibility recommendations for flight deck Automatic Dependent Surveillance-Broadcast (ADS-B) applications

    Science.gov (United States)

    2014-09-09

    Automatic Dependent Surveillance-Broadcast (ADS-B) In technology supports the display of traffic data on Cockpit Displays of Traffic Information (CDTIs). The data are used by flightcrews to perform defined self-separation procedures, such as the in-t...

  15. Radiofrequency exposure amongst employees of mobile network operators and broadcasters

    International Nuclear Information System (INIS)

    Litchfield, Ian; Sorahan, Tom; Tongeren, Martie van

    2017-01-01

    Little is known about personal exposure to radiofrequency (RF) fields amongst employees in the telecommunications industry responsible for installing and maintaining transmitters. IARC classified RF exposure as a possible carcinogen, although evidence from occupational studies was judged to be inadequate. Hence, there is a need for improved evidence of any potentially adverse health effects amongst the workforce occupationally exposed to RF radiation. In this study, results are presented from an exposure survey using data from personal monitors used by employees in the broadcasting and telecommunication industries of the UK. These data were supplemented by spot measurements using broadband survey metres and information on daily work activities provided by employee questionnaires. The sets of real-time personal data were categorised by four types of site determined by the highest powered antenna present (high, medium or low power and ground-level sites). For measurements gathered at each type of site, the root mean square and a series of box plots were produced. Results from the daily activities diaries suggested that riggers working for radio and television broadcasters were exposed to much longer periods as compared to colleagues working for mobile operators. Combining the results from the measurements and daily activity diaries clearly demonstrate that exposures were highest for riggers working for broadcasting sites. This study demonstrates that it is feasible to carry out exposure surveys within these populations that will provide reliable estimates of exposure that can be used for epidemiological studies of occupational groups exposed to RF fields. (authors)

  16. Radiofrequency Exposure Amongst Employees of Mobile Network Operators and Broadcasters.

    Science.gov (United States)

    Litchfield, Ian; van Tongeren, Martie; Sorahan, Tom

    2017-06-15

    Little is known about personal exposure to radiofrequency (RF) fields amongst employees in the telecommunications industry responsible for installing and maintaining transmitters. IARC classified RF exposure as a possible carcinogen, although evidence from occupational studies was judged to be inadequate. Hence, there is a need for improved evidence of any potentially adverse health effects amongst the workforce occupationally exposed to RF radiation. In this study, results are presented from an exposure survey using data from personal monitors used by employees in the broadcasting and telecommunication industries of the UK. These data were supplemented by spot measurements using broadband survey metres and information on daily work activities provided by employee questionnaires. The sets of real-time personal data were categorised by four types of site determined by the highest powered antenna present (high, medium or low power and ground-level sites). For measurements gathered at each type of site, the root mean square and a series of box plots were produced. Results from the daily activities diaries suggested that riggers working for radio and television broadcasters were exposed to much longer periods as compared to colleagues working for mobile operators. Combining the results from the measurements and daily activity diaries clearly demonstrate that exposures were highest for riggers working for broadcasting sites. This study demonstrates that it is feasible to carry out exposure surveys within these populations that will provide reliable estimates of exposure that can be used for epidemiological studies of occupational groups exposed to RF fields. © The Author 2016. Published by Oxford University Press.

  17. Broadcasted Location-Aware Data Cache for Vehicular Application

    Directory of Open Access Journals (Sweden)

    Fukuda Akira

    2007-01-01

    Full Text Available There has been increasing interest in the exploitation of advances in information technology, for example, mobile computing and wireless communications in ITS (intelligent transport systems. Classes of applications that can benefit from such an infrastructure include traffic information, roadside businesses, weather reports, entertainment, and so on. There are several wireless communication methods currently available that can be utilized for vehicular applications, such as cellular phone networks, DSRC (dedicated short-range communication, and digital broadcasting. While a cellular phone network is relatively slow and a DSRC has a very small communication area, one-segment digital terrestrial broadcasting service was launched in Japan in 2006, high-performance digital broadcasting for mobile hosts has been available recently. However, broadcast delivery methods have the drawback that clients need to wait for the required data items to appear on the broadcast channel. In this paper, we propose a new cache system to effectively prefetch and replace broadcast data using "scope" (an available area of location-dependent data and "mobility specification" (a schedule according to the direction in which a mobile host moves. We numerically evaluate the cache system on the model close to the traffic road environment, and implement the emulation system to evaluate this location-aware data delivery method for a concrete vehicular application that delivers geographic road map data to a car navigation system.

  18. Model checking mobile ad hoc networks

    NARCIS (Netherlands)

    Ghassemi, Fatemeh; Fokkink, Wan

    2016-01-01

    Modeling arbitrary connectivity changes within mobile ad hoc networks (MANETs) makes application of automated formal verification challenging. We use constrained labeled transition systems as a semantic model to represent mobility. To model check MANET protocols with respect to the underlying

  19. Internet-Based Mobile Ad Hoc Networking (Preprint)

    National Research Council Canada - National Science Library

    Corson, M. S; Macker, Joseph P; Cirincione, Gregory H

    1999-01-01

    Internet-based Mobile Ad Hoc Networking is an emerging technology that supports self-organizing, mobile networking infrastructures, and is one which appears well-suited for use in future commercial...

  20. From Broadcast to Podcast

    DEFF Research Database (Denmark)

    Fibiger, Bo

    2007-01-01

    This paper will present the development from broadcasted educational television up to the actual use of streaming video and mobile units in eLearning. The paper will discuss the following topics: what can we learn from history? – and what are the new challenges and possibilities in mobile...

  1. Ad hoc mobile wireless networks principles, protocols, and applications

    CERN Document Server

    Sarkar, Subir Kumar

    2013-01-01

    The military, the research community, emergency services, and industrial environments all rely on ad hoc mobile wireless networks because of their simple infrastructure and minimal central administration. Now in its second edition, Ad Hoc Mobile Wireless Networks: Principles, Protocols, and Applications explains the concepts, mechanism, design, and performance of these highly valued systems. Following an overview of wireless network fundamentals, the book explores MAC layer, routing, multicast, and transport layer protocols for ad hoc mobile wireless networks. Next, it examines quality of serv

  2. Evolutionary algorithms for mobile ad hoc networks

    CERN Document Server

    Dorronsoro, Bernabé; Danoy, Grégoire; Pigné, Yoann; Bouvry, Pascal

    2014-01-01

    Describes how evolutionary algorithms (EAs) can be used to identify, model, and minimize day-to-day problems that arise for researchers in optimization and mobile networking. Mobile ad hoc networks (MANETs), vehicular networks (VANETs), sensor networks (SNs), and hybrid networks—each of these require a designer’s keen sense and knowledge of evolutionary algorithms in order to help with the common issues that plague professionals involved in optimization and mobile networking. This book introduces readers to both mobile ad hoc networks and evolutionary algorithms, presenting basic concepts as well as detailed descriptions of each. It demonstrates how metaheuristics and evolutionary algorithms (EAs) can be used to help provide low-cost operations in the optimization process—allowing designers to put some “intelligence” or sophistication into the design. It also offers efficient and accurate information on dissemination algorithms topology management, and mobility models to address challenges in the ...

  3. Routing Protocol for Mobile Ad-hoc Wireless Networks

    Directory of Open Access Journals (Sweden)

    I. M. B. Nogales

    2007-09-01

    Full Text Available Bluetooth is a cutting-edge technology used for implementing wireless ad hoc networks. In order to provide an overall scheme for mobile ad hoc networks, this paper deals with scatternet topology formation and routing algorithm to form larger ad hoc wireless Networks. Scatternet topology starts by forming a robust network, which is less susceptible to the problems posed by node mobility. Mobile topology relies on the presence of free nodes that create multiple connections with the network and on their subsequently rejoining the network. Our routing protocol is a proactive routing protocol, which is tailor made for the Bluetooth ad hoc network. The connection establishment connects nodes in a structure that simplifies packet routing and scheduling. The design allows nodes to arrive and leave arbitrarily, incrementally building the topology and healing partitions when they occur. We present simulation results that show that the algorithm presents low formation latency and also generates an efficient topology for forwarding packets along ad-hoc wireless networks.

  4. Broadcasted Location-Aware Data Cache for Vehicular Application

    Directory of Open Access Journals (Sweden)

    Kenya Sato

    2007-05-01

    Full Text Available There has been increasing interest in the exploitation of advances in information technology, for example, mobile computing and wireless communications in ITS (intelligent transport systems. Classes of applications that can benefit from such an infrastructure include traffic information, roadside businesses, weather reports, entertainment, and so on. There are several wireless communication methods currently available that can be utilized for vehicular applications, such as cellular phone networks, DSRC (dedicated short-range communication, and digital broadcasting. While a cellular phone network is relatively slow and a DSRC has a very small communication area, one-segment digital terrestrial broadcasting service was launched in Japan in 2006, high-performance digital broadcasting for mobile hosts has been available recently. However, broadcast delivery methods have the drawback that clients need to wait for the required data items to appear on the broadcast channel. In this paper, we propose a new cache system to effectively prefetch and replace broadcast data using “scope” (an available area of location-dependent data and “mobility specification” (a schedule according to the direction in which a mobile host moves. We numerically evaluate the cache system on the model close to the traffic road environment, and implement the emulation system to evaluate this location-aware data delivery method for a concrete vehicular application that delivers geographic road map data to a car navigation system.

  5. Evolution of broadcast content distribution

    CERN Document Server

    Beutler, Roland

    2017-01-01

    This book discusses opportunities for broadcasters that arise with the advent of broadband networks, both fixed and mobile. It discusses how the traditional way of distributing audio-visual content over broadcasting networks has been complemented by the usage of broadband networks. The author shows how this also gives the possibility to offer new types of interactive or so-called nonlinear services. The book illustrates how change in distribution technology is accelerating the need for broadcasters around the world to adapt their content distribution strategy and how it will impact the portfolios of content they offer. Outlines the shift in broadcast content distribution paradigms and related strategic issues Provides an overview of the new broadcasting ecosystem encompassing new types of content, user habits, expectations, and devices Discusses complementary usage of different distribution technologies and platforms.

  6. A MODIFIED ROUTE DISCOVERY APPROACH FOR DYNAMIC SOURCE ROUTING (DSR PROTOCOL IN MOBILE AD-HOC NETWORKS

    Directory of Open Access Journals (Sweden)

    Alaa Azmi Allahham

    2017-02-01

    Full Text Available Mobile Ad-hoc networks (MANETs involved in many applications, whether commercial or military because of their characteristics that do not depend on the infrastructure as well as the freedom movement of their elements, but in return has caused this random mobility of the nodes many of the challenges, where the routing is considered one of these challenges. There are many types of routing protocols that operate within MANET networks, which responsible for finding paths between the source and destination nodes with the modernization of these paths which are constantly changing due to the dynamic topology of the network stemming from the constant random movement of the nodes. The DSR (Dynamic Source Routing routing protocol algorithm is one of these routing protocols which consist of two main stages; route discovery and maintenance, where the route discovery algorithm operates based on blind flooding of request messages. blind flooding is considered as the most well known broadcasting mechanism, it is inefficient in terms of communication and resource utilization, which causing increasing the probability of collisions, repeating send several copies of the same message, as well as increasing the delay. Hence, a new mechanism in route discovery stage and in caching the routes in DSR algorithm according to the node's location in the network and the direction of the broadcast is proposed for better performance especially in terms of delay as well as redundant packets rate. The implementation of proposed algorithms showed positive results in terms of delay, overhead, and improve the performance of MANETs in general.

  7. Dynamic Mobile IP routers in ad hoc networks

    NARCIS (Netherlands)

    Kock, B.A.; Schmidt, J.R.

    2005-01-01

    This paper describes a concept combining mobile IP and ad hoc routing to create a robust mobile network. In this network all nodes are mobile and globally and locally reachable under the same IP address. Essential for implementing this network are the dynamic mobile IP routers. They act as gateways

  8. Innovative research of AD HOC network mobility model

    Science.gov (United States)

    Chen, Xin

    2017-08-01

    It is difficult for researchers of AD HOC network to conduct actual deployment during experimental stage as the network topology is changeable and location of nodes is unfixed. Thus simulation still remains the main research method of the network. Mobility model is an important component of AD HOC network simulation. It is used to describe the movement pattern of nodes in AD HOC network (including location and velocity, etc.) and decides the movement trail of nodes, playing as the abstraction of the movement modes of nodes. Therefore, mobility model which simulates node movement is an important foundation for simulation research. In AD HOC network research, mobility model shall reflect the movement law of nodes as truly as possible. In this paper, node generally refers to the wireless equipment people carry. The main research contents include how nodes avoid obstacles during movement process and the impacts of obstacles on the mutual relation among nodes, based on which a Node Self Avoiding Obstacle, i.e. NASO model is established in AD HOC network.

  9. Enhancing On-Demand Multicast Routing Protocols using Mobility Prediction in Mobile Ad-hoc Network

    Directory of Open Access Journals (Sweden)

    Nermin Makhlouf

    2014-08-01

    Full Text Available A Mobile Ad hoc Network (MANET is a self-organizing wireless communication network in which mobile devices are based on no infrastructure like base stations or access points. Minimal configuration and quick deployment make ad hoc networks suitable for emergency situations like disaster recovery or military conflict. Since node mobility may cause links to be broken frequently, a very important issue for routing in MANETs is how to set reliable paths which can last as long as possible. To solve this problem, non-random behaviors for the mobility patterns that mobile users exhibit are exploited. This paper introduces a scheme to improve On-Demand Multicast Routing Protocol (ODMRP performances by using mobility prediction. 

  10. Scenarios and business models for mobile network operators utilizing the hybrid use concept of the UHF broadcasting spectrum

    Directory of Open Access Journals (Sweden)

    S. Yrjölä

    2016-09-01

    Full Text Available This paper explores and presents scenarios and business models for mobile network operators (MNOs in the novel hybrid use spectrum sharing concept of the Ultra High Frequency broadcasting spectrum (470-790 MHz used for Digital Terrestrial TV (DTT and Mobile Broadband (MBB. More flexible use of the band could lead to higher efficiency in delivering fast growing and converging MBB, media and TV content to meet changing consumer needs. On one hand, this could be beneficial for broadcasters (BC, e.g., by preserving the spectrum, by providing additional revenues, or by lowering cost of the spectrum and, on the other hand, for MNOs to gain faster access to new potentially lower cost, licensed, below 1GHz spectrum to cope with booming data traffic. As a collaborative benefit, the concept opens up new business opportunities for delivering TV and media content using MBB network with means to introduce this flexibly. This paper highlights the importance of developing sound business models for the new spectrum use concept, as they need to provide clear benefits to the key stakeholders to be adopted in real life. The paper applies a future and action oriented approach to the MBB using the concept to derive scenarios and business models for MNOs for accessing hybrid UHF bands. In order to address the convergence and transformation coming with the concept, business models are first developed for the current situation with separate exclusive spectrum bands. Novel business scenarios are then developed for the introduction of the new flexible hybrid UHF spectrum concept. The created business model indicates that the MNOs could benefit significantly from the new UHF bands, which would enable them to cope with increasing data traffic asymmetry, and to offer differentiation through personalized broadcasting and new media services. Moreover, it could significantly re-shape the business ecosystem around both the broadcasting and the mobile broadband by introducing

  11. Probabilistic Mobility Models for Mobile and Wireless Networks

    DEFF Research Database (Denmark)

    Song, Lei; Godskesen, Jens Christian

    2010-01-01

    In this paper we present a probabilistic broadcast calculus for mobile and wireless networks whose connections are unreliable. In our calculus broadcasted messages can be lost with a certain probability, and due to mobility the connection probabilities may change. If a network broadcasts a message...... from a location it will evolve to a network distribution depending on whether nodes at other locations receive the message or not. Mobility of locations is not arbitrary but guarded by a probabilistic mobility function (PMF) and we also define the notion of a weak bisimulation given a PMF...

  12. Modelling Mobility in Mobile AD-HOC Network Environments ...

    African Journals Online (AJOL)

    In the simulation of mobile ad-hoc networks (MANETs), the probability distribution governing the movement of nodes typically varies over time and converges to a steady state distribution, known as the stationary distribution. This paper presents and evaluates the stationary distribution for location, speed and pause time of a ...

  13. What Makes Consumers Recall Banner Ads in Mobile Applications

    Directory of Open Access Journals (Sweden)

    Mesut Çiçek

    2017-09-01

    Full Text Available The uses of mobile advertisements are increasing their popularity across the world. Companies can gather information about the mobile users based on their locations, lifestyle, and preferences via GPS, cookies and browsing history and embed highly personalized banner ads in mobile applications. However, in the literature there is hardly any work on the effectiveness of these highly personalized in-app banner ads. The aim of the study is to reveal which factors affect the effectiveness of in-app banner ads. An experimental study was designed and 209 subjects participated. The results of Ordinal Logistic Regression indicated that prior brand attitude and attitude towards application have a positive effect, while brand engagement with self-concept has a negative effect on the recall of in-app banner ads. Moreover, in-app banner ads are recalled more when they are located in landscape applications and positioned at the top part of the screen. This research provides some implications for future studies and practitioners.

  14. Analysis of Pervasive Mobile Ad Hoc Routing Protocols

    Science.gov (United States)

    Qadri, Nadia N.; Liotta, Antonio

    Mobile ad hoc networks (MANETs) are a fundamental element of pervasive networks and therefore, of pervasive systems that truly support pervasive computing, where user can communicate anywhere, anytime and on-the-fly. In fact, future advances in pervasive computing rely on advancements in mobile communication, which includes both infrastructure-based wireless networks and non-infrastructure-based MANETs. MANETs introduce a new communication paradigm, which does not require a fixed infrastructure - they rely on wireless terminals for routing and transport services. Due to highly dynamic topology, absence of established infrastructure for centralized administration, bandwidth constrained wireless links, and limited resources in MANETs, it is challenging to design an efficient and reliable routing protocol. This chapter reviews the key studies carried out so far on the performance of mobile ad hoc routing protocols. We discuss performance issues and metrics required for the evaluation of ad hoc routing protocols. This leads to a survey of existing work, which captures the performance of ad hoc routing algorithms and their behaviour from different perspectives and highlights avenues for future research.

  15. 47 CFR 74.601 - Classes of TV broadcast auxiliary stations.

    Science.gov (United States)

    2010-10-01

    ... 47 Telecommunication 4 2010-10-01 2010-10-01 false Classes of TV broadcast auxiliary stations. 74... Television Broadcast Auxiliary Stations § 74.601 Classes of TV broadcast auxiliary stations. (a) TV pickup stations. A land mobile station used for the transmission of TV program material and related communications...

  16. Information Sharing Modalities for Mobile Ad-Hoc Networks

    Science.gov (United States)

    de Spindler, Alexandre; Grossniklaus, Michael; Lins, Christoph; Norrie, Moira C.

    Current mobile phone technologies have fostered the emergence of a new generation of mobile applications. Such applications allow users to interact and share information opportunistically when their mobile devices are in physical proximity or close to fixed installations. It has been shown how mobile applications such as collaborative filtering and location-based services can take advantage of ad-hoc connectivity to use physical proximity as a filter mechanism inherent to the application logic. We discuss the different modes of information sharing that arise in such settings based on the models of persistence and synchronisation. We present a platform that supports the development of applications that can exploit these modes of ad-hoc information sharing and, by means of an example, show how such an application can be realised based on the supported event model.

  17. Ad hoc mobile wireless networks principles, protocols and applications

    CERN Document Server

    Sarkar, Subir Kumar; Puttamadappa, C

    2007-01-01

    Ad hoc mobile wireless networks have seen increased adaptation in a variety of disciplines because they can be deployed with simple infrastructures and virtually no central administration. In particular, the development of ad hoc wireless and sensor networks provides tremendous opportunities in areas including disaster recovery, defense, health care, and industrial environments. Ad Hoc Mobile Wireless Networks: Principles, Protocols and Applications explains the concepts, mechanisms, design, and performance of these systems. It presents in-depth explanations of the latest wireless technologies

  18. Spatial Air Index Based on Largest Empty Rectangles for Non-Flat Wireless Broadcast in Pervasive Computing

    Directory of Open Access Journals (Sweden)

    Jun-Hong Shen

    2016-11-01

    Full Text Available In pervasive computing, location-based services (LBSs are valuable for mobile clients based on their current locations. LBSs use spatial window queries to enable useful applications for mobile clients. Based on skewed access patterns of mobile clients, non-flat wireless broadcast has been shown to efficiently disseminate spatial objects to mobile clients. In this paper, we consider a scenario in which spatial objects are broadcast to mobile clients over a wireless channel in a non-flat broadcast manner to process window queries. For such a scenario, we propose an efficient spatial air index method to handle window query access in non-flat wireless broadcast environments. The concept of largest empty rectangles is used to avoid unnecessary examination of the broadcast content, thus reducing the processing time for window queries. Simulation results show that the proposed spatial air index method outperforms the existing methods under various settings.

  19. Auto-Configuration Protocols in Mobile Ad Hoc Networks

    Science.gov (United States)

    Villalba, Luis Javier García; Matesanz, Julián García; Orozco, Ana Lucila Sandoval; Díaz, José Duván Márquez

    2011-01-01

    The TCP/IP protocol allows the different nodes in a network to communicate by associating a different IP address to each node. In wired or wireless networks with infrastructure, we have a server or node acting as such which correctly assigns IP addresses, but in mobile ad hoc networks there is no such centralized entity capable of carrying out this function. Therefore, a protocol is needed to perform the network configuration automatically and in a dynamic way, which will use all nodes in the network (or part thereof) as if they were servers that manage IP addresses. This article reviews the major proposed auto-configuration protocols for mobile ad hoc networks, with particular emphasis on one of the most recent: D2HCP. This work also includes a comparison of auto-configuration protocols for mobile ad hoc networks by specifying the most relevant metrics, such as a guarantee of uniqueness, overhead, latency, dependency on the routing protocol and uniformity. PMID:22163814

  20. Auto-configuration protocols in mobile ad hoc networks.

    Science.gov (United States)

    Villalba, Luis Javier García; Matesanz, Julián García; Orozco, Ana Lucila Sandoval; Díaz, José Duván Márquez

    2011-01-01

    The TCP/IP protocol allows the different nodes in a network to communicate by associating a different IP address to each node. In wired or wireless networks with infrastructure, we have a server or node acting as such which correctly assigns IP addresses, but in mobile ad hoc networks there is no such centralized entity capable of carrying out this function. Therefore, a protocol is needed to perform the network configuration automatically and in a dynamic way, which will use all nodes in the network (or part thereof) as if they were servers that manage IP addresses. This article reviews the major proposed auto-configuration protocols for mobile ad hoc networks, with particular emphasis on one of the most recent: D2HCP. This work also includes a comparison of auto-configuration protocols for mobile ad hoc networks by specifying the most relevant metrics, such as a guarantee of uniqueness, overhead, latency, dependency on the routing protocol and uniformity.

  1. Les Protocoles de routage dans les réseaux mobiles Ad Hoc ...

    African Journals Online (AJOL)

    Dans cet article nous présentons un état de l'art sur les protocoles de routage dans les réseaux mobiles Ad hoc. Mots clés : Réseaux mobiles ad hoc/, Protocoles de routage. Routing protocols in wireless mobile ad hoc networks. Abstract:The communication between users with handheld computers interconnected through ...

  2. Improving TCP Performance over Wireless Ad Hoc Networks with Busy Tone Assisted Scheme

    Directory of Open Access Journals (Sweden)

    Cai Lin

    2006-01-01

    Full Text Available It is well known that transmission control protocol (TCP performance degrades severely in IEEE 802.11-based wireless ad hoc networks. We first identify two critical issues leading to the TCP performance degradation: (1 unreliable broadcast, since broadcast frames are transmitted without the request-to-send and clear-to-send (RTS/CTS dialog and Data/ACK handshake, so they are vulnerable to the hidden terminal problem; and (2 false link failure which occurs when a node cannot successfully transmit data temporarily due to medium contention. We then propose a scheme to use a narrow-bandwidth, out-of-band busy tone channel to make reservation for broadcast and link error detection frames only. The proposed scheme is simple and power efficient, because only the sender needs to transmit two short messages in the busy tone channel before sending broadcast or link error detection frames in the data channel. Analytical results show that the proposed scheme can dramatically reduce the collision probability of broadcast and link error detection frames. Extensive simulations with different network topologies further demonstrate that the proposed scheme can improve TCP throughput by 23% to 150%, depending on user mobility, and effectively enhance both short-term and long-term fairness among coexisting TCP flows in multihop wireless ad hoc networks.

  3. Broadcast Abstraction in a Stochastic Calculus for Mobile Networks

    DEFF Research Database (Denmark)

    Song, Lei; Godskesen, Jens Christian

    2012-01-01

    topology constraint. We allow continuous time stochastic behavior of processes running at network nodes, e.g. in order to be able to model randomized protocols. The introduction of group broadcast and an operator to help avoid flooding allows us to define a novel notion of broadcast abstraction. Finally......, we define a weak bisimulation congruence and apply our theory on an example of a leader election protocol....

  4. Value Added Services and Adoption of Mobile Payments

    DEFF Research Database (Denmark)

    Augsburg, Christel; Hedman, Jonas

    2014-01-01

    In this paper, we investigate the role of Value Added Services (VAS) in consumers’ adoption of mobile payments. VAS are supplementary digital services offered in connection with mobile payments; in this study exemplified by receipts, loyalty cards, and coupons. A research model is derived from...... that intention to adopt mobile payments increases as VAS are introduced and that this increase comes from a positive change in Perceived Usefulness, compatibility, and Convenience....

  5. On the Performance of Counter-Based Broadcast Scheme for Mobile ...

    African Journals Online (AJOL)

    Despite its simplicity, it can result in high redundant retransmission, contention and collision, a phenomenon collectively referred to as the broadcast storm problem. Counter-based broadcast scheme has been proposed to mitigate this inherent problem and it relies on counter threshold value for rebroadcast decision. Thus ...

  6. A Clustering Routing Protocol for Mobile Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    Jinke Huang

    2016-01-01

    Full Text Available The dynamic topology of a mobile ad hoc network poses a real challenge in the design of hierarchical routing protocol, which combines proactive with reactive routing protocols and takes advantages of both. And as an essential technique of hierarchical routing protocol, clustering of nodes provides an efficient method of establishing a hierarchical structure in mobile ad hoc networks. In this paper, we designed a novel clustering algorithm and a corresponding hierarchical routing protocol for large-scale mobile ad hoc networks. Each cluster is composed of a cluster head, several cluster gateway nodes, several cluster guest nodes, and other cluster members. The proposed routing protocol uses proactive protocol between nodes within individual clusters and reactive protocol between clusters. Simulation results show that the proposed clustering algorithm and hierarchical routing protocol provide superior performance with several advantages over existing clustering algorithm and routing protocol, respectively.

  7. Classification and Evaluation of Mobility Metrics for Mobility Model Movement Patterns in Mobile Ad-Hoc Networks

    OpenAIRE

    Santosh Kumar S C Sharma Bhupendra Suman

    2011-01-01

    A mobile ad hoc network is collection of self configuring and adaption of wireless link between communicating devices (mobile devices) to form an arbitrary topology and multihop wireless connectivity without the use of existing infrastructure. It requires efficient dynamic routing protocol to determine the routes subsequent to a set of rules that enables two or more devices to communicate with each others. This paper basically classifies and evaluates the mobility metrics into two categories-...

  8. Data dissemination in the wild: A testbed for high-mobility MANETs

    DEFF Research Database (Denmark)

    Vingelmann, Peter; Pedersen, Morten Videbæk; Heide, Janus

    2012-01-01

    This paper investigates the problem of efficient data dissemination in Mobile Ad hoc NETworks (MANETs) with high mobility. A testbed is presented; which provides a high degree of mobility in experiments. The testbed consists of 10 autonomous robots with mobile phones mounted on them. The mobile...... information, and the goal is to convey that information to all devices. A strategy is proposed that uses UDP broadcast transmissions and random linear network coding to facilitate the efficient exchange of information in the network. An application is introduced that implements this strategy on Nokia phones...

  9. Securing DSR with mobile agents in wireless ad hoc networks

    Directory of Open Access Journals (Sweden)

    Ahmed Abosamra

    2011-03-01

    Full Text Available Ad hoc wireless network consists of a set of wireless nodes communicating with each other without a pre-defined infrastructure. They communicate by forwarding packets which can reach wireless nodes that do not exist in the range of the direct radio transmission. Designing ad hoc network routing protocols is a challenging task because of its decentralized infrastructure which makes securing ad hoc networks more and more challenging. Dynamic Source Routing (DSR protocol is a popular routing protocol designed for use in wireless ad hoc networks. Mobile agent is a promising technology used in diverse fields of network applications. In this paper, we try to implement DSR using mobile agents for securing this type of wireless network. Hybrid encryption technique (symmetric key encryption/public key encryption is used to improve performance; where symmetric keys are used to encrypt routing data to authenticate and authorize node sending data, while, public keys are used for the exchange of symmetric keys between nodes. We found that DSR may be secured using mobile agents with competitive performance.

  10. Flexible Wi-Fi Communication among Mobile Robots in Indoor Industrial Environments

    Directory of Open Access Journals (Sweden)

    Jetmir Haxhibeqiri

    2018-01-01

    Full Text Available In order to speed up industrial processes and to improve logistics, mobile robots are getting important in industry. In this paper, we propose a flexible and configurable architecture for the mobile node that is able to operate in different network topology scenarios. The proposed solution is able to operate in presence of network infrastructure, in ad hoc mode only, or to use both possibilities. In case of mixed architecture, mesh capabilities will enable coverage problem detection and overcoming. The solution is based on real requirements from an automated guided vehicle producer. First, we evaluate the overhead introduced by our solution. Since the mobile robot communication relies in broadcast traffic, the broadcast scalability in mesh network is evaluated too. Finally, through experiments on a wireless testbed for a variety of scenarios, we analyze the impact of roaming, mobility and traffic separation, and demonstrate the advantage of our approach in handling coverage problems.

  11. Receiver-Based Ad Hoc On Demand Multipath Routing Protocol for Mobile Ad Hoc Networks.

    Science.gov (United States)

    Al-Nahari, Abdulaziz; Mohamad, Mohd Murtadha

    2016-01-01

    Decreasing the route rediscovery time process in reactive routing protocols is challenging in mobile ad hoc networks. Links between nodes are continuously established and broken because of the characteristics of the network. Finding multiple routes to increase the reliability is also important but requires a fast update, especially in high traffic load and high mobility where paths can be broken as well. The sender node keeps re-establishing path discovery to find new paths, which makes for long time delay. In this paper we propose an improved multipath routing protocol, called Receiver-based ad hoc on demand multipath routing protocol (RB-AOMDV), which takes advantage of the reliability of the state of the art ad hoc on demand multipath distance vector (AOMDV) protocol with less re-established discovery time. The receiver node assumes the role of discovering paths when finding data packets that have not been received after a period of time. Simulation results show the delay and delivery ratio performances are improved compared with AOMDV.

  12. A Family of ACO Routing Protocols for Mobile Ad Hoc Networks

    Science.gov (United States)

    Rupérez Cañas, Delfín; Sandoval Orozco, Ana Lucila; García Villalba, Luis Javier; Kim, Tai-hoon

    2017-01-01

    In this work, an ACO routing protocol for mobile ad hoc networks based on AntHocNet is specified. As its predecessor, this new protocol, called AntOR, is hybrid in the sense that it contains elements from both reactive and proactive routing. Specifically, it combines a reactive route setup process with a proactive route maintenance and improvement process. Key aspects of the AntOR protocol are the disjoint-link and disjoint-node routes, separation between the regular pheromone and the virtual pheromone in the diffusion process and the exploration of routes, taking into consideration the number of hops in the best routes. In this work, a family of ACO routing protocols based on AntOR is also specified. These protocols are based on protocol successive refinements. In this work, we also present a parallelized version of AntOR that we call PAntOR. Using programming multiprocessor architectures based on the shared memory protocol, PAntOR allows running tasks in parallel using threads. This parallelization is applicable in the route setup phase, route local repair process and link failure notification. In addition, a variant of PAntOR that consists of having more than one interface, which we call PAntOR-MI (PAntOR-Multiple Interface), is specified. This approach parallelizes the sending of broadcast messages by interface through threads. PMID:28531159

  13. A Family of ACO Routing Protocols for Mobile Ad Hoc Networks.

    Science.gov (United States)

    Rupérez Cañas, Delfín; Sandoval Orozco, Ana Lucila; García Villalba, Luis Javier; Kim, Tai-Hoon

    2017-05-22

    In this work, an ACO routing protocol for mobile ad hoc networks based on AntHocNet is specified. As its predecessor, this new protocol, called AntOR, is hybrid in the sense that it contains elements from both reactive and proactive routing. Specifically, it combines a reactive route setup process with a proactive route maintenance and improvement process. Key aspects of the AntOR protocol are the disjoint-link and disjoint-node routes, separation between the regular pheromone and the virtual pheromone in the diffusion process and the exploration of routes, taking into consideration the number of hops in the best routes. In this work, a family of ACO routing protocols based on AntOR is also specified. These protocols are based on protocol successive refinements. In this work, we also present a parallelized version of AntOR that we call PAntOR. Using programming multiprocessor architectures based on the shared memory protocol, PAntOR allows running tasks in parallel using threads. This parallelization is applicable in the route setup phase, route local repair process and link failure notification. In addition, a variant of PAntOR that consists of having more than one interface, which we call PAntOR-MI (PAntOR-Multiple Interface), is specified. This approach parallelizes the sending of broadcast messages by interface through threads.

  14. Small Delay and High Performance AD/DA Converters of Lease Circuit System for AM&FM Broadcast

    Science.gov (United States)

    Takato, Kenji; Suzuki, Dai; Ishii, Takashi; Kobayashi, Masato; Yamada, Hirokazu; Amano, Shigeru

    Many AM&FM broadcasting stations in Japan are connected by the leased circuit system of NTT. Small delay and high performance AD/DA converter was developed for the system. The system was designed based on ITU-T J.41 Recommendation (384kbps), the transmission signal is 11bit-32 kHz where the Gain-frequency characteristics between 40Hz to 15kHz have to be quite flat. The ΔΣAD/DA converter LSIs for audio application in the market today realize very high performance. However the performance is not enough for the leased circuit system. We found that it is not possible to meet the delay and Gain-frequency requirements only by using ΔΣAD/DA converter LSI in normal operation, because 15kHz the highest frequency and 16kHz Nyquist frequency are too close, therefore there are aliasing around Nyquist frequency. In this paper, we designed AD/DA architecture having small delay (1msec) and sharp cut off LPF (100dB attenuation at 16kHz, and 1500dB/Oct from 15kHz to 16kHz) by operating ΔΣAD/DA converter LSIs over-sampling rate such as 128kHz and by adding custom LPF designed Infinite Impulse Response (IIR) filter. The IIR filter is a 16th order elliptic type and it is consist of eight biquad filters in series. We described how to evaluate the stability of IIR filter theoretically by calculating frequency response, Pole and Zero Layout and impulse response of each biquad filter, and experimentally by adding overflow detection circuit on each filters and input overlord signal.

  15. Digital broadcasting

    International Nuclear Information System (INIS)

    Park, Ji Hyeong

    1999-06-01

    This book contains twelve chapters, which deals with digitization of broadcast signal such as digital open, digitization of video signal and sound signal digitization of broadcasting equipment like DTPP and digital VTR, digitization of equipment to transmit such as digital STL, digital FPU and digital SNG, digitization of transmit about digital TV transmit and radio transmit, digital broadcasting system on necessity and advantage, digital broadcasting system abroad and Korea, digital broadcasting of outline, advantage of digital TV, ripple effect of digital broadcasting and consideration of digital broadcasting, ground wave digital broadcasting of DVB-T in Europe DTV in U.S.A and ISDB-T in Japan, HDTV broadcasting, satellite broadcasting, digital TV broadcasting in Korea, digital radio broadcasting and new broadcasting service.

  16. Static analysis of topology-dependent broadcast networks

    DEFF Research Database (Denmark)

    Nanz, Sebastian; Nielson, Flemming; Nielson, Hanne Riis

    2010-01-01

    changing network topology is a crucial ingredient. In this paper, we develop a static analysis that automatically constructs an abstract transition system, labelled by actions and connectivity information, to yield a mobility-preserving finite abstraction of the behaviour of a network expressed......Broadcast semantics poses significant challenges over point-to-point communication when it comes to formal modelling and analysis. Current approaches to analysing broadcast networks have focused on fixed connectivities, but this is unsuitable in the case of wireless networks where the dynamically...... in a process calculus with asynchronous local broadcast. Furthermore, we use model checking based on a 3-valued temporal logic to distinguish network behaviour which differs under changing connectivity patterns. (C) 2009 Elsevier Inc. All rights reserved....

  17. On-Demand Routing in Multi-hop Wireless Mobile Ad Hoc Networks

    National Research Council Canada - National Science Library

    Maltz, David A

    2001-01-01

    .... Routing protocols used in ad hoc networks must automatically adjust to environments that can vary between the extremes of high mobility with low bandwidth, and low mobility with high bandwidth...

  18. Resource Allocation Management for Broadcast/Multicast Services

    OpenAIRE

    Fuente Iglesias, Alejandro de la; Pérez Leal, Raquel; García-Armada, Ana

    2015-01-01

    Ponencia presentada en: XXX Simposium Nacional de la Unión Científica Internacional de Radio, los dias 2 y 4 septiembre 2015, en Pamplona (españa). Video services are expected to become more than 70% of the mobile traffic in 2020. Broadcast and multicast service is the most efficient mechanism to deliver the same content to many users. Not only focusing on venue casting, but also distributing many other media such as software updates and breaking news, 5G broadcasting is a key driver to a...

  19. ESA personal communications and digital audio broadcasting systems based on non-geostationary satellites

    Science.gov (United States)

    Logalbo, P.; Benedicto, J.; Viola, R.

    1993-01-01

    Personal Communications and Digital Audio Broadcasting are two new services that the European Space Agency (ESA) is investigating for future European and Global Mobile Satellite systems. ESA is active in promoting these services in their various mission options including non-geostationary and geostationary satellite systems. A Medium Altitude Global Satellite System (MAGSS) for global personal communications at L and S-band, and a Multiregional Highly inclined Elliptical Orbit (M-HEO) system for multiregional digital audio broadcasting at L-band are described. Both systems are being investigated by ESA in the context of future programs, such as Archimedes, which are intended to demonstrate the new services and to develop the technology for future non-geostationary mobile communication and broadcasting satellites.

  20. Satellite single-axis attitude determination based on Automatic Dependent Surveillance - Broadcast signals

    Science.gov (United States)

    Zhou, Kaixing; Sun, Xiucong; Huang, Hai; Wang, Xinsheng; Ren, Guangwei

    2017-10-01

    The space-based Automatic Dependent Surveillance - Broadcast (ADS-B) is a new technology for air traffic management. The satellite equipped with spaceborne ADS-B system receives the broadcast signals from aircraft and transfers the message to ground stations, so as to extend the coverage area of terrestrial-based ADS-B. In this work, a novel satellite single-axis attitude determination solution based on the ADS-B receiving system is proposed. This solution utilizes the signal-to-noise ratio (SNR) measurement of the broadcast signals from aircraft to determine the boresight orientation of the ADS-B receiving antenna fixed on the satellite. The basic principle of this solution is described. The feasibility study of this new attitude determination solution is implemented, including the link budget and the access analysis. On this basis, the nonlinear least squares estimation based on the Levenberg-Marquardt method is applied to estimate the single-axis orientation. A full digital simulation has been carried out to verify the effectiveness and performance of this solution. Finally, the corresponding results are processed and presented minutely.

  1. TV Broadcast Efficiency in 5G Networks from Subscriber Prospective

    KAUST Repository

    Lau, Chun Pong

    2015-12-06

    The flexibility of radio access network facilitated by 5G networks opens the gateway of deploying dynamic strategies for broadcasting TV channels in an efficient way. Currently, spectrum efficiency and bandwidth efficiency are the two common metrics measuring the efficiency of a system. These metrics assess the net bitrate for a unit of spectrum bandwidth. However, there is a lack of measurement, quantifying the effectiveness of a broadcasting strategy from the user perspective. In this paper, we introduce a novel measurement approach, called broadcast efficiency which considers the mobile user as a main reference. Broadcast efficiency is calculated as the number of served audiences per unit of radio resource. From numerical analysis, we show that broadcasting unpopular TV channels dramatically decreases the broadcast efficiency. This finding is evaluated by employing multiple distributions on the size of audience among TV channels. Furthermore, by conducting a real-life simulation, we discover that a high broadcast efficiency may result in a low percentage of served audiences if the audiences of TV channels are quite evenly distributed.

  2. Source Authentication for Multicast in Mobile Ad Hoc Networks

    National Research Council Canada - National Science Library

    Ramachandran, Prabha

    2003-01-01

    Recent emergence and popularity of mobile ad hoc networks in a host of current-day applications has instigated a suite of research challenges, primarily in routing and security issues for such networks...

  3. PNNI routing support for ad hoc mobile networking: The multilevel case

    Energy Technology Data Exchange (ETDEWEB)

    Martinez, L.; Sholander, P.; Tolendino, L.

    1998-01-01

    This contribution extends the Outside Nodal Hierarchy List (ONHL) procedures described in ATM Forum Contributions 97-0766 and 97-0933. These extensions allow multiple mobile networks to form either an ad hoc network or an extension of a fixed PNNI infrastructure. A previous contribution (97-1073) covered the simplest case where the top-most Logical Group Nodes (LGNs), in those mobile networks, all resided at the same level in a PNNI hierarchy. This contribution covers the more general case wherein those top-most LGNs may reside at different PNNI hierarchy levels. Both of the SNL contributions consider flat ad hoc network architectures in the sense that each mobile network always participates in the PNNI hierarchy at the pre-configured level of its top-most LGN.

  4. Capacity of wireless ad-hoc broadcast networks under realistic channel models

    NARCIS (Netherlands)

    Atici, C.; Sunay, M.O.

    2009-01-01

    In a wireless broadcasting scenario, some of the nodes can help the source node by forwarding the received information. Due to the interference from multiple transmissions, selection of these nodes directly affects the performance of the system under a given total power and hop constraint. In this

  5. Faraday rotation of Automatic Dependent Surveillance Broadcast (ADS-B) signals as a method of ionospheric characterization

    Science.gov (United States)

    Cushley, A. C.; Kabin, K.; Noel, J. M. A.

    2017-12-01

    Radio waves propagating through plasma in the Earth's ambient magnetic field experience Faraday rotation; the plane of the electric field of a linearly polarized wave changes as a function of the distance travelled through a plasma. Linearly polarized radio waves at 1090 MHz frequency are emitted by Automatic Dependent Surveillance Broadcast (ADS-B) devices which are installed on most commercial aircraft. These radio waves can be detected by satellites in low earth orbits, and the change of the polarization angle caused by propagation through the terrestrial ionosphere can be measured. In this work we discuss how these measurements can be used to characterize the ionospheric conditions. In the present study, we compute the amount of Faraday rotation from a prescribed total electron content value and two of the profile parameters of the NeQuick model.

  6. Mobile agents affect worm spreading in wireless ad hoc networks

    International Nuclear Information System (INIS)

    Huang, Zi-Gang; Sun, Jin-Tu; Wang, Ying-Hai; Wang, Sheng-Jun; Xu, Xin-Jian

    2009-01-01

    Considering the dynamic nature of portable computing devices with wireless communication capability, an extended model is introduced for worm spreading in the wireless ad hoc network, with a population of mobile agents in a planar distribution, starting from an initial infected seed. The effect of agents' mobility on worm spreading is investigated via extensive Monte Carlo simulations. The threshold behavior and the dynamics of worm epidemics in the wireless networks are greatly affected by both agents' mobility and spatial and temporal correlations. The medium access control mechanism for the wireless communication promotes the sensitivity of the spreading dynamics to agents' mobility

  7. Analysis and Enhancements of Leader Elections algorithms in Mobile Ad Hoc Networks

    OpenAIRE

    Shayeji, Mohammad H. Al; Al-Azmi, AbdulRahman R.; Al-Azmi, AbdulAziz R.; Samrajesh, M. D.

    2012-01-01

    Mobile Ad Hoc networks (MANET), distinct from traditional distributed systems, are dynamic and self-organizing networks. MANET requires a leader to coordinate and organize tasks. The challenge is to have the right election algorithm that chooses the right leader based on various factors in MANET. In this paper, we analyze four leader election algorithms used in mobile Ad Hoc Networks. Factors considered in our analysis are time complexity, message complexity, assumptions considered, fault tol...

  8. User-centred and context-aware identity management in mobile ad-hoc networks

    CERN Document Server

    Arabo, Abdullahi

    2013-01-01

    The emergent notion of ubiquitous computing makes it possible for mobile devices to communicate and provide services via networks connected in an ad-hoc manner. These have resulted in the proliferation of wireless technologies such as Mobile Ad-hoc Networks (MANets), which offer attractive solutions for services that need flexible setup as well as dynamic and low cost wireless connectivity. However, the growing trend outlined above also raises serious concerns over Identity Management (IM) du...

  9. Flight Extraction and Phase Identification for Large Automatic Dependent Surveillance–Broadcast Datasets

    NARCIS (Netherlands)

    Sun, J.; Ellerbroek, J.; Hoekstra, J.M.

    2017-01-01

    AUTOMATIC dependent surveillance–broadcast (ADS-B) [1,2] is widely implemented in modern commercial aircraft and will become mandatory equipment in 2020. Flight state information such as position, velocity, and vertical rate are broadcast by tens of thousands of aircraft around the world constantly

  10. A Group Based Key Sharing and Management Algorithm for Vehicular Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    Zeeshan Shafi Khan

    2014-01-01

    Full Text Available Vehicular ad hoc networks (VANETs are one special type of ad hoc networks that involves vehicles on roads. Typically like ad hoc networks, broadcast approach is used for data dissemination. Blind broadcast to each and every node results in exchange of useless and irrelevant messages and hence creates an overhead. Unicasting is not preferred in ad-hoc networks due to the dynamic topology and the resource requirements as compared to broadcasting. Simple broadcasting techniques create several problems on privacy, disturbance, and resource utilization. In this paper, we propose media mixing algorithm to decide what information should be provided to each user and how to provide such information. Results obtained through simulation show that fewer number of keys are needed to share compared to simple broadcasting. Privacy is also enhanced through this approach.

  11. Research in Mobile Database Query Optimization and Processing

    Directory of Open Access Journals (Sweden)

    Agustinus Borgy Waluyo

    2005-01-01

    Full Text Available The emergence of mobile computing provides the ability to access information at any time and place. However, as mobile computing environments have inherent factors like power, storage, asymmetric communication cost, and bandwidth limitations, efficient query processing and minimum query response time are definitely of great interest. This survey groups a variety of query optimization and processing mechanisms in mobile databases into two main categories, namely: (i query processing strategy, and (ii caching management strategy. Query processing includes both pull and push operations (broadcast mechanisms. We further classify push operation into on-demand broadcast and periodic broadcast. Push operation (on-demand broadcast relates to designing techniques that enable the server to accommodate multiple requests so that the request can be processed efficiently. Push operation (periodic broadcast corresponds to data dissemination strategies. In this scheme, several techniques to improve the query performance by broadcasting data to a population of mobile users are described. A caching management strategy defines a number of methods for maintaining cached data items in clients' local storage. This strategy considers critical caching issues such as caching granularity, caching coherence strategy and caching replacement policy. Finally, this survey concludes with several open issues relating to mobile query optimization and processing strategy.

  12. Faraday Rotation of Automatic Dependent Surveillance-Broadcast (ADS-B) Signals as a Method of Ionospheric Characterization

    Science.gov (United States)

    Cushley, A. C.; Kabin, K.; Noël, J.-M.

    2017-10-01

    Radio waves propagating through plasma in the Earth's ambient magnetic field experience Faraday rotation; the plane of the electric field of a linearly polarized wave changes as a function of the distance travelled through a plasma. Linearly polarized radio waves at 1090 MHz frequency are emitted by Automatic Dependent Surveillance Broadcast (ADS-B) devices that are installed on most commercial aircraft. These radio waves can be detected by satellites in low Earth orbits, and the change of the polarization angle caused by propagation through the terrestrial ionosphere can be measured. In this manuscript we discuss how these measurements can be used to characterize the ionospheric conditions. In the present study, we compute the amount of Faraday rotation from a prescribed total electron content value and two of the profile parameters of the NeQuick ionospheric model.

  13. Ad-me: Intelligent Context-Sensitive Advertising within a Mobile Tourist Guide.

    OpenAIRE

    Hristova, Nataliya; O'Hare, G. M. P. (Greg M. P.)

    2001-01-01

    The mobile commerce sector is set to witness phenomenal growth. In particular context sensitive advertising will represent a high yield revenue stream. This paper introduces the Ad-me (Advertising for the mobile e-commerce user) system which proactively delivers advertisements to users. Within the context of a mobile tourist guide advertisements are presented relative to user location and perceived needs. It uses Global Positioning System (GPS) and embraces agent-oriented design p...

  14. Verification of mobile ad hoc networks : an algebraic approach

    NARCIS (Netherlands)

    Ghassemi, F.; Fokkink, W.J.; Movaghar, A.

    2011-01-01

    We introduced Computed Network Process Theory to reason about protocols for mobile ad hoc networks (MANETs). Here we explore the applicability of our framework in two regards: model checking and equational reasoning. The operational semantics of our framework is based on constrained labeled

  15. Exploiting Mobile Ad Hoc Networking and Knowledge Generation to Achieve Ambient Intelligence

    Directory of Open Access Journals (Sweden)

    Anna Lekova

    2012-01-01

    Full Text Available Ambient Intelligence (AmI joins together the fields of ubiquitous computing and communications, context awareness, and intelligent user interfaces. Energy, fault-tolerance, and mobility are newly added dimensions of AmI. Within the context of AmI the concept of mobile ad hoc networks (MANETs for “anytime and anywhere” is likely to play larger roles in the future in which people are surrounded and supported by small context-aware, cooperative, and nonobtrusive devices that will aid our everyday life. The connection between knowledge generation and communication ad hoc networking is symbiotic—knowledge generation utilizes ad hoc networking to perform their communication needs, and MANETs will utilize the knowledge generation to enhance their network services. The contribution of the present study is a distributed evolving fuzzy modeling framework (EFMF to observe and categorize relationships and activities in the user and application level and based on that social context to take intelligent decisions about MANETs service management. EFMF employs unsupervised online one-pass fuzzy clustering method to recognize nodes' mobility context from social scenario traces and ubiquitously learn “friends” and “strangers” indirectly and anonymously.

  16. Data broadcasting: merging digital broadcasting with the Internet

    DEFF Research Database (Denmark)

    2001-01-01

    , and for what means it can be used. It also analyses data broadcasting from the perspectives of both the medium and business. * Features the latest developments in electronic media * Discusses the major media opportunities of data broadcasting * Shows how data broadcasting can overcome many notorious problems...... and developers in the telecommunications, software, hardware and media industries of the main commercial, editorial and technical opportunities of data broadcasting....

  17. AD HOC Networks for the Autonomous Car

    Science.gov (United States)

    Ron, Davidescu; Negrus, Eugen

    2017-10-01

    The future of the vehicle is made of cars, roads and infrastructures connected in a two way automated communication in a holistic system. It is a mandatory to use Encryption to maintain Confidentiality, Integrity and Availability in an ad hoc vehicle network. Vehicle to Vehicle communication, requires multichannel interaction between mobile, moving and changing parties to insure the full benefit from data sharing and real time decision making, a network of such users referred as mobile ad hoc network (MANET), however as ad hoc networks were not implemented in such a scale, it is not clear what is the best method and protocol to apply. Furthermore the visibility of secure preferred asymmetric encrypted ad hoc networks in a real time environment of dense moving autonomous vehicles has to be demonstrated, In order to evaluate the performance of Ad Hoc networks in changing conditions a simulation of multiple protocols was performed on large number of mobile nodes. The following common routing protocols were tested, DSDV is a proactive protocol, every mobile station maintains a routing table with all available destinations, DSR is a reactive routing protocol which allows nodes in the MANET to dynamically discover a source route across multiple network hops, AODV is a reactive routing protocol Instead of being proactive. It minimizes the number of broadcasts by creating routes based on demand, SAODV is a secure version of AODV, requires heavyweight asymmetric cryptographic, ARIANDE is a routing protocol that relies on highly efficient symmetric cryptography the concept is primarily based on DSR. A methodical evolution was performed in a various density of transportation, based on known communication bench mark parameters including, Throughput Vs. time, Routing Load per packets and bytes. Out of the none encrypted protocols, It is clear that in terms of performance of throughput and routing load DSR protocol has a clear advantage the high node number mode. The encrypted

  18. Distributed generation of shared RSA keys in mobile ad hoc networks

    Science.gov (United States)

    Liu, Yi-Liang; Huang, Qin; Shen, Ying

    2005-12-01

    Mobile Ad Hoc Networks is a totally new concept in which mobile nodes are able to communicate together over wireless links in an independent manner, independent of fixed physical infrastructure and centralized administrative infrastructure. However, the nature of Ad Hoc Networks makes them very vulnerable to security threats. Generation and distribution of shared keys for CA (Certification Authority) is challenging for security solution based on distributed PKI(Public-Key Infrastructure)/CA. The solutions that have been proposed in the literature and some related issues are discussed in this paper. The solution of a distributed generation of shared threshold RSA keys for CA is proposed in the present paper. During the process of creating an RSA private key share, every CA node only has its own private security. Distributed arithmetic is used to create the CA's private share locally, and that the requirement of centralized management institution is eliminated. Based on fully considering the Mobile Ad Hoc network's characteristic of self-organization, it avoids the security hidden trouble that comes by holding an all private security share of CA, with which the security and robustness of system is enhanced.

  19. Status of women in Nigerian broadcasting media: a case for representation and upward mobility.

    Science.gov (United States)

    Pate, U A

    1994-06-01

    Questionnaires completed by 45 female employees from 8 broadcast stations in Nigeria revealed that, despite some growth in female employment in areas such as programming, the status of women in this sector reproduces women's subordinate status in the broader society. For every 1 woman employed in the state radio stations and state and federal television stations represented in the survey, there were 7 male employees. Although the 3 states covered have an aggregate population of 4.3 million women, only 231 represent them in broadcasting. Moreover, female journalists are concentrated in the lowest status positions and tend to be relegated to coverage of women's and social issues rather than news and current affairs. Respondents cited the following factors as responsible for the low representation of women in broadcasting: cultural factors (20 respondents), a late start (15), male chauvinism (5), and a lack of dedication (5). At the same time, 40 of the 45 respondents indicated they believed women have equal opportunities to men in the broadcast media, given ability and perseverance, and 35 ranked the prospects for the next generation of female journalists as wide open. Greater visibility of female broadcasters in the higher ranks of the industry and in news-oriented reporting positions is essential to undercut stereotypes of women as wives and mothers only. Urged is a conscious effort on the part of the Nigerian broadcasting industry to attract more women to the field and provide them with the training needed to career advancement.

  20. An Effective Approach for Mobile ad hoc Network via I-Watchdog Protocol

    Directory of Open Access Journals (Sweden)

    Nidhi Lal

    2014-12-01

    Full Text Available Mobile ad hoc network (MANET is now days become very famous due to their fixed infrastructure-less quality and dynamic nature. They contain a large number of nodes which are connected and communicated to each other in wireless nature. Mobile ad hoc network is a wireless technology that contains high mobility of nodes and does not depend on the background administrator for central authority, because they do not contain any infrastructure. Nodes of the MANET use radio wave for communication and having limited resources and limited computational power. The Topology of this network is changing very frequently because they are distributed in nature and self-configurable. Due to its wireless nature and lack of any central authority in the background, Mobile ad hoc networks are always vulnerable to some security issues and performance issues. The security imposes a huge impact on the performance of any network. Some of the security issues are black hole attack, flooding, wormhole attack etc. In this paper, we will discuss issues regarding low performance of Watchdog protocol used in the MANET and proposed an improved Watchdog mechanism, which is called by I-Watchdog protocol that overcomes the limitations of Watchdog protocol and gives high performance in terms of throughput, delay.

  1. Collaboration Layer for Robots in Mobile Ad-hoc Networks

    DEFF Research Database (Denmark)

    Borch, Ole; Madsen, Per Printz; Broberg, Jacob Honor´e

    2009-01-01

    In many applications multiple robots in Mobile Ad-hoc Networks are required to collaborate in order to solve a task. This paper shows by proof of concept that a Collaboration Layer can be modelled and designed to handle the collaborative communication, which enables robots in small to medium size...

  2. Efficient Mobile Client Caching Supporting Transaction Semantics

    Directory of Open Access Journals (Sweden)

    IlYoung Chung

    2000-05-01

    Full Text Available In mobile client-server database systems, caching of frequently accessed data is an important technique that will reduce the contention on the narrow bandwidth wireless channel. As the server in mobile environments may not have any information about the state of its clients' cache(stateless server, using broadcasting approach to transmit the updated data lists to numerous concurrent mobile clients is an attractive approach. In this paper, a caching policy is proposed to maintain cache consistency for mobile computers. The proposed protocol adopts asynchronous(non-periodic broadcasting as the cache invalidation scheme, and supports transaction semantics in mobile environments. With the asynchronous broadcasting approach, the proposed protocol can improve the throughput by reducing the abortion of transactions with low communication costs. We study the performance of the protocol by means of simulation experiments.

  3. Capacity, delay and mobility in wireless ad-hoc networks

    NARCIS (Netherlands)

    Bansal, N.; Liu, Z.

    2003-01-01

    Network throughput and packet delay are two important parameters in the design and the evaluation of routing protocols for ad-hoc networks. While mobility has been shown to increase the capacity of a network, it is not clear whether the delay can be kept low without trading off the throughput. We

  4. On using multiple routing metrics with destination sequenced distance vector protocol for MultiHop wireless ad hoc networks

    Science.gov (United States)

    Mehic, M.; Fazio, P.; Voznak, M.; Partila, P.; Komosny, D.; Tovarek, J.; Chmelikova, Z.

    2016-05-01

    A mobile ad hoc network is a collection of mobile nodes which communicate without a fixed backbone or centralized infrastructure. Due to the frequent mobility of nodes, routes connecting two distant nodes may change. Therefore, it is not possible to establish a priori fixed paths for message delivery through the network. Because of its importance, routing is the most studied problem in mobile ad hoc networks. In addition, if the Quality of Service (QoS) is demanded, one must guarantee the QoS not only over a single hop but over an entire wireless multi-hop path which may not be a trivial task. In turns, this requires the propagation of QoS information within the network. The key to the support of QoS reporting is QoS routing, which provides path QoS information at each source. To support QoS for real-time traffic one needs to know not only minimum delay on the path to the destination but also the bandwidth available on it. Therefore, throughput, end-to-end delay, and routing overhead are traditional performance metrics used to evaluate the performance of routing protocol. To obtain additional information about the link, most of quality-link metrics are based on calculation of the lost probabilities of links by broadcasting probe packets. In this paper, we address the problem of including multiple routing metrics in existing routing packets that are broadcasted through the network. We evaluate the efficiency of such approach with modified version of DSDV routing protocols in ns-3 simulator.

  5. Direct broadcast satellite-radio market, legal, regulatory, and business considerations

    Science.gov (United States)

    Sood, Des R.

    1991-01-01

    A Direct Broadcast Satellite-Radio (DBS-R) System offers the prospect of delivering high quality audio broadcasts to large audiences at costs lower than or comparable to those incurred using the current means of broadcasting. The maturation of mobile communications technologies, and advances in microelectronics and digital signal processing now make it possible to bring this technology to the marketplace. Heightened consumer interest in improved audio quality coupled with the technological and economic feasibility of meeting this demand via DBS-R make it opportune to start planning for implementation of DBS-R Systems. NASA-Lewis and the Voice of America as part of their on-going efforts to improve the quality of international audio broadcasts, have undertaken a number of tasks to more clearly define the technical, marketing, organizational, legal, and regulatory issues underlying implementation of DBS-R Systems. The results and an assessment is presented of the business considerations underlying the construction, launch, and operation of DBS-R Systems.

  6. Direct broadcast satellite-radio market, legal, regulatory, and business considerations

    Science.gov (United States)

    Sood, Des R.

    1991-03-01

    A Direct Broadcast Satellite-Radio (DBS-R) System offers the prospect of delivering high quality audio broadcasts to large audiences at costs lower than or comparable to those incurred using the current means of broadcasting. The maturation of mobile communications technologies, and advances in microelectronics and digital signal processing now make it possible to bring this technology to the marketplace. Heightened consumer interest in improved audio quality coupled with the technological and economic feasibility of meeting this demand via DBS-R make it opportune to start planning for implementation of DBS-R Systems. NASA-Lewis and the Voice of America as part of their on-going efforts to improve the quality of international audio broadcasts, have undertaken a number of tasks to more clearly define the technical, marketing, organizational, legal, and regulatory issues underlying implementation of DBS-R Systems. The results and an assessment is presented of the business considerations underlying the construction, launch, and operation of DBS-R Systems.

  7. Impact of Mobility on the Performance of Relaying in Ad Hoc Networks

    NARCIS (Netherlands)

    Al Hanbali, Ahmad; Kherani, A.A.; Groenevelt, R.; Nain, P.; Altman, E

    2006-01-01

    We consider a mobile ad hoc network consisting of three types of nodes: source, destination, and relay nodes. All the nodes are moving over a bounded region with possibly different mobility patterns. We introduce and study the notion of relay throughput, i.e. the maximum rate at which a node can

  8. Mobility Models for Next Generation Wireless Networks Ad Hoc, Vehicular and Mesh Networks

    CERN Document Server

    Santi, Paolo

    2012-01-01

    Mobility Models for Next Generation Wireless Networks: Ad Hoc, Vehicular and Mesh Networks provides the reader with an overview of mobility modelling, encompassing both theoretical and practical aspects related to the challenging mobility modelling task. It also: Provides up-to-date coverage of mobility models for next generation wireless networksOffers an in-depth discussion of the most representative mobility models for major next generation wireless network application scenarios, including WLAN/mesh networks, vehicular networks, wireless sensor networks, and

  9. History of Satellite TV Broadcasting and Satellite Broadcasting Market in Turkey

    Directory of Open Access Journals (Sweden)

    Mihalis KUYUCU

    2015-09-01

    Full Text Available The present study analyses the satellite broadcasting that is the first important development that emerged as a result of digitalization in communication technologies and its reflections in Turkey. As the first milestone in the globalization of television broadcasting, satellite broadcasting provided substantial contribution towards the development of the media. Satellite bro adcasting both increased the broadcasting quality and geographical coverage of the television media. A conceptual study was carried out in the first part of the study in connection with the history of satellite broadcasting in Turkey and across the world. In the research part of the study, an analysis was performed on 160 television channels that broadcast in Turkey via Turksat Satellite. Economic structure of the television channels broadcasting in Turkey via satellite was studied and an analysis was perfo rmed on the operational structure of the channels. As a result of the study, it was emphasized that the television channels broadcasting via satellite platform also use other platforms for the purpose of spreading their broadcasts and television channel ow ners make investments in different branches of the media, too. Capital owners invest in different business areas other than the media although television channels broadcasting via Turksat mostly focus on thematic broadcasting and make effort to generate ec onomic income from advertisements. Delays are encountered in the course of the convergence between the new media and television channels that broadcast only from the satellite platform and such television channels experience more economic problems than the other channels. New media and many TV broadcasting platforms emerged as a result of the developments in the communication technologies. In television broadcasting, satellite platform is not an effective platform on its own. Channels make effort to reach t o more people by using other platforms in addition to

  10. Secrecy in Mobile Ad-hoc Networks

    DEFF Research Database (Denmark)

    Hüttel, Hans; Rafnsson, Willard

    2008-01-01

    We propose a framework for automated verification of secrecy properties of MANET protocols, consisting of a formal language and a proven sound verifi- cation technique which can be automated. We start off by presenting the dis- tributed applied pi calculus with broadcast (DAπβ ), whereafter we summ...

  11. A Mobility-Aware Link Enhancement Mechanism for Vehicular Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    Kai-Wen Hu

    2008-04-01

    Full Text Available With the growth up of internet in mobile commerce, researchers have reproduced various mobile applications that vary from entertainment and commercial services to diagnostic and safety tools. Mobility management has widely been recognized as one of the most challenging problems for seamless access to wireless networks. In this paper, a novel link enhancement mechanism is proposed to deal with mobility management problem in vehicular ad hoc networks. Two machine learning techniques, namely, particle swarm optimization and fuzzy logic systems, are incorporated into the proposed schemes to enhance the accuracy of prediction of link break and congestion occurrence. The experimental results verify the effectiveness and feasibility of the proposed schemes.

  12. A Mobility-Aware Link Enhancement Mechanism for Vehicular Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    Huang Chenn-Jung

    2008-01-01

    Full Text Available Abstract With the growth up of internet in mobile commerce, researchers have reproduced various mobile applications that vary from entertainment and commercial services to diagnostic and safety tools. Mobility management has widely been recognized as one of the most challenging problems for seamless access to wireless networks. In this paper, a novel link enhancement mechanism is proposed to deal with mobility management problem in vehicular ad hoc networks. Two machine learning techniques, namely, particle swarm optimization and fuzzy logic systems, are incorporated into the proposed schemes to enhance the accuracy of prediction of link break and congestion occurrence. The experimental results verify the effectiveness and feasibility of the proposed schemes.

  13. Spontaneous ad hoc mobile cloud computing network.

    Science.gov (United States)

    Lacuesta, Raquel; Lloret, Jaime; Sendra, Sandra; Peñalver, Lourdes

    2014-01-01

    Cloud computing helps users and companies to share computing resources instead of having local servers or personal devices to handle the applications. Smart devices are becoming one of the main information processing devices. Their computing features are reaching levels that let them create a mobile cloud computing network. But sometimes they are not able to create it and collaborate actively in the cloud because it is difficult for them to build easily a spontaneous network and configure its parameters. For this reason, in this paper, we are going to present the design and deployment of a spontaneous ad hoc mobile cloud computing network. In order to perform it, we have developed a trusted algorithm that is able to manage the activity of the nodes when they join and leave the network. The paper shows the network procedures and classes that have been designed. Our simulation results using Castalia show that our proposal presents a good efficiency and network performance even by using high number of nodes.

  14. Performance Analysis of Hierarchical Group Key Management Integrated with Adaptive Intrusion Detection in Mobile ad hoc Networks

    Science.gov (United States)

    2016-04-05

    applications in wireless networks such as military battlefields, emergency response, mobile commerce , online gaming, and collaborative work are based on the...www.elsevier.com/locate/peva Performance analysis of hierarchical group key management integrated with adaptive intrusion detection in mobile ad hoc...Accepted 19 September 2010 Available online 26 September 2010 Keywords: Mobile ad hoc networks Intrusion detection Group communication systems Group

  15. ON SECURE FULL DUPLEX COMMUNICATION IN MOBILE AD HOC NETWORK

    OpenAIRE

    S. C. Dutta; Sudha Singh; D. K. Singh

    2013-01-01

    This paper is to establish Ad Hoc network in mobile phones and start fully secured full duplex communication in any situation. This type of communication will be cost effective and it will be fastest way of communication in case of any server failure or server error.

  16. The cigarette advertising broadcast ban and magazine coverage of smoking and health.

    Science.gov (United States)

    Warner, K E; Goldenhar, L M

    1989-01-01

    At the time of the cigarette broadcast advertising ban, which took effect in 1971, cigarette manufacturers rapidly shifted advertising expenditures from the broadcast media to the print media. In the last year of broadcast advertising and the first year of the ban, cigarette ad expenditures in a sample of major national magazines increased by 49 and then 131 percent in constant dollars. From an 11-year period preceding the ban to an 11-year period following it, these magazines decreased their coverage of smoking and health by 65 percent, an amount that is statistically significantly greater than decreases found in magazines that did not carry cigarette ads and in two major newspapers. This finding adds to evidence that media dependent on cigarette advertising have restricted their coverage of smoking and health. This may have significant implications for public health, as well as raising obvious concerns about the integrity of the profession of journalism.

  17. Broadcasting Stations of the World; Part III. Frequency Modulation Broadcasting Stations.

    Science.gov (United States)

    Foreign Broadcast Information Service, Washington, DC.

    This third part of "Broadcasting Stations of the World", which lists all reported radio broadcasting and television stations, with the exception of those in the United States which broadcast on domestic channels, covers frequency modulation broadcasting stations. It contains two sections: one indexed alphabetically by country and city, and the…

  18. A Tool for Visualizing Mobile Ad-Hoc Network Topology Definitions Files

    National Research Council Canada - National Science Library

    Nguyen, Binh Q

    2006-01-01

    This report documents a research and development effort that the U.S. Army Research Laboratory conducted in FY05 in support of the building of an emulated tactical mobile ad hoc network (MANET) research test bed...

  19. Power control algorithms for mobile ad hoc networks

    Directory of Open Access Journals (Sweden)

    Nuraj L. Pradhan

    2011-07-01

    We will also focus on an adaptive distributed power management (DISPOW algorithm as an example of the multi-parameter optimization approach which manages the transmit power of nodes in a wireless ad hoc network to preserve network connectivity and cooperatively reduce interference. We will show that the algorithm in a distributed manner builds a unique stable network topology tailored to its surrounding node density and propagation environment over random topologies in a dynamic mobile wireless channel.

  20. Information Sharing Mechanism among Mobile Agents In Ad-hoc Network Environment and Its Applications

    Directory of Open Access Journals (Sweden)

    Kunio Umetsuji

    2004-12-01

    Full Text Available Mobile agents are programs that can move from one site to another in a network with their data and states. Mobile agents are expected to be an essential tool in pervasive computing. In multi platform environment, it is important to communicate with mobile agents only using their universal or logical name not using their physical locations. More, in an ad-hoc network environment, an agent can migrate autonomously and communicate with other agents on demand. It is difficult that mobile agent grasps the position information on other agents correctly each other, because mobile agent processes a task while moving a network successively. In order to realize on-demand mutual communication among mobile agents without any centralized servers, we propose a new information sharing mechanism within mobile agents. In this paper, we present a new information sharing mechanism within mobile agents. The method is a complete peer based and requires no agent servers to manage mobile agent locations. Therefore, a mobile agent can get another mobile agent, communicate with it and shares information stored in the agent without any knowledge of the location of the target mobile agent. The basic idea of the mechanism is an introduction of Agent Ring, Agent Chain and Shadow Agent. With this mechanism, each agent can communicate with other agents in a server-less environment, which is suitable for ad-hoc agent network and an agent system can manage agents search and communications efficiently.

  1. Bluetooth Broadcasting : How far can we go? An experimental study

    NARCIS (Netherlands)

    Aiello, Marco; Jong, Remko de; Nes, Joel de

    2009-01-01

    Bluetooth is a wireless communication technology to build small networks of devices. It was designed as a cable replacement technology. Given its widespread adoption, especially in mobile devices, new uses are possible today. For instance, one can broadcast messages to nomadic users based on their

  2. Robust Radio Broadcast Monitoring Using a Multi-Band Spectral Entropy Signature

    Science.gov (United States)

    Camarena-Ibarrola, Antonio; Chávez, Edgar; Tellez, Eric Sadit

    Monitoring media broadcast content has deserved a lot of attention lately from both academy and industry due to the technical challenge involved and its economic importance (e.g. in advertising). The problem pose a unique challenge from the pattern recognition point of view because a very high recognition rate is needed under non ideal conditions. The problem consist in comparing a small audio sequence (the commercial ad) with a large audio stream (the broadcast) searching for matches.

  3. Revenue-sharing analysis in the mobile value-added services

    Institute of Scientific and Technical Information of China (English)

    LIU Bing; TANG Shou-lian

    2006-01-01

    This article provides a framework e within which the revenue-sharing in mobile value-added services can be analyzed.It shows that the revenue-sharing ratio between a network operator and a content provider (CP) has no significant effect on prices, market shares or social welfare in the case of nonstandardization. This implies that the revenue-sharing ratio cannot be used as a policy variable.

  4. FRCA: A Fuzzy Relevance-Based Cluster Head Selection Algorithm for Wireless Mobile Ad-Hoc Sensor Networks

    Directory of Open Access Journals (Sweden)

    Taegwon Jeong

    2011-05-01

    Full Text Available Clustering is an important mechanism that efficiently provides information for mobile nodes and improves the processing capacity of routing, bandwidth allocation, and resource management and sharing. Clustering algorithms can be based on such criteria as the battery power of nodes, mobility, network size, distance, speed and direction. Above all, in order to achieve good clustering performance, overhead should be minimized, allowing mobile nodes to join and leave without perturbing the membership of the cluster while preserving current cluster structure as much as possible. This paper proposes a Fuzzy Relevance-based Cluster head selection Algorithm (FRCA to solve problems found in existing wireless mobile ad hoc sensor networks, such as the node distribution found in dynamic properties due to mobility and flat structures and disturbance of the cluster formation. The proposed mechanism uses fuzzy relevance to select the cluster head for clustering in wireless mobile ad hoc sensor networks. In the simulation implemented on the NS-2 simulator, the proposed FRCA is compared with algorithms such as the Cluster-based Routing Protocol (CBRP, the Weighted-based Adaptive Clustering Algorithm (WACA, and the Scenario-based Clustering Algorithm for Mobile ad hoc networks (SCAM. The simulation results showed that the proposed FRCA achieves better performance than that of the other existing mechanisms.

  5. FRCA: a fuzzy relevance-based cluster head selection algorithm for wireless mobile ad-hoc sensor networks.

    Science.gov (United States)

    Lee, Chongdeuk; Jeong, Taegwon

    2011-01-01

    Clustering is an important mechanism that efficiently provides information for mobile nodes and improves the processing capacity of routing, bandwidth allocation, and resource management and sharing. Clustering algorithms can be based on such criteria as the battery power of nodes, mobility, network size, distance, speed and direction. Above all, in order to achieve good clustering performance, overhead should be minimized, allowing mobile nodes to join and leave without perturbing the membership of the cluster while preserving current cluster structure as much as possible. This paper proposes a Fuzzy Relevance-based Cluster head selection Algorithm (FRCA) to solve problems found in existing wireless mobile ad hoc sensor networks, such as the node distribution found in dynamic properties due to mobility and flat structures and disturbance of the cluster formation. The proposed mechanism uses fuzzy relevance to select the cluster head for clustering in wireless mobile ad hoc sensor networks. In the simulation implemented on the NS-2 simulator, the proposed FRCA is compared with algorithms such as the Cluster-based Routing Protocol (CBRP), the Weighted-based Adaptive Clustering Algorithm (WACA), and the Scenario-based Clustering Algorithm for Mobile ad hoc networks (SCAM). The simulation results showed that the proposed FRCA achieves better performance than that of the other existing mechanisms.

  6. How broadcast volume and emotional content affect youth recall of anti-tobacco advertising.

    Science.gov (United States)

    Biener, Lois; Wakefield, Melanie; Shiner, Cecilia M; Siegel, Michael

    2008-07-01

    Televised anti-tobacco advertising has been shown to be effective for discouraging smoking initiation; however, purchasing broadcasting time is very costly. This study investigated the relative impact of the broadcast volume (media weight) and the emotional content of an ad as predictors of advertising recall. The data come from a random-digit-dialed survey conducted in 2001 and 2002 of 3863 youth aged 12-17. Media weight was based on commercial TV ratings data. The emotional intensity of advertisements was derived from the ratings made by independent youth judges. Data analyses were conducted between 2005 and 2007. Results indicated that media weight was a significant predictor of recall, but the emotional content of the ad was an even stronger predictor. Also, ads low in emotional intensity required more media weight than those high in emotional intensity to achieve the same amount of increase in recall. This study extends prior research that highlights the importance of emotional intensity for effective anti-tobacco advertising. It also indicates that, relative to unemotional advertisements, emotionally arousing advertisements require fewer broadcasts to achieve the same level of recall, and hence are likely to be less costly to a public health campaign.

  7. Peer-to-peer over mobile ad hoc networks (Chapter 11)

    NARCIS (Netherlands)

    Qadri, N.N.; Liotta, A.; Pierre, S.

    2010-01-01

    In this chapter we review various approaches for the convergence of Peer-to-Peer (P2P) and Mobile Ad hoc Networks (MANETs), identifying strengths and weaknesses, and putting things in perspective. P2P and MANETs are among the most active research topics in pervasive computing. The convergence of P2P

  8. Effect of grain mobility on ionic conductivity of Ceria added YSZ electrolyte

    International Nuclear Information System (INIS)

    Gupta, Alka; Omar, Shobit; Balani, Kantesh

    2012-01-01

    In an effort to develop novel electrolyte materials, the present work explores the effect of grain boundary mobility on ionic conductivity of CeO 2 -YSZ electrolyte. For cubic zirconia in general, the higher the grain boundary mobility, the lower the activation energy for oxide ion migration and judicious doping can be an effective method for mobility control. The two main directions for fabricating 8 mol. % YSZs (8YSZ) with 0,5 and 10 wt % CeO 2 are being followed: (i) co doping by conventional sintering (CS, 1400 ℃, 4h holding, ∼98 % theoretical density), and (ii) nano composite approach by spark plasma sintering (SPS, 1200 ℃, 5 min holding, ∼96 % theoretical density). Phase analysis by XRD, indicates that CeO 2 forms the complete solid solution with YSZ when synthesized by CS and both solid solution and composite formation (seen as isolated ceria rich zones in YSZ matrix by EDS analysis via TEM) by SPS. The grain boundary mobility for CS samples of pure and 10%CeO 2 added YSZ are 6.69 x 10 -18 to 10.35 X 10 -18 m 3 /N/s respectively. While for SPS sintered samples of pure and 10% CeO 2 added YSZ the grain boundary mobility comes out to be ∼0.032 X 10 -18 to 0.039 X 10 18 m 3 /N/s respectively. Grain mobility does not show any marginal change with increasing ceria content, elicit that the defect concentration is nearly constant in 8YSZ and is insensitive to ceria content. Remarkable increase of grain mobility in the SPS samples is attributed to rapid grain coarsening in the nano-grains limited to shorter sintering times. As expected, grain mobility for longer-times average out the transient phase and lower the net grain mobility such as in CS samples. The enhanced mobility in CeO 2 -YSZ SPS sintered electrolytes must be due to lower cation migration energy (activation energy for oxide ion migration), promoting enhanced ionic conductivity. (author)

  9. An efficient and reliable multi-hop geographical broadcast protocol in vehicular ad-hoc networks

    NARCIS (Netherlands)

    Rajendran, R.; Jongh, J. de

    2013-01-01

    In Intelligent Transportation Systems (ITS), disseminating warning messages in a timely and efficient way through wireless short-range communications can save many lives and reduce traffic congestion. A geographical broadcast protocol provides data delivery to specified geographical areas, using

  10. Autonomous Power Control MAC Protocol for Mobile Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    2006-01-01

    Full Text Available Battery energy limitation has become a performance bottleneck for mobile ad hoc networks. IEEE 802.11 has been adopted as the current standard MAC protocol for ad hoc networks. However, it was developed without considering energy efficiency. To solve this problem, many modifications on IEEE 802.11 to incorporate power control have been proposed in the literature. The main idea of these power control schemes is to use a maximum possible power level for transmitting RTS/CTS and the lowest acceptable power for sending DATA/ACK. However, these schemes may degrade network throughput and reduce the overall energy efficiency of the network. This paper proposes autonomous power control MAC protocol (APCMP, which allows mobile nodes dynamically adjusting power level for transmitting DATA/ACK according to the distances between the transmitter and its neighbors. In addition, the power level for transmitting RTS/CTS is also adjustable according to the power level for DATA/ACK packets. In this paper, the performance of APCMP protocol is evaluated by simulation and is compared with that of other protocols.

  11. Direct-to-Consumer Broadcast Advertisements for Pharmaceuticals: Off-Label Promotion and Adherence to FDA Guidelines.

    Science.gov (United States)

    Klara, Kristina; Kim, Jeanie; Ross, Joseph S

    2018-05-01

    Direct-to-consumer (DTC) advertisements for prescription drugs in the United States are regulated by the Food and Drug Administration (FDA). Off-label promotion, or the advertisement of a drug for an indication not approved by the FDA, is prohibited. Our objective was to examine the presence of off-label promotion in broadcast DTC ads and to assess their adherence to FDA guidelines mandating fair balance in presentation of risks and benefits and prohibiting misleading advertisement claims. All English-language broadcast DTC ads for prescription drugs that aired in the United States from January 2015 to July 2016 were obtained from AdPharm, an online collection of healthcare advertisements. Ad length was measured and adherence to FDA guidelines was assessed for several categories: key regulatory items, indicators of false or misleading ads, and indicators of fair balance in presentation of risks and benefits. Our sample included 97 unique DTC ads, representing 60 unique drugs and 67 unique drug-indication combinations. No ads described drug risks quantitatively, whereas drug efficacy was presented quantitatively in 25 (26%) ads. Thirteen (13%) ads, all for diabetes medications, suggested off-label uses for weight loss and blood pressure reduction. The most commonly advertised drugs were indicated for the treatment of inflammatory conditions (n = 12; 18%), diabetes or diabetic neuropathy (n = 11; 16%), bowel or bladder dysfunction (n = 6; 9%), and infections or allergic reaction (n = 6; 9%). More than three-quarters (n = 51; 76%) advertised drugs to treat chronic conditions. Few broadcast DTC ads were fully compliant with FDA guidelines. The overall quality of information provided in ads was low, and suggestions of off-label promotion were common for diabetes medications. The impact of current DTC ads and off-label marketing on patient and prescriber decisions merits further scrutiny.

  12. Cross-Layer Design Approach for Power Control in Mobile Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    A. Sarfaraz Ahmed

    2015-03-01

    Full Text Available In mobile ad hoc networks, communication among mobile nodes occurs through wireless medium The design of ad hoc network protocol, generally based on a traditional “layered approach”, has been found ineffective to deal with receiving signal strength (RSS-related problems, affecting the physical layer, the network layer and transport layer. This paper proposes a design approach, deviating from the traditional network design, toward enhancing the cross-layer interaction among different layers, namely physical, MAC and network. The Cross-Layer design approach for Power control (CLPC would help to enhance the transmission power by averaging the RSS values and to find an effective route between the source and the destination. This cross-layer design approach was tested by simulation (NS2 simulator and its performance over AODV was found to be better.

  13. 78 FR 71557 - Radio Broadcasting Services; Tohatchi, New Mexico

    Science.gov (United States)

    2013-11-29

    ...] Radio Broadcasting Services; Tohatchi, New Mexico AGENCY: Federal Communications Commission. ACTION... Channel 268C2, Tohatchi, New Mexico, as a first local service under the Tribal Priority. A staff... [Amended] 0 2. Section 73.202(b), the Table of FM Allotments under New Mexico, is amended by adding...

  14. Two-terminal reliability analyses for a mobile ad hoc wireless network

    International Nuclear Information System (INIS)

    Cook, Jason L.; Ramirez-Marquez, Jose Emmanuel

    2007-01-01

    Reliability is one of the most important performance measures for emerging technologies. For these systems, shortcomings are often overlooked in early releases as the cutting edge technology overshadows a fragile design. Currently, the proliferation of the mobile ad hoc wireless networks (MAWN) is moving from cutting edge to commodity and thus, reliable performance will be expected. Generally, ad hoc networking is applied for the flexibility and mobility it provides. As a result, military and first responders employ this network scheme and the reliability of the network becomes paramount. To ensure reliability is achieved, one must first be able to analyze and calculate the reliability of the MAWN. This work describes the unique attributes of the MAWN and how the classical analysis of network reliability, where the network configuration is known a priori, can be adjusted to model and analyze this type of network. The methods developed acknowledge the dynamic and scalable nature of the MAWN along with its absence of infrastructure. Thus, the methods rely on a modeling approach that considers the probabilistic formation of different network configurations in a MAWN. Hence, this paper proposes reliability analysis methods that consider the effect of node mobility and the continuous changes in the network's connectivity

  15. Impact of mobility on the performance of relaying in ad hoc networks (Extended version)

    NARCIS (Netherlands)

    Al Hanbali, A.; Kherani, A.A.; Groenevelt, R.; Nain, P.; Altman, E.

    2007-01-01

    We consider a mobile ad hoc network consisting of three types of nodes: source, destination, and relay nodes. All the nodes are moving over a bounded region with possibly different mobility patterns. We introduce and study the notion of relay throughput, i.e. the maximum rate at which a node can

  16. Effects of Data Replication on Data Exfiltration in Mobile Ad Hoc Networks Utilizing Reactive Protocols

    Science.gov (United States)

    2015-03-01

    aerial vehicle VANET vehicular ad hoc network VoIP Voice over Internet Protocol VRR Virtual Ring Routing xiii EFFECTS OF DATA REPLICATION ON DATA...ad hoc networks in mobile ad hoc networks (MANETs), vehicular ad hoc networks (VANETs), and flying ad hoc net- works (FANETs). Much of the research...metric, such as capacity, congestion , power, or combinations thereof. Caro refers to two different types of ants, FANTs and BANTs which are analogous to

  17. Improving VANETs Connectivity with a Totally Ad Hoc Living Mobile Backbone

    Directory of Open Access Journals (Sweden)

    Joilson Alves Junior

    2015-01-01

    Full Text Available The vehicular ad hoc network (VANET for intelligent transportation systems is an emerging concept to improve transportation security, reliability, and management. The network behavior can be totally different in topological aspects because of the mobility of vehicular nodes. The topology can be fully connected when the flow of vehicles is high and may have low connectivity or be invalid when the flow of vehicles is low or unbalanced. In big cities, the metropolitan buses that travel on exclusive lanes may be used to set up a metropolitan vehicular data network (backbone, raising the connectivity among the vehicles. Therefore, this paper proposes the implementation of a living mobile backbone, totally ad hoc (MOB-NET, which will provide infrastructure and raise the network connectivity. In order to show the viability of MOB-NET, statistical analyses were made with real data of express buses that travel through exclusive lanes, besides evaluations through simulations and analytic models. The statistic, analytic, and simulation results prove that the buses that travel through exclusive lanes can be used to build a communication network totally ad hoc and provide connectivity in more than 99% of the time, besides raising the delivery rate up to 95%.

  18. An Intelligent Broadcasting Algorithm for Early Warning Message Dissemination in VANETs

    Directory of Open Access Journals (Sweden)

    Ihn-Han Bae

    2015-01-01

    Full Text Available Vehicular ad hoc network (VANET has gained much attention recently to improve road safety, reduce traffic congestion, and enable efficient traffic management because of its many important applications in transportation. In this paper, an early warning intelligence broadcasting algorithm is proposed, EW-ICAST, to disseminate a safety message for VANETs. The proposed EW-ICAST uses not only the early warning system on the basis of time to collision (TTC but also the intelligent broadcasting algorithm on the basis of fuzzy logic. Thus, the EW-ICAST resolves effectively broadcast storm problem and meets time-critical requirement. The performance of EW-ICAST is evaluated through simulation and compared with that of other alert message dissemination algorithms. From the simulation results, we know that EW-ICAST is superior to Simple, P-persistence, and EDB algorithms.

  19. Towards Reliable Multi-Hop Broadcast in VANETs: An Analytical Approach

    NARCIS (Netherlands)

    Gholibeigi, Mozhdeh; Baratchi, Mitra; van den Berg, Hans Leo; Heijenk, Geert

    2016-01-01

    Intelligent Transportation Systems in the domain of vehicular networking, have recently been subject to rapid development. In vehicular ad hoc networks, data broadcast is one of the main communication types and its reliability is crucial for high performance applications. However, due to the lack of

  20. Towards reliable multi-hop broadcast in VANETs : An analytical approach

    NARCIS (Netherlands)

    Gholibeigi, M.; Baratchi, M.; Berg, J.L. van den; Heijenk, G.

    2017-01-01

    Intelligent Transportation Systems in the domain of vehicular networking, have recently been subject to rapid development. In vehicular ad hoc networks, data broadcast is one of the main communication types and its reliability is crucial for high performance applications. However, due to the lack of

  1. MUSIC algorithm DoA estimation for cooperative node location in mobile ad hoc networks

    Science.gov (United States)

    Warty, Chirag; Yu, Richard Wai; ElMahgoub, Khaled; Spinsante, Susanna

    In recent years the technological development has encouraged several applications based on distributed communications network without any fixed infrastructure. The problem of providing a collaborative early warning system for multiple mobile nodes against a fast moving object. The solution is provided subject to system level constraints: motion of nodes, antenna sensitivity and Doppler effect at 2.4 GHz and 5.8 GHz. This approach consists of three stages. The first phase consists of detecting the incoming object using a highly directive two element antenna at 5.0 GHz band. The second phase consists of broadcasting the warning message using a low directivity broad antenna beam using 2× 2 antenna array which then in third phase will be detected by receiving nodes by using direction of arrival (DOA) estimation technique. The DOA estimation technique is used to estimate the range and bearing of the incoming nodes. The position of fast arriving object can be estimated using the MUSIC algorithm for warning beam DOA estimation. This paper is mainly intended to demonstrate the feasibility of early detection and warning system using a collaborative node to node communication links. The simulation is performed to show the behavior of detecting and broadcasting antennas as well as performance of the detection algorithm. The idea can be further expanded to implement commercial grade detection and warning system

  2. Mobility Tolerant Firework Routing for Improving Reachability in MANETs

    Directory of Open Access Journals (Sweden)

    Gen Motoyoshi

    2014-03-01

    Full Text Available In this paper, we investigate our mobility-assisted and adaptive broadcast routing mechanism, called Mobility Tolerant Firework Routing (MTFR, which utilizes the concept of potentials for routing and improves node reachability, especially in situations with high mobility, by including a broadcast mechanism. We perform detailed evaluations by simulations in a mobile environment and demonstrate the advantages of MTFR over conventional potential-based routing. In particular, we show that MTFR produces better reachability in many aspects at the expense of a small additional transmission delay and intermediate traffic overhead, making MTFR a promising routing protocol and feasible for future mobile Internet infrastructures.

  3. ARSENAL: A Cross Layer Architecture for Secure Resilient Tactical Mobile AdHoc Networks

    Science.gov (United States)

    2016-01-21

    stations separated by 0.5 to 1 km can be coherently measured to a single mobile subscriber using LTE signaling. These are the first measurements of...undertake three parallel but inter-coupled tasks geared towards a) performing measurements via real deployments and enhancing our understanding of layer...dependencies and vulnerabilities in mobile ad hoc networks; these measurements will be on existing testbeds at The views, opinions and/or findings

  4. Cross-Layer Service Discovery Mechanism for OLSRv2 Mobile Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    M. Isabel Vara

    2015-07-01

    Full Text Available Service discovery plays an important role in mobile ad hoc networks (MANETs. The lack of central infrastructure, limited resources and high mobility make service discovery a challenging issue for this kind of network. This article proposes a new service discovery mechanism for discovering and advertising services integrated into the Optimized Link State Routing Protocol Version 2 (OLSRv2. In previous studies, we demonstrated the validity of a similar service discovery mechanism integrated into the previous version of OLSR (OLSRv1. In order to advertise services, we have added a new type-length-value structure (TLV to the OLSRv2 protocol, called service discovery message (SDM, according to the Generalized MANET Packet/Message Format defined in Request For Comments (RFC 5444. Each node in the ad hoc network only advertises its own services. The advertisement frequency is a user-configurable parameter, so that it can be modified depending on the user requirements. Each node maintains two service tables, one to store information about its own services and another one to store information about the services it discovers in the network. We present simulation results, that compare our service discovery integrated into OLSRv2 with the one defined for OLSRv1 and with the integration of service discovery in Ad hoc On-demand Distance Vector (AODV protocol, in terms of service discovery ratio, service latency and network overhead.

  5. Cross-Layer Service Discovery Mechanism for OLSRv2 Mobile Ad Hoc Networks.

    Science.gov (United States)

    Vara, M Isabel; Campo, Celeste

    2015-07-20

    Service discovery plays an important role in mobile ad hoc networks (MANETs). The lack of central infrastructure, limited resources and high mobility make service discovery a challenging issue for this kind of network. This article proposes a new service discovery mechanism for discovering and advertising services integrated into the Optimized Link State Routing Protocol Version 2 (OLSRv2). In previous studies, we demonstrated the validity of a similar service discovery mechanism integrated into the previous version of OLSR (OLSRv1). In order to advertise services, we have added a new type-length-value structure (TLV) to the OLSRv2 protocol, called service discovery message (SDM), according to the Generalized MANET Packet/Message Format defined in Request For Comments (RFC) 5444. Each node in the ad hoc network only advertises its own services. The advertisement frequency is a user-configurable parameter, so that it can be modified depending on the user requirements. Each node maintains two service tables, one to store information about its own services and another one to store information about the services it discovers in the network. We present simulation results, that compare our service discovery integrated into OLSRv2 with the one defined for OLSRv1 and with the integration of service discovery in Ad hoc On-demand Distance Vector (AODV) protocol, in terms of service discovery ratio, service latency and network overhead.

  6. Navigating the Path of Totality - Results and Lessons Learned from the 2017 Eclipse Broadcast, Webcast, Mobile App and Online Production

    Science.gov (United States)

    Semper, R.; Higdon, R.

    2017-12-01

    The 2017 total solar eclipse provided unique opportunity to provide public outreach about astronomy, heliophysics, and scientific discovery. The Navigating the Path of Totality project was designed to produce eclipse related educational resources including live video feeds and distribute them to museums, schools, libraries and the public through online and broadcast media. Using special telescope video camera setups, five feeds were produced including a live one hour English program and in parallel a live one hour Spanish program from Casper, WY with a cutaway to Madras, OR, complete (C1-C4) telescope only feeds from both Madras, OR and Casper, Wy, and a complete (C1-C4) telescope only feed with live musical sonification and accompaniment by the Kronos Quartet. Images from the live feeds were made available on the NASA Website, NASA TV, Exploratorium website, Exploratorium Solar Eclipse mobile app, local television and in museums, libraries and schools worldwide. Associated educational video material including images from the 2016 total eclipse from Micronesia was produced and disseminated. In this talk we will discuss the evaluation results including an examination of the effectiveness of the digital strategy of many mobile channels and mobile apps using different analytics including IBM Watson social media analytics services. We will also present the lessons learned from the project.

  7. On-the-fly Packet Error Recovery in a Cooperative Cluster of Mobile Devices

    DEFF Research Database (Denmark)

    Vingelmann, Peter; Heide, Janus; Pedersen, Morten Videbæk

    2011-01-01

    This paper investigates the possibility of packet error recovery in a cooperative cluster of mobile devices. We assume that these devices receive data from a broadcast transmission on their primary network interface (e.g. LTE network), and they are using a secondary network interface (e.g. ad hoc....... We also introduce a demo application that implements this technique on Nokia phones. Then we present our testbed and the collected measurement results in order to evaluate the performance of our protocol....

  8. 移动Ad Hoc网络路由协议综述%A Survey of Routing Protocols for Mobile Ad Hoc Networks

    Institute of Scientific and Technical Information of China (English)

    张顺亮; 叶澄清; 李方敏

    2003-01-01

    A review of current research about routing protocols for mobile Ad Hoc networks is made. Based on classifying of them, the characteristic, the strength and the weakness of these protocols are evaluated respectively. Then some crucial strategies to improve the existing routing protocols are proposed. Besides, a frame of new routing protocol for Ad Hoc networks is put forward. Finally, open issues that still need investigation are listed.

  9. Unmanned Aerial ad Hoc Networks: Simulation-Based Evaluation of Entity Mobility Models’ Impact on Routing Performance

    Directory of Open Access Journals (Sweden)

    Jean-Daniel Medjo Me Biomo

    2015-06-01

    Full Text Available An unmanned aerial ad hoc network (UAANET is a special type of mobile ad hoc network (MANET. For these networks, researchers rely mostly on simulations to evaluate their proposed networking protocols. Hence, it is of great importance that the simulation environment of a UAANET replicates as much as possible the reality of UAVs. One major component of that environment is the movement pattern of the UAVs. This means that the mobility model used in simulations has to be thoroughly understood in terms of its impact on the performance of the network. In this paper, we investigate how mobility models affect the performance of UAANET in simulations in order to come up with conclusions/recommendations that provide a benchmark for future UAANET simulations. To that end, we first propose a few metrics to evaluate the mobility models. Then, we present five random entity mobility models that allow nodes to move almost freely and independently from one another and evaluate four carefully-chosen MANET/UAANET routing protocols: ad hoc on-demand distance vector (AODV, optimized link state routing (OLSR, reactive-geographic hybrid routing (RGR and geographic routing protocol (GRP. In addition, flooding is also evaluated. The results show a wide variation of the protocol performance over different mobility models. These performance differences can be explained by the mobility model characteristics, and we discuss these effects. The results of our analysis show that: (i the enhanced Gauss–Markov (EGM mobility model is best suited for UAANET; (ii OLSR, a table-driven proactive routing protocol, and GRP, a position-based geographic protocol, are the protocols most sensitive to the change of mobility models; (iii RGR, a reactive-geographic hybrid routing protocol, is best suited for UAANET.

  10. The quandry of benchmarking broadcasts

    International Nuclear Information System (INIS)

    Karonis, N T; Supinski, B R

    1999-01-01

    A message passing library's implementation of broadcast communication can significantly affect the performance of applications built with that library. In order to choose between similar implementations or to evaluate available libraries, accurate measurements of broadcast performance are required. As we demonstrate, existing methods for measuring broadcast performance are either inaccurate or inadequate. Fortunately, we have designed an accurate method for measuring broadcast performance. Measuring broadcast performance is not simple. Simply sending one broadcast after another allows them to proceed through the network concurrently, thus resulting in accurate per broadcast timings. Existing methods either fail to eliminate this pipelining effect or eliminate it by introducing overheads that are as difficult to measure as the performance of the broadcast itself. Our method introduces a measurable overhead to eliminate the pipelining effect

  11. Deny-by-Default Distributed Security Policy Enforcement in Mobile Ad Hoc Networks

    Science.gov (United States)

    Alicherry, Mansoor; Keromytis, Angelos D.; Stavrou, Angelos

    Mobile Ad-hoc Networks (MANETs) are increasingly employed in tactical military and civil rapid-deployment networks, including emergency rescue operations and ad hoc disaster-relief networks. However, this flexibility of MANETs comes at a price, when compared to wired and base station-based wireless networks: MANETs are susceptible to both insider and outsider attacks. This is mainly because of the lack of a well-defined defense perimeter preventing the effective use of wired defenses including firewalls and intrusion detection systems.

  12. ADS-B- Automatic Dependent Surveillance- Broadcast

    Directory of Open Access Journals (Sweden)

    Borivoj Galović

    2002-01-01

    Full Text Available The CU/Tent system of air traffic is facing many drawbacksand problems that restrict its further development and makes itdifficult to follow the trends of increase in the traffic volume.By means of their technology, the systems such as ADS-8create rhe basis for further building, upgrading, improving anddeveloping of a completely new concept of the air traffic system.Through their functions they fully fit into and support the basicfunctions of communication, navigation and swveillancewhich form the basis of the new concept that needs to be implementedas soon as possible.

  13. A Survey on Trust Management for Mobile Ad Hoc Networks

    Science.gov (United States)

    2011-11-01

    expects, trust is dangerous implying the possible betrayal of trust. In his comments on Lagerspetz’s book titled Trust: The Tacit Demand, Lahno [24...AODV Zouridaki et al. (2005 ) [79] (2006) [80] Secure routing Direct observation [79][80] Reputation by secondhand information [80] Packet dropping...areas of signal processing, wireless communications, sensor and mobile ad hoc networks. He is co-editor of the book Wireless Sensor Networks: Signal

  14. Probabilistic broadcasting of mixed states

    International Nuclear Information System (INIS)

    Li Lvjun; Li Lvzhou; Wu Lihua; Zou Xiangfu; Qiu Daowen

    2009-01-01

    It is well known that the non-broadcasting theorem proved by Barnum et al is a fundamental principle of quantum communication. As we are aware, optimal broadcasting (OB) is the only method to broadcast noncommuting mixed states approximately. In this paper, motivated by the probabilistic cloning of quantum states proposed by Duan and Guo, we propose a new way for broadcasting noncommuting mixed states-probabilistic broadcasting (PB), and we present a sufficient condition for PB of mixed states. To a certain extent, we generalize the probabilistic cloning theorem from pure states to mixed states, and in particular, we generalize the non-broadcasting theorem, since the case that commuting mixed states can be exactly broadcast can be thought of as a special instance of PB where the success ratio is 1. Moreover, we discuss probabilistic local broadcasting (PLB) of separable bipartite states

  15. Applied Anthropology in Broadcasting

    Science.gov (United States)

    Eiselein, E. B.

    1976-01-01

    Three different applied media anthropology projects are described. These projects stem from the broadcasters' legal need to know about the community (community ascertainment), the broadcasters' need to know about the station audience (audience profile), and the broadcasters' desire to change a community (action projects). (Author)

  16. Model-based prototyping of an interoperability protocol for mobile ad-hoc networks

    NARCIS (Netherlands)

    Kristensen, L.M.; Westergaard, M.; Norgaard, P.C.; Romijn, J.; Smith, G.; Pol, van de J.

    2005-01-01

    We present an industrial project conducted at Ericsson Danmark A/S, Telebit where formal methods in the form of Coloured Petri Nets (CP-nets or CPNs) have been used for the specification of an interoperability protocol for routing packets between fixed core networks and mobile ad-hoc networks. The

  17. Power-Aware Intrusion Detection in Mobile Ad Hoc Networks

    Science.gov (United States)

    Şen, Sevil; Clark, John A.; Tapiador, Juan E.

    Mobile ad hoc networks (MANETs) are a highly promising new form of networking. However they are more vulnerable to attacks than wired networks. In addition, conventional intrusion detection systems (IDS) are ineffective and inefficient for highly dynamic and resource-constrained environments. Achieving an effective operational MANET requires tradeoffs to be made between functional and non-functional criteria. In this paper we show how Genetic Programming (GP) together with a Multi-Objective Evolutionary Algorithm (MOEA) can be used to synthesise intrusion detection programs that make optimal tradeoffs between security criteria and the power they consume.

  18. Context dependent off loading for cloudlet in mobile ad-hoc network

    Science.gov (United States)

    Bhatt, N.; Nadesh, R. K.; ArivuSelvan, K.

    2017-11-01

    Cloud Computing in Mobile Ad-hoc network is emerging part of research consideration as the demand and competency of mobile devices increased in last few years. To follow out operation within the remote cloud builds the postponement and influences the administration standard. To keep away from this trouble cloudlet is presented. Cloudlet gives identical support of the devices as cloud at low inactivity however at high transfer speed. Be that as it may, choice of a cloudlet for offloading calculation with flat energy is a noteworthy test if multiple cloud let is accessible adjacent. Here I proposed energy and bandwidth (Traffic overload for communication with cloud) aware cloudlet selection strategy based on the context dependency of the device location. It works on the basis of mobile device location and bandwidth availability of cloudlet. The cloudlet offloading and selection process using given solution is simulated in Cloud ~ Simulator.

  19. Theme Issue: European Broadcasting.

    Science.gov (United States)

    Howkins, John, Ed.

    1977-01-01

    In this document separate articles deal with the following topics: recommendations for future British broadcasting policies that recently were proposed to the British Parliament by the Committee on the Future of Broadcasting; specific media goals set by the Swedish Committee on Broadcasting; communications policy making in Austria; a new…

  20. Broadcasting house

    DEFF Research Database (Denmark)

    Sattrup, Peter Andreas

    2008-01-01

    Regarding the transformation of the Danish Broadcasting Hq. (1934-1945) in Frederiksberg by Vilhelm Lauritzen into the Royal Danish Academy of Music. Analysis, principles, flexibility and change.......Regarding the transformation of the Danish Broadcasting Hq. (1934-1945) in Frederiksberg by Vilhelm Lauritzen into the Royal Danish Academy of Music. Analysis, principles, flexibility and change....

  1. Quasi-ADS-B Based UAV Conflict Detection and Resolution to Manned Aircraft

    Directory of Open Access Journals (Sweden)

    Chin E. Lin

    2015-01-01

    Full Text Available A Conflict Detection and Resolution (CD&R system for manned/unmanned aerial vehicle (UAV based on Automatic Dependent Surveillance-Broadcast (ADS-B concept is designed and verified in this paper. The 900 MHz XBee-Pro is selected as data transponder to broadcast flight information among participating aircraft in omnirange. Standard Compact Position Report (CPR format packet data are automatically broadcasted by ID sequencing under Quasi-ADS-B mechanism. Time Division Multiple Access (TDMA monitoring checks the designated time slot and reallocates the conflict ID. This mechanism allows the transponder to effectively share data with multiple aircraft in near airspace. The STM32f103 microprocessor is designed to handle RF, GPS, and flight data with Windows application on manned aircraft and ground control station simultaneously. Different conflict detection and collision avoidance algorithms can be implemented into the system to ensure flight safety. The proposed UAV/CD&R using Quasi-ADS-B transceiver is tested using ultralight aircraft flying at 100–120 km/hr speed in small airspace for mission simulation. The proposed hardware is also useful to additional applications to mountain hikers for emergency search and rescue. The fundamental function by the proposed UAV/CD&R using Quasi-ADS-B is verified with effective signal broadcasting for surveillance and efficient collision alert and avoidance performance to low altitude flights.

  2. The Viability of Mobile Services (SMS and Cell Broadcast in Emergency Management Solutions: An Exploratory Study

    Directory of Open Access Journals (Sweden)

    Mahmoud Al-dalahmeh

    2018-01-01

    Full Text Available In this paper the path forward in location-based mobile phone warning systems is given against a concise backdrop of their deployment worldwide. Of relevance here is (i how the systems are implemented using legislation, contractual service level agreement instruments or a hybrid approach, (ii whether or not governments who deploy these systems will carry the cost of the deployment during an emergency or disaster, and (iii whether or not carrier participation is mandated. Of particular importance are also the underlying technologies of this kind of emergency systems. To date, the short message service and cell broadcast service have been the main technologies to be utilised by governments in the application of location-based services in modern emergency management solutions. However, these technologies will most certainly be superseded by newer, more powerful capabilities. A comprehensive list of requirements for the future location-based emergency systems is presented also in this paper. In essence, these are recommendations to be adhered to if robust solutions using new technologies are to be deployed in a nation state.

  3. A framework for reactive optimization in mobile ad hoc networks

    DEFF Research Database (Denmark)

    McClary, Dan; Syrotiuk, Violet; Kulahci, Murat

    2008-01-01

    We present a framework to optimize the performance of a mobile ad hoc network over a wide range of operating conditions. It includes screening experiments to quantify the parameters and interactions among parameters influential to throughput. Profile-driven regression is applied to obtain a model....... The predictive accuracy of the model is monitored and used to update the model dynamically. The results indicate the framework may be useful for the optimization of dynamic systems of high dimension....

  4. Economic Theory and Broadcasting.

    Science.gov (United States)

    Bates, Benjamin J.

    Focusing on access to audience through broadcast time, this paper examines the status of research into the economics of broadcasting. The paper first discusses the status of theory in the study of broadcast economics, both as described directly and as it exists in the statement of the basic assumptions generated by prior work and general…

  5. 8 CFR 204.13 - How can the International Broadcasting Bureau of the United States Broadcasting Board of...

    Science.gov (United States)

    2010-01-01

    ... description of the job to be performed; and (ii) The broadcasting expertise held by the alien, including how... broadcasts; hosts for news broadcasts, news analysis, editorial and other broadcast features; or a news analysis specialist. The term broadcaster does not include individuals performing purely technical or...

  6. 47 CFR 0.434 - Data bases and lists of authorized broadcast stations and pending broadcast applications.

    Science.gov (United States)

    2010-10-01

    ... stations and pending broadcast applications. 0.434 Section 0.434 Telecommunication FEDERAL COMMUNICATIONS... Commission § 0.434 Data bases and lists of authorized broadcast stations and pending broadcast applications... broadcast stations, pending applications for such stations, and rulemaking proceedings involving amendments...

  7. Analysis of DDoS Attack Effect and Protection Scheme in Wireless Mobile Ad-hoc Network

    OpenAIRE

    Ramratan Ahirwal; Leeladhar Mahour

    2012-01-01

    In Wireless mobile Ad Hoc Networks (MANET) every node functions as transmitter, router and data sink is network without infrastructure. Detecting malicious nodes in an open ad-hoc network in whichparticipating nodes have no previous security associations presents a number of challenges not faced by traditional wired networks. Traffic monitoring in wired networks is usually performed at switches,routers and gateways, but an ad-hoc network does not have these types of network elements where the...

  8. Impact of mobility on the performance7 of relaying in ad hoc networks – Extended version

    NARCIS (Netherlands)

    Al Hanbali, Ahmad; Kherani, A.A.; Groenevelt, R.; Nain, P.; Altman, E

    2007-01-01

    We consider a mobile ad hoc network consisting of three types of nodes: source, destination, and relay nodes. All the nodes are moving over a bounded region with possibly different mobility patterns. We introduce and study the notion of relay throughput, i.e. the maximum rate at which a node can

  9. Link reliability based hybrid routing for tactical mobile ad hoc network

    Institute of Scientific and Technical Information of China (English)

    Xie Xiaochuan; Wei Gang; Wu Keping; Wang Gang; Jia Shilou

    2008-01-01

    Tactical mobile ad hoc network (MANET) is a collection of mobile nodes forming a temporary network,without the aid of pre-established network infrastructure. The routing protocol has a crucial impact on the networkperformance in battlefields. Link reliability based hybrid routing (LRHR) is proposed, which is a novel hybrid routing protocol, for tactical MANET. Contrary to the traditional single path routing strategy, multiple paths are established between a pair of source-destination nodes. In the hybrid routing strategy, the rate of topological change provides a natural mechanism for switching dynamically between table-driven and on-demand routing. The simulation results indicate that the performances of the protocol in packet delivery ratio, routing overhead, and average end-to-end delay are better than the conventional routing protocol.

  10. The political attack ad

    Directory of Open Access Journals (Sweden)

    Palma Peña-Jiménez, Ph.D.

    2011-01-01

    Full Text Available During election campaigns the political spot has a clear objective: to win votes. This message is communicated to the electorate through television and Internet, and usually presents a negative approach, which includes a direct critical message against the opponent, rather than an exposition of proposals. This article is focused on the analysis of the campaign attack video ad purposely created to encourage the disapproval of the political opponent among voters. These ads focus on discrediting the opponent, many times, through the transmission of ad hominem messages, instead of disseminating the potential of the political party and the virtues and manifesto of its candidate. The article reviews the development of the attack ad since its first appearance, which in Spain dates back to 1996, when the famous Doberman ad was broadcast, and examines the most memorable campaign attack ads.

  11. An Agent-Based Approach To Nodes Misbehaviour Detection In Mobile Ad-Hoc Networks

    Directory of Open Access Journals (Sweden)

    Otor Samera U.

    2017-02-01

    Full Text Available Existing Misbehaviour Detection Systems in Mobile Ad-hoc Networks MANETs are challenged with routing overhead and high latency resulting from complexity and failure to isolate and block misbehaving nodes for the reason that it is difficult to detect them as they participate fully in route finding. In this work a Mobile Agent-Based Acknowledgement scheme MAACK was formulated to address this problem using an object oriented algorithm deployed to report misbehaving nodes to the source and destination by registering the Internet Protocol IP address of misbehaving nodes in their header. The scheme was simulated using Network Simulator-3 NS-3 and results benchmarked with an existing scheme the Enhanced Adaptive Acknowledgment EAACK using packet delivery ratio routing overhead and latency as performance metrics in the two scenarios. The results showed that the MAACK paradigm guaranteed a higher packet delivery ratio lower latency and routing overhead than the EAACK scheme. The model can be adapted by Ad-Hoc network protocol developers.

  12. Broadcast Services. Information Bulletin No. 3.

    Science.gov (United States)

    Federal Communications Commission, Washington, DC.

    Radio and television broadcasting is authorized and regulated by the Federal Communications Commission (FCC). Following a brief description of the development of broadcasting, broadcast regulations, and the Commission, this report examines various aspects of the subject pertaining to the fairness doctrine, political broadcasting, advertising, sale…

  13. A COMPREHENSIVE SURVEY ON DETECTING BLACK HOLE ATTACK IN MOBILE AD-HOC NETWORK (MANET

    Directory of Open Access Journals (Sweden)

    Pascal Maniriho

    2018-01-01

    Full Text Available The infrastructure-less nature and mobility of nodes in mobile ad-hoc network (MANET make it to be very susceptible to various attacks. Besides, owing to its flexibility and simplicity, there is no predefined time or permission set for nodes to leave or join the network and each node can act as a client or server.  Nevertheless, securing communication between nodes has become a challenging problem than in other types of network. Attacks in MANET range into different categories. Black hole attack is one of the attacks that has been addressed by many researchers in the recent years. It does occur when a harmful mobile node called black hole becomes a part of the network and tries to use its malicious behaviors by sending fake route reply packets (RREP for any received route request packets (RREQ. When these faked packets arrive to the source node, it does reply to them by sending data packet via the established route. Once the packets are received by the black hole, it drops them before reaching the destination.  Hence, preventing the source node from reaching the intended destination. In this paper, we present an overview of a wide range of techniques suggested in the literature for detecting and preventing black hole attacks in mobile ad hoc network. Additionally, the effect of each approach on the network performance is also presented.

  14. The added value of a gaming context and intelligent adaptation for a mobile application for vocabulary learning

    NARCIS (Netherlands)

    Sandberg, J.; Maris, M.; Hoogendoorn, P.

    2014-01-01

    Two groups participated in a study on the added value of a gaming context and intelligent adaptation for a mobile learning application. The control group worked at home for a fortnight with the original Mobile English Learning application (MEL-original) developed in a previous project. The

  15. Generating Ideas for New Mobile TV Services:Accepting and Socializing Mobile Television

    OpenAIRE

    Sørensen, Lene Tolstrup; Nicolajsen, Hanne Westh

    2010-01-01

    Mobile TV is still in its infancy in respect to identifying new services/content, which deploy the technology convergence of broadcasting, Internet and radio while satisfying the user with respect to interactivity, sociability and content, and at the same time fit the small screen of a mobile phone. This paper reports on a semi-field trial performed with a group of young, IT literate users provided with handheld devices and the possibility of watching mobile TV as a basis for creation of idea...

  16. Implications of Internet on Broadcasting

    DEFF Research Database (Denmark)

    Henten, Anders; Tadayoni, Reza

    One of the main challenges within broadcasting research in the recent years has been to understand the evolution from traditional broadcasting to digital broadcasting. The aim of this paper is to step further and give an analysis of Internet’s influence on traditional broadcasting services....... In this analysis an inter-disciplinary approach is used, where technological, economic, political and cultural drivers and barriers in this development are identified. It is then shown to what degree these parameters and the inter-relation between them influence this development....

  17. 76 FR 22160 - Fifty-Fourth Meeting: RTCA Special Committee 186: Automatic Dependent Surveillance-Broadcast (ADS-B)

    Science.gov (United States)

    2011-04-20

    ... Rooms, 1828 L Street, NW., Suite 805, Washington, DC 20036. FOR FURTHER INFORMATION CONTACT: RTCA Secretariat, 1828 L Street, NW., Suite 805, Washington, DC, 20036, (202) 833-9339; fax (202) 833-9434; Web.... 035-11/SC186-307 FAA Surveillance and Broadcast Services (SBS) Program Status Traffic Situation...

  18. Secure neighborhood discovery: A fundamental element for mobile ad hoc networking

    DEFF Research Database (Denmark)

    Papadimitratos, P.; Poturalski, M.; Schaller, P.

    2008-01-01

    Pervasive computing systems will likely be deployed in the near future, with the proliferation of wireless devices and the emergence of ad hoc networking as key enablers. Coping with mobility and the volatility of wireless communications in such systems is critical. Neighborhood discovery (ND......) - the discovery of devices directly reachable for communication or in physical proximity - becomes a fundamental requirement and building block for various applications. However, the very nature of wireless mobile networks makes it easy to abuse ND and thereby compromise the overlying protocols and applications....... Thus, providing methods to mitigate this vulnerability and secure ND is crucial. In this article we focus on this problem and provide definitions of neighborhood types and ND protocol properties, as well as a broad classification of attacks. Our ND literature survey reveals that securing ND is indeed...

  19. VisitSense: Sensing Place Visit Patterns from Ambient Radio on Smartphones for Targeted Mobile Ads in Shopping Malls

    Science.gov (United States)

    Kim, Byoungjip; Kang, Seungwoo; Ha, Jin-Young; Song, Junehwa

    2015-01-01

    In this paper, we introduce a novel smartphone framework called VisitSense that automatically detects and predicts a smartphone user’s place visits from ambient radio to enable behavioral targeting for mobile ads in large shopping malls. VisitSense enables mobile app developers to adopt visit-pattern-aware mobile advertising for shopping mall visitors in their apps. It also benefits mobile users by allowing them to receive highly relevant mobile ads that are aware of their place visit patterns in shopping malls. To achieve the goal, VisitSense employs accurate visit detection and prediction methods. For accurate visit detection, we develop a change-based detection method to take into consideration the stability change of ambient radio and the mobility change of users. It performs well in large shopping malls where ambient radio is quite noisy and causes existing algorithms to easily fail. In addition, we proposed a causality-based visit prediction model to capture the causality in the sequential visit patterns for effective prediction. We have developed a VisitSense prototype system, and a visit-pattern-aware mobile advertising application that is based on it. Furthermore, we deploy the system in the COEX Mall, one of the largest shopping malls in Korea, and conduct diverse experiments to show the effectiveness of VisitSense. PMID:26193275

  20. VisitSense: Sensing Place Visit Patterns from Ambient Radio on Smartphones for Targeted Mobile Ads in Shopping Malls.

    Science.gov (United States)

    Kim, Byoungjip; Kang, Seungwoo; Ha, Jin-Young; Song, Junehwa

    2015-07-16

    In this paper, we introduce a novel smartphone framework called VisitSense that automatically detects and predicts a smartphone user's place visits from ambient radio to enable behavioral targeting for mobile ads in large shopping malls. VisitSense enables mobile app developers to adopt visit-pattern-aware mobile advertising for shopping mall visitors in their apps. It also benefits mobile users by allowing them to receive highly relevant mobile ads that are aware of their place visit patterns in shopping malls. To achieve the goal, VisitSense employs accurate visit detection and prediction methods. For accurate visit detection, we develop a change-based detection method to take into consideration the stability change of ambient radio and the mobility change of users. It performs well in large shopping malls where ambient radio is quite noisy and causes existing algorithms to easily fail. In addition, we proposed a causality-based visit prediction model to capture the causality in the sequential visit patterns for effective prediction. We have developed a VisitSense prototype system, and a visit-pattern-aware mobile advertising application that is based on it. Furthermore, we deploy the system in the COEX Mall, one of the largest shopping malls in Korea, and conduct diverse experiments to show the effectiveness of VisitSense.

  1. Optic Fibers as a Broadcasting Media

    Directory of Open Access Journals (Sweden)

    Jusuf QARKAXHIJA

    2018-04-01

    Full Text Available Fast brodcasting of an information is always a challange from our daily activities. Through fast broadcasting of the information always created pre-eminence in military activities, business, researching, etc. From ancient times we know that information was orally and hand in hand broadcasted which in most of the times casused in loss of information and due to this also in loss of activities which are mentioned above. Due to information technology notably computer networks and internet overtime information started broadcasting faster. Information started broadcasting through copper wires and through wireless. Big applications started to develop with the increased use of Internet, high quality broadcasting (HD, video on demand broadcasting (VoD, triple pay broadcasting (three services on a medium, etc., then these two mediums couldn’t complete all these requests. Therfore after these problems, optic fiber began to be used as a broadcasting medium which eleminated all the defects of other mediums. Importance of this paper work is telling developing stages of optic fiber, it’s characteristics and it’s losses. Then it is shown that which devises enforce the signal of fibers and in the end all three mediums that we mentioned are compared on the basis of attributes. Findings form the paper will only enforce that knowledge we had before about optic fiber, the best broadcasting medium.

  2. The Use of Television Format Adaptation in Denmark: Public Service Broadcasters Compared to Commercial Broadcasters

    DEFF Research Database (Denmark)

    Jensen, Pia Majbritt

    brought about major changes in both production and scheduling. This paper evaluates the impact that format adaptation has had in Denmark on public service broadcasters (PSBs) compared to commercial broadcasters. To illustrate transnational differences, references are made to Germany and Australia. First......, a quantitative analysis of PSB and commercial schedules in Denmark is presented to establish the extent to which PSBs have employed formats between 2000 and 2012, and how this compares with commercial broadcasters. Secondly, a qualitative analysis looks into genre and the nature of the individual formats...... employed to assess any important differences between the formats in the two sectors. Most formats fall within entertainment and is well suited to providing the consumption friendly environment that commercial broadcasters seek to offer their advertising clients (Brennan 2012). Broadcasters also favour...

  3. Commercial satellite broadcasting for Europe

    Science.gov (United States)

    Forrest, J. R.

    1988-12-01

    A review is presented of the current television broadcasting situation in European countries, which involves a varied mix of terrestrial VHF or UHF systems and cable networks. A small market has emerged in Europe for receivers using the low-power telecommunications satellite transmission between the program providers and cable network companies. This is expected to change with the launch of medium-power pan-European telecommunication satellites (e.g. ASTRA, EUTELSAT II), which are now directly addressing the market of home reception. DBS (direct broadcast satellite) in the UK, using the D-MAC transmission standard, will offer three additional television channels, data broadcasting services, and a planned evolution to compatible forms of wide-screen, high-definition television. Comments are given on receiver and conditional access system standardization. Some views are expressed on satellite broadcasting as part of an overall broadcasting framework for the future.

  4. A DNA-Inspired Encryption Methodology for Secure, Mobile Ad Hoc Networks

    Science.gov (United States)

    Shaw, Harry

    2012-01-01

    Users are pushing for greater physical mobility with their network and Internet access. Mobile ad hoc networks (MANET) can provide an efficient mobile network architecture, but security is a key concern. A figure summarizes differences in the state of network security for MANET and fixed networks. MANETs require the ability to distinguish trusted peers, and tolerate the ingress/egress of nodes on an unscheduled basis. Because the networks by their very nature are mobile and self-organizing, use of a Public Key Infra structure (PKI), X.509 certificates, RSA, and nonce ex changes becomes problematic if the ideal of MANET is to be achieved. Molecular biology models such as DNA evolution can provide a basis for a proprietary security architecture that achieves high degrees of diffusion and confusion, and resistance to cryptanalysis. A proprietary encryption mechanism was developed that uses the principles of DNA replication and steganography (hidden word cryptography) for confidentiality and authentication. The foundation of the approach includes organization of coded words and messages using base pairs organized into genes, an expandable genome consisting of DNA-based chromosome keys, and a DNA-based message encoding, replication, and evolution and fitness. In evolutionary computing, a fitness algorithm determines whether candidate solutions, in this case encrypted messages, are sufficiently encrypted to be transmitted. The technology provides a mechanism for confidential electronic traffic over a MANET without a PKI for authenticating users.

  5. Performance Evaluation and Parameter Optimization of SoftCast Wireless Video Broadcast

    Directory of Open Access Journals (Sweden)

    Dongxue Yang

    2015-08-01

    Full Text Available Wireless video broadcast plays an imp ortant role in multimedia communication with the emergence of mobile video applications. However, conventional video broadcast designs suffer from a cliff effect due to separated source and channel encoding. The newly prop osed SoftCast scheme employs a cross-layer design, whose reconstructed video quality is prop ortional to the channel condition. In this pap er, we provide the p erformance evaluation and the parameter optimization of the SoftCast system. Optimization principles on parameter selection are suggested to obtain a b etter video quality, o ccupy less bandwidth and/or utilize lower complexity. In addition, we compare SoftCast with H.264 in the LTE EPA scenario. The simulation results show that SoftCast provides a b etter p erformance in the scalability to channel conditions and the robustness to packet losses.

  6. Broadcasting of inseparability

    International Nuclear Information System (INIS)

    Adhikari, Satyabrata; Choudhury, B S; Chakrabarty, Indranil

    2006-01-01

    Suppose we are given an entangled pair and asked how well we can produce two entangled pairs starting from a given entangled pair using only local operations. To respond to this question, we study broadcasting of entanglement using a state-dependent quantum cloning machine as a local copier. We show that the length of the interval for probability-amplitude-squared α 2 for broadcasting of entanglement using a state-dependent cloner can be made larger than the length of the interval for probability-amplitude-squared for broadcasting entanglement using a state-independent cloner. Further we show that there exists a local state-dependent cloner which gives better quality copy (in terms of average fidelity) of an entangled pair than the local universal cloner

  7. A Resource Curriculum in Broadcast Media. Bulletin No. 8025.

    Science.gov (United States)

    Herian, Roger; Moen, Mary

    A resource for teachers who design instructional programs in broadcast media, this curriculum guide consists of eight units which deal with the nature of broadcast media, broadcast programming and public interest, broadcast advertising, broadcast regulation, societal effects of broadcasting, broadcasting and future technology, radio broadcasting,…

  8. Synchronous Design and Test of Distributed Passive Radar Systems Based on Digital Broadcasting and Television

    Directory of Open Access Journals (Sweden)

    Wan Xianrong

    2017-02-01

    Full Text Available Digital broadcasting and television are important classes of illuminators of opportunity for passive radars. Distributed and multistatic structure are the development trends for passive radars. Most modern digital broadcasting and television systems work on a network, which not only provides a natural condition to distributed passive radar but also puts forward higher requirements on the design of passive radar systems. Among those requirements, precise synchronization among the receivers and transmitters as well as among multiple receiving stations, which mainly involves frequency and time synchronization, is the first to be solved. To satisfy the synchronization requirements of distributed passive radars, a synchronization scheme based on GPS is presented in this paper. Moreover, an effective scheme based on the China Mobile Multimedia Broadcasting signal is proposed to test the system synchronization performance. Finally, the reliability of the synchronization design is verified via the distributed multistatic passive radar experiments.

  9. Real Time Synchronization of Live Broadcast Streams with User Generated Content and Social Network Streams

    NARCIS (Netherlands)

    Stokking, H.M.; Kaptein, A.M.; Veenhuizen, A.T.; Spitters4, M.M.; Niamut, O.A.

    2013-01-01

    This paper describes the work in the FP7 STEER project on augmenting a live broadcast with live user generated content. This user generated content consists of both video content, captured with mobile devices, and social network content, such as Facebook or Twitter messages. To enable multi-source

  10. A communication theoretical analysis of FRET-based mobile ad hoc molecular nanonetworks.

    Science.gov (United States)

    Kuscu, Murat; Akan, Ozgur B

    2014-09-01

    Nanonetworks refer to a group of nanosized machines with very basic operational capabilities communicating to each other in order to accomplish more complex tasks such as in-body drug delivery, or chemical defense. Realizing reliable and high-rate communication between these nanomachines is a fundamental problem for the practicality of these nanonetworks. Recently, we have proposed a molecular communication method based on Förster Resonance Energy Transfer (FRET) which is a nonradiative excited state energy transfer phenomenon observed among fluorescent molecules, i.e., fluorophores. We have modeled the FRET-based communication channel considering the fluorophores as single-molecular immobile nanomachines, and shown its reliability at high rates, and practicality at the current stage of nanotechnology. In this study, for the first time in the literature, we investigate the network of mobile nanomachines communicating through FRET. We introduce two novel mobile molecular nanonetworks: FRET-based mobile molecular sensor/actor nanonetwork (FRET-MSAN) which is a distributed system of mobile fluorophores acting as sensor or actor node; and FRET-based mobile ad hoc molecular nanonetwork (FRET-MAMNET) which consists of fluorophore-based nanotransmitter, nanoreceivers and nanorelays. We model the single message propagation based on birth-death processes with continuous time Markov chains. We evaluate the performance of FRET-MSAN and FRET-MAMNET in terms of successful transmission probability and mean extinction time of the messages, system throughput, channel capacity and achievable communication rates.

  11. Generating Ideas for New Mobile TV Services

    DEFF Research Database (Denmark)

    Sørensen, Lene Tolstrup; Nicolajsen, Hanne Westh

    2010-01-01

    Mobile TV is still in its infancy in respect to identifying new services/content, which deploy the technology convergence of broadcasting, Internet and radio while satisfying the user with respect to interactivity, sociability and content, and at the same time fit the small screen of a mobile phone...

  12. 47 CFR 73.3572 - Processing of TV broadcast, Class A TV broadcast, low power TV, TV translators, and TV booster...

    Science.gov (United States)

    2010-10-01

    ... 47 Telecommunication 4 2010-10-01 2010-10-01 false Processing of TV broadcast, Class A TV broadcast, low power TV, TV translators, and TV booster applications. 73.3572 Section 73.3572... Rules Applicable to All Broadcast Stations § 73.3572 Processing of TV broadcast, Class A TV broadcast...

  13. Integrated Social and Quality of Service Trust Management of Mobile Groups in Ad Hoc Networks

    Science.gov (United States)

    2013-01-01

    high resiliency to malicious attacks and misbehaving nodes. Keywords—trust management; mobile ad hoc networks; QoS trust; social trust; trust...paper we address an importance issue of trust management protocol design for MANETs: trust bias minimization despite misbehaving nodes performing

  14. An Automated Tool for the Creation of Desired Emulated Topologies of a Mobile Ad-Hoc Network

    National Research Council Canada - National Science Library

    Nguyen, Binh Q

    2006-01-01

    This report documents a research effort that the U.S. Army Research Laboratory conducted in FY 2005 in support of the development of advanced technologies for tactical mobile ad hoc networks (MANET...

  15. VisitSense: Sensing Place Visit Patterns from Ambient Radio on Smartphones for Targeted Mobile Ads in Shopping Malls

    Directory of Open Access Journals (Sweden)

    Byoungjip Kim

    2015-07-01

    Full Text Available In this paper, we introduce a novel smartphone framework called VisitSense that automatically detects and predicts a smartphone user’s place visits from ambient radio to enable behavioral targeting for mobile ads in large shopping malls. VisitSense enables mobile app developers to adopt visit-pattern-aware mobile advertising for shopping mall visitors in their apps. It also benefits mobile users by allowing them to receive highly relevant mobile ads that are aware of their place visit patterns in shopping malls. To achieve the goal, VisitSense employs accurate visit detection and prediction methods. For accurate visit detection, we develop a change-based detection method to take into consideration the stability change of ambient radio and the mobility change of users. It performs well in large shopping malls where ambient radio is quite noisy and causes existing algorithms to easily fail. In addition, we proposed a causality-based visit prediction model to capture the causality in the sequential visit patterns for effective prediction. We have developed a VisitSense prototype system, and a visit-pattern-aware mobile advertising application that is based on it. Furthermore, we deploy the system in the COEX Mall, one of the largest shopping malls in Korea, and conduct diverse experiments to show the effectiveness of VisitSense.

  16. Specification and Validation of an Edge Router Discovery Protocol for Mobile Ad Hoc Networks

    DEFF Research Database (Denmark)

    Kristensen, Lars Michael; Jensen, Kurt

    2004-01-01

    We present an industrial project at Ericsson Telebit A/S where Coloured Petri Nets (CP-nets or CPNs) have been used for the design and specification of an edge router discovery protocol for mobile ad-hoc networks. The Edge Router Discovery Protocol (ERDP) supports an edge router in a stationary...

  17. The impact of emotional tone, message, and broadcast parameters in youth anti-smoking advertisements.

    Science.gov (United States)

    Biener, Lois; Ji, Ming; Gilpin, Elizabeth A; Albers, Alison B

    2004-01-01

    In the context of controversy regarding the optimal characteristics of anti-smoking advertisements for youth, this study examines the impact on recall and perceived effectiveness of variations in the message, emotional tone, reach and frequency of broadcast, remoteness of broadcast, and characteristics of the adolescent audience such as changes in smoking behavior, ownership of cigarette promotional items, and demographic variables. A two-wave longitudinal survey of a population-based sample of 618 Massachusetts youth 12 to 15 years old was carried out in 1993 and 1997. A Generalized Estimating Equation (GEE) approach was used to model the recall and perceived effectiveness of eight advertisements as a function of viewer and ad characteristics. Advertisements featuring messages about serious health consequences which had been independently rated as high in negative emotion were more likely to be recalled and were perceived as more effective by youth survey respondents than ads featuring messages about normative behavior for teens or ads relying on humor. Advertising intensity, while contributing to recall, was negatively related to perceived effectiveness. This study supports mounting evidence that negative emotion in anti-smoking advertisements is effective with youth audiences.

  18. Securing mobile ad hoc networks using danger theory-based artificial immune algorithm.

    Science.gov (United States)

    Abdelhaq, Maha; Alsaqour, Raed; Abdelhaq, Shawkat

    2015-01-01

    A mobile ad hoc network (MANET) is a set of mobile, decentralized, and self-organizing nodes that are used in special cases, such as in the military. MANET properties render the environment of this network vulnerable to different types of attacks, including black hole, wormhole and flooding-based attacks. Flooding-based attacks are one of the most dangerous attacks that aim to consume all network resources and thus paralyze the functionality of the whole network. Therefore, the objective of this paper is to investigate the capability of a danger theory-based artificial immune algorithm called the mobile dendritic cell algorithm (MDCA) to detect flooding-based attacks in MANETs. The MDCA applies the dendritic cell algorithm (DCA) to secure the MANET with additional improvements. The MDCA is tested and validated using Qualnet v7.1 simulation tool. This work also introduces a new simulation module for a flooding attack called the resource consumption attack (RCA) using Qualnet v7.1. The results highlight the high efficiency of the MDCA in detecting RCAs in MANETs.

  19. BLESSED with Opportunistic Beacons: A Lightweight Data Dissemination Model for Smart Mobile Ad-Hoc Networks

    NARCIS (Netherlands)

    Türkes, Okan; Scholten, Johan; Havinga, Paul J.M.

    2015-01-01

    This paper introduces BLESSED, a universal opportunistic ad hoc networking model intended for smart mobile devices. It enables fast and lightweight data dissemination in wireless community networks through the complementary utilization of the IEEE 802.11 and Bluetooth Low Energy standards. As a

  20. An enhanced performance through agent-based secure approach for mobile ad hoc networks

    Science.gov (United States)

    Bisen, Dhananjay; Sharma, Sanjeev

    2018-01-01

    This paper proposes an agent-based secure enhanced performance approach (AB-SEP) for mobile ad hoc network. In this approach, agent nodes are selected through optimal node reliability as a factor. This factor is calculated on the basis of node performance features such as degree difference, normalised distance value, energy level, mobility and optimal hello interval of node. After selection of agent nodes, a procedure of malicious behaviour detection is performed using fuzzy-based secure architecture (FBSA). To evaluate the performance of the proposed approach, comparative analysis is done with conventional schemes using performance parameters such as packet delivery ratio, throughput, total packet forwarding, network overhead, end-to-end delay and percentage of malicious detection.

  1. Building Realistic Mobility Models for Mobile Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    Adrian Pullin

    2018-04-01

    Full Text Available A mobile ad hoc network (MANET is a self-configuring wireless network in which each node could act as a router, as well as a data source or sink. Its application areas include battlefields and vehicular and disaster areas. Many techniques applied to infrastructure-based networks are less effective in MANETs, with routing being a particular challenge. This paper presents a rigorous study into simulation techniques for evaluating routing solutions for MANETs with the aim of producing more realistic simulation models and thereby, more accurate protocol evaluations. MANET simulations require models that reflect the world in which the MANET is to operate. Much of the published research uses movement models, such as the random waypoint (RWP model, with arbitrary world sizes and node counts. This paper presents a technique for developing more realistic simulation models to test and evaluate MANET protocols. The technique is animation, which is applied to a realistic scenario to produce a model that accurately reflects the size and shape of the world, node count, movement patterns, and time period over which the MANET may operate. The animation technique has been used to develop a battlefield model based on established military tactics. Trace data has been used to build a model of maritime movements in the Irish Sea. Similar world models have been built using the random waypoint movement model for comparison. All models have been built using the ns-2 simulator. These models have been used to compare the performance of three routing protocols: dynamic source routing (DSR, destination-sequenced distance-vector routing (DSDV, and ad hoc n-demand distance vector routing (AODV. The findings reveal that protocol performance is dependent on the model used. In particular, it is shown that RWP models do not reflect the performance of these protocols under realistic circumstances, and protocol selection is subject to the scenario to which it is applied. To

  2. Broadcast Coded Slotted ALOHA

    DEFF Research Database (Denmark)

    Ivanov, Mikhail; Brännström, Frederik; Graell i Amat, Alexandre

    2016-01-01

    We propose an uncoordinated medium access control (MAC) protocol, called all-to-all broadcast coded slotted ALOHA (B-CSA) for reliable all-to-all broadcast with strict latency constraints. In B-CSA, each user acts as both transmitter and receiver in a half-duplex mode. The half-duplex mode gives ...

  3. Relation between 'no broadcasting' for noncommuting states and 'no local broadcasting' for quantum correlations

    International Nuclear Information System (INIS)

    Luo Shunlong; Li Nan; Cao Xuelian

    2009-01-01

    The no-broadcasting theorem, first established by Barnum et al. [Phys. Rev. Lett. 76, 2818 (1996)], states that a set of quantum states can be broadcast if and only if it constitutes a commuting family. Quite recently, Piani et al. [Phys. Rev. Lett. 100, 090502 (2008)] showed, by using an ingenious and sophisticated method, that the correlations in a single bipartite state can be locally broadcast if and only if the state is effectively a classical one (i.e., the correlations therein are classical). In this Brief Report, under the condition of nondegenerate spectrum, we provide an alternative and significantly simpler proof of the latter result based on the original no-broadcasting theorem and the monotonicity of the quantum relative entropy. This derivation motivates us to conjecture the equivalence between these two elegant yet formally different no-broadcasting theorems and indicates a subtle and fundamental issue concerning spectral degeneracy which also lies at the heart of the conflict between the von Neumann projection postulate and the Lueders ansatz for quantum measurements. This relation not only offers operational interpretations for commutativity and classicality but also illustrates the basic significance of noncommutativity in characterizing quantumness from the informational perspective.

  4. Generating ideas for new mobile TV services - Accepting and socializing mobile television

    DEFF Research Database (Denmark)

    Sørensen, L.; Nicolajsen, Hanne Westh

    2010-01-01

    Mobile TV is still in its infancy in respect to identifying new services/content, which deploy the technology convergence of broadcasting, Internet and radio while satisfying the user with respect to interactivity, sociability and content, and at the same time fit the small screen of a mobile phone....... This paper reports on a semi-field trial performed with a group of young, IT literate users provided with handheld devices and the possibility of watching mobile TV as a basis for creation of ideas for more advanced services. The results shows that this group of users looks for personalized services...

  5. Illustration, detection and prevention of sleep deprivation anomaly in mobile ad hoc networks

    International Nuclear Information System (INIS)

    Nadeem, A.; Ahsan, K.; Sarim, M.

    2017-01-01

    MANETs (Mobile Ad Hoc Networks) have applications in various walks of life from rescue operations to battle field operations, personal and commercial. However, routing operations in MANETs are still vulnerable to anomalies and DoS (Denial of Service) attacks such as sleep deprivation. In SD (Sleep Deprivation) attack malicious node exploits the vulnerability in the route discovery function of the reactive routing protocol for example AODV (Ad Hoc On-Demand Distance Vector). In this paper, we first illustrate the SD anomaly in MANETs and then propose a SD detection and prevention algorithm which efficiently deals with this attack. We assess the performance of our proposed approach through simulation, evaluating its successfulness using different network scenarios. (author)

  6. Optimizing T-Learning Course Scheduling Based on Genetic Algorithm in Benefit-Oriented Data Broadcast Environments

    Science.gov (United States)

    Huang, Yong-Ming; Chen, Chao-Chun; Wang, Ding-Chau

    2012-01-01

    Ubiquitous learning receives much attention in these few years due to its wide spectrum of applications, such as the T-learning application. The learner can use mobile devices to watch the digital TV based course content, and thus, the T-learning provides the ubiquitous learning environment. However, in real-world data broadcast environments, the…

  7. Random broadcast on random geometric graphs

    Energy Technology Data Exchange (ETDEWEB)

    Bradonjic, Milan [Los Alamos National Laboratory; Elsasser, Robert [UNIV OF PADERBORN; Friedrich, Tobias [ICSI/BERKELEY; Sauerwald, Tomas [ICSI/BERKELEY

    2009-01-01

    In this work, we consider the random broadcast time on random geometric graphs (RGGs). The classic random broadcast model, also known as push algorithm, is defined as: starting with one informed node, in each succeeding round every informed node chooses one of its neighbors uniformly at random and informs it. We consider the random broadcast time on RGGs, when with high probability: (i) RGG is connected, (ii) when there exists the giant component in RGG. We show that the random broadcast time is bounded by {Omicron}({radical} n + diam(component)), where diam(component) is a diameter of the entire graph, or the giant component, for the regimes (i), or (ii), respectively. In other words, for both regimes, we derive the broadcast time to be {Theta}(diam(G)), which is asymptotically optimal.

  8. Olympic Broadcast Rights

    OpenAIRE

    Žižka, Martin

    2014-01-01

    Title: Olympic Broadcast Rights Objectives: The main objective of this thesis is to analyse the revenue derived from the sale of the broadcasting rights to the Olympics by Olympic Movement. In the thesis are analysed the total sum of revenue, selected territory and compared the proportion that belongs to the International Olympic Committee and the Organizing Committee of the Olympic Games. The secondary objective is to adapt and calculation of the conversion mechanism for the transfer of amou...

  9. PERFORMANCE ANALYSIS OF DSR ROUTING PROTOCOL UNDER ENERGY BASED SELFISH ATTACK IN MOBILE AD HOC NETWORKS

    Directory of Open Access Journals (Sweden)

    T.V.P.Sundararajan

    2010-06-01

    Full Text Available Mobile Ad hoc Networks (MANETs rely on the cooperation of all participating nodes to provide the fundamental operations such as routing and data forwarding. However, due to the open structure and scarcely available battery-based energy, node misbehaviors may exist.[1]. One such routing misbehavior is that some selfish nodes will participate in the route discovery and maintenance processes but refuse to forward data packets. This paper pointed out Energy based selfish nodes (EBSN where these selfish nodes tend to use the network but do not cooperate, saving battery life for their own communications [2],[3]. We present a simulation study of the effects of Energy based selfish nodes (EBSN on DSR routing protocol and its impact over network performance in terms of throughput and delay of a mobile ad hoc network where a defined percentage of nodes were misbehaving.

  10. Modelling and Initial Validation of the DYMO Routing Protocol for Mobile Ad-Hoc Networks

    DEFF Research Database (Denmark)

    Espensen, Kristian Asbjørn Leth; Kjeldsen, Mads Keblov; Kristensen, Lars Michael

    2008-01-01

    A mobile ad-hoc network (MANET) is an infrastructureless network established by a set of mobile devices using wireless communication. The Dynamic MANET On-demand (DYMO) protocol is a routing protocol for multi-hop communication in MANETs currently under development by the Internet Engineering Task...... Force (IETF). This paper presents a Coloured Petri Net (CPN) model of the mandatory parts of the DYMO protocol, and shows how scenario-based state space exploration has been used to validate key properties of the protocol. Our CPN modelling and verification work has spanned two revisions of the DYMO...... protocol specification and have had direct impact on the most recent version of the protocol specification....

  11. Data management issues in mobile ad hoc networks.

    Science.gov (United States)

    Hara, Takahiro

    2017-01-01

    Research on mobile ad hoc networks (MANETs) has become a hot research topic since the middle 1990's. Over the first decade, most research focused on networking techniques, ignoring data management issues. We, however, realized early the importance of data management in MANETs, and have been conducting studies in this area for 15 years. In this review, we summarize some key technical issues related to data management in MANETs, and the studies we have done in addressing these issues, which include placement of data replicas, update management, and query processing with security management. The techniques proposed in our studies have been designed with deep considerations of MANET features including network partitioning, node participation/disappearance, limited network bandwidth, and energy efficiency. Our studies published in early 2000's have developed a new research field as data management in MANETs. Also, our recent studies are expected to be significant guidelines of new research directions. We conclude the review by discussing some future directions for research.

  12. 47 CFR 73.4102 - FAA communications, broadcast of.

    Science.gov (United States)

    2010-10-01

    ... 47 Telecommunication 4 2010-10-01 2010-10-01 false FAA communications, broadcast of. 73.4102 Section 73.4102 Telecommunication FEDERAL COMMUNICATIONS COMMISSION (CONTINUED) BROADCAST RADIO SERVICES RADIO BROADCAST SERVICES Rules Applicable to All Broadcast Stations § 73.4102 FAA communications...

  13. Broadcasting the Status of Plant Growth Chamber using Bluetooth Low Energy

    Directory of Open Access Journals (Sweden)

    Al-Azam Moh Noor

    2018-01-01

    Full Text Available Mobile users are getting smarter in using their phones. Many tasks are usually completed or monitored via a computer screen, nowadays can be taken anywhere with Android phones or tablets. Likewise with features in the phone is increasingly sophisticated. Currently bluetooth version 4 is almost mandatory in all phones. Even for entry level phones are now equipped with bluetooth version 4. This paper discusses the use of Bluetooth Low Energy—which is part of bluetooth version 4, in providing information about the status of plant growth chamber conditions. By using this concept, all phones or tablets that have bluetooth version 4 and there are applications in it will be able to receive the latest chamber status. The results show that this way of broadcasting is very effective. The data required to be monitored by a laboratory technician can be continuously broadcasted so that anyone on duty will get instant information at his grasp.

  14. Anthropologists and Broadcasting: Roles and Entry Strategies

    Science.gov (United States)

    Eiselein, E. B.; Topper, Martin

    1976-01-01

    The article describes some of the roles open to anthropologists in radio and television. Entry strategies for occupying these roles include taking the first step in approaching the broadcast station, learning about broadcasting, and communicating anthropology to the broadcasters. (Author/NQ)

  15. Safety message broadcast in vehicular networks

    CERN Document Server

    Bi, Yuanguo; Zhuang, Weihua; Zhao, Hai

    2017-01-01

    This book presents the current research on safety message dissemination in vehicular networks, covering medium access control and relay selection for multi-hop safety message broadcast. Along with an overall overview of the architecture, characteristics, and applications of vehicular networks, the authors discuss the challenging issues in the research on performance improvement for safety applications, and provide a comprehensive review of the research literature. A cross layer broadcast protocol is included to support efficient safety message broadcast by jointly considering geographical location, physical-layer channel condition, and moving velocity of vehicles in the highway scenario. To further support multi-hop safety message broadcast in a complex road layout, the authors propose an urban multi-hop broadcast protocol that utilizes a novel forwarding node selection scheme. Additionally, a busy tone based medium access control scheme is designed to provide strict priority to safety applications in vehicle...

  16. A LOOP-BASED APPROACH IN CLUSTERING AND ROUTING IN MOBILE AD HOC NETWORKS

    Institute of Scientific and Technical Information of China (English)

    Li Yanping; Wang Xin; Xue Xiangyang; C.K. Toh

    2006-01-01

    Although clustering is a convenient framework to enable traffic control and service support in Mobile Ad hoc NETworks (MANETs), it is seldom adopted in practice due to the additional traffic overhead it leads to for the resource limited ad hoc network. In order to address this problem, we proposed a loop-based approach to combine clustering and routing. By employing loop topologies, topology information is disseminated with a loop instead of a single node, which provides better robustness, and the nature of a loop that there are two paths between each pair of nodes within a loop suggests smart route recovery strategy. Our approach is composed of setup procedure, regular procedure and recovery procedure to achieve clustering, routing and emergent route recovering.

  17. 47 CFR 73.6011 - Protection of TV broadcast stations.

    Science.gov (United States)

    2010-10-01

    ... 47 Telecommunication 4 2010-10-01 2010-10-01 false Protection of TV broadcast stations. 73.6011... RADIO BROADCAST SERVICES Class A Television Broadcast Stations § 73.6011 Protection of TV broadcast stations. Class A TV stations must protect authorized TV broadcast stations, applications for minor changes...

  18. Improvement over the OLSR Routing Protocol in Mobile Ad Hoc Networks by Eliminating the Unnecessary Loops

    OpenAIRE

    Shahram Behzad; Reza Fotohi; Shahram Jamali

    2013-01-01

    Mobile ad hoc networks are type of wireless networks in which any kind of infrastructure is not used, i.e. there are no infrastructures such as routers or switches or anything else on the network that can be used to support the network structure and the nodes has mobility. The purpose of this paper is to provide a better quality of the package delivery rate and the throughput, that is in need of powerful routing protocol standards, which can guarantee delivering of the packages to destination...

  19. Secure and Usable Out-Of-Band Channels for Ad Hoc Mobile Device Interactions

    OpenAIRE

    Kainda , Ronald; Flechais , Ivan; Roscoe , A. W.

    2010-01-01

    International audience; Protocols for bootstrapping security in ad hoc mobile device interactions rely on users' ability to perform specific tasks such as transferring or comparing fingerprints of information between devices. The size of fingerprints depends on the level of technical security required by a given application but, at the same time, is limited by users' inability to deal with large amounts of data with high levels of accuracy. Large fingerprints provide high technical security b...

  20. Context discovery in ad-hoc networks

    NARCIS (Netherlands)

    Liu, F.

    2011-01-01

    With the rapid development of wireless technology and portable devices, mobile ad-hoc networks (MANETs) are more and more present in our daily life. Ad-hoc networks are often composed of mobile and battery-supplied devices, like laptops, mobile phones, and PDAs. With no requirement for

  1. 76 FR 71430 - Automatic Dependent Surveillance Broadcast (ADS-B)

    Science.gov (United States)

    2011-11-17

    ... Committee (ARC) to provide a forum for the U.S. and international aviation community to define a strategy for incorporating ADS-B In technologies into the National Airspace System. The ARC specifically was.../portfolio/trans_support_progs/adsb/ Issued in Washington, DC on November 9, 2011. James Eck, Director, Air...

  2. Rollback recovery with low overhead for fault tolerance in mobile ad hoc networks

    Directory of Open Access Journals (Sweden)

    Parmeet Kaur Jaggi

    2015-10-01

    Full Text Available Mobile ad hoc networks (MANETs have significantly enhanced the wireless networks by eliminating the need for any fixed infrastructure. Hence, these are increasingly being used for expanding the computing capacity of existing networks or for implementation of autonomous mobile computing Grids. However, the fragile nature of MANETs makes the constituent nodes susceptible to failures and the computing potential of these networks can be utilized only if they are fault tolerant. The technique of checkpointing based rollback recovery has been used effectively for fault tolerance in static and cellular mobile systems; yet, the implementation of existing protocols for MANETs is not straightforward. The paper presents a novel rollback recovery protocol for handling the failures of mobile nodes in a MANET using checkpointing and sender based message logging. The proposed protocol utilizes the routing protocol existing in the network for implementing a low overhead recovery mechanism. The presented recovery procedure at a node is completely domino-free and asynchronous. The protocol is resilient to the dynamic characteristics of the MANET; allowing a distributed application to be executed independently without access to any wired Grid or cellular network access points. We also present an algorithm to record a consistent global snapshot of the MANET.

  3. Automated quality control in a file-based broadcasting workflow

    Science.gov (United States)

    Zhang, Lina

    2014-04-01

    Benefit from the development of information and internet technologies, television broadcasting is transforming from inefficient tape-based production and distribution to integrated file-based workflows. However, no matter how many changes have took place, successful broadcasting still depends on the ability to deliver a consistent high quality signal to the audiences. After the transition from tape to file, traditional methods of manual quality control (QC) become inadequate, subjective, and inefficient. Based on China Central Television's full file-based workflow in the new site, this paper introduces an automated quality control test system for accurate detection of hidden troubles in media contents. It discusses the system framework and workflow control when the automated QC is added. It puts forward a QC criterion and brings forth a QC software followed this criterion. It also does some experiments on QC speed by adopting parallel processing and distributed computing. The performance of the test system shows that the adoption of automated QC can make the production effective and efficient, and help the station to achieve a competitive advantage in the media market.

  4. Intelligent routing protocol for ad hoc wireless network

    Science.gov (United States)

    Peng, Chaorong; Chen, Chang Wen

    2006-05-01

    A novel routing scheme for mobile ad hoc networks (MANETs), which combines hybrid and multi-inter-routing path properties with a distributed topology discovery route mechanism using control agents is proposed in this paper. In recent years, a variety of hybrid routing protocols for Mobile Ad hoc wireless networks (MANETs) have been developed. Which is proactively maintains routing information for a local neighborhood, while reactively acquiring routes to destinations beyond the global. The hybrid protocol reduces routing discovery latency and the end-to-end delay by providing high connectivity without requiring much of the scarce network capacity. On the other side the hybrid routing protocols in MANETs likes Zone Routing Protocol still need route "re-discover" time when a route between zones link break. Sine the topology update information needs to be broadcast routing request on local zone. Due to this delay, the routing protocol may not be applicable for real-time data and multimedia communication. We utilize the advantages of a clustering organization and multi-routing path in routing protocol to achieve several goals at the same time. Firstly, IRP efficiently saves network bandwidth and reduces route reconstruction time when a routing path fails. The IRP protocol does not require global periodic routing advertisements, local control agents will automatically monitor and repair broke links. Secondly, it efficiently reduces congestion and traffic "bottlenecks" for ClusterHeads in clustering network. Thirdly, it reduces significant overheads associated with maintaining clusters. Fourthly, it improves clusters stability due to dynamic topology changing frequently. In this paper, we present the Intelligent Routing Protocol. First, we discuss the problem of routing in ad hoc networks and the motivation of IRP. We describe the hierarchical architecture of IRP. We describe the routing process and illustrate it with an example. Further, we describe the control manage

  5. Cooperative Caching in Mobile Ad Hoc Networks Based on Data Utility

    Directory of Open Access Journals (Sweden)

    Narottam Chand

    2007-01-01

    Full Text Available Cooperative caching, which allows sharing and coordination of cached data among clients, is a potential technique to improve the data access performance and availability in mobile ad hoc networks. However, variable data sizes, frequent data updates, limited client resources, insufficient wireless bandwidth and client's mobility make cache management a challenge. In this paper, we propose a utility based cache replacement policy, least utility value (LUV, to improve the data availability and reduce the local cache miss ratio. LUV considers several factors that affect cache performance, namely access probability, distance between the requester and data source/cache, coherency and data size. A cooperative cache management strategy, Zone Cooperative (ZC, is developed that employs LUV as replacement policy. In ZC one-hop neighbors of a client form a cooperation zone since the cost for communication with them is low both in terms of energy consumption and message exchange. Simulation experiments have been conducted to evaluate the performance of LUV based ZC caching strategy. The simulation results show that, LUV replacement policy substantially outperforms the LRU policy.

  6. A Safety Enhancement Broadcasting Scheme Based on Context Sensing in VANETs

    Directory of Open Access Journals (Sweden)

    Chen Chen

    2016-01-01

    Full Text Available The broadcasting plays a vital role for context awareness in VANETs (Vehicular Ad Hoc Networks whose primary goal is to improve the driving safety depending on effective information exchanging. In this paper, based on the LQG (linear quadratic Gaussian optimal control theory, a broadcasting control scheme named LQG-CCA is proposed to improve the network throughput thus increasing the opportunities for the safety-related events to be successfully handled. By predicting the network throughput with the Kalman filter model, our LQG model is envisioned to minimize the difference between the predicted and expected throughput through the adjustment of CCA (Clear Channel Assessment sensing threshold. Numerical results show that our proposed model can significantly improve the network performance in terms of average throughput, average End-to-End delay, and average packets delivery ratio compared with a highly cited work D-FPAV and a latest published model APPR.

  7. A broadcast engineering tutorial for non-engineers

    CERN Document Server

    Pizzi, Skip

    2014-01-01

    A Broadcast Engineering Tutorial for Non-Engineers is the leading publication on the basics of broadcast technology. Whether you are new to the industry or do not have an engineering background, this book will give you a comprehensive primer of television, radio, and digital media relating to broadcast-it is your guide to understanding the technical world of radio and television broadcast engineering. It covers all the important topics such as DTV, IBOC, HD, standards, video servers, editing, electronic newsrooms, and more.

  8. Formal reconstruction of attack scenarios in mobile ad hoc and sensor networks

    Directory of Open Access Journals (Sweden)

    Rekhis Slim

    2011-01-01

    Full Text Available Abstract Several techniques of theoretical digital investigation are presented in the literature but most of them are unsuitable to cope with attacks in wireless networks, especially in Mobile Ad hoc and Sensor Networks (MASNets. In this article, we propose a formal approach for digital investigation of security attacks in wireless networks. We provide a model for describing attack scenarios in a wireless environment, and system and network evidence generated consequently. The use of formal approaches is motivated by the need to avoid ad hoc generation of results that impedes the accuracy of analysis and integrity of investigation. We develop an inference system that integrates the two types of evidence, handles incompleteness and duplication of information in them, and allows possible and provable actions and attack scenarios to be generated. To illustrate the proposal, we consider a case study dealing with the investigation of a remote buffer overflow attack.

  9. WHO OWNS THE BROADCASTING TELEVISION NETWORK BUSINESS IN INDONESIA?

    Directory of Open Access Journals (Sweden)

    Rendra WIDYATAMA

    2018-06-01

    Full Text Available Broadcasting TV occupies a significant position in the community. Therefore, all the countries in the world give attention to TV broadcasting business. In Indonesia, the government requires TV stations to broadcast locally, except through networking. In this state, there are 763 private TV companies broadcasting free to air. Of these, some companies have many TV stations and build various broadcasting networks. In this article, the author reveals the substantial TV stations that control the market, based on literature studies. From the data analysis, there are 14 substantial free to network broadcast private TV broadcasters but owns by eight companies; these include the MNC Group, EMTEK, Viva Media Asia, CTCorp, Media Indonesia, Rajawali Corpora, and Indigo Multimedia. All TV stations are from Jakarta, which broadcasts in 22 to 32 Indonesian provinces.

  10. Approaches to Addressing Service Selection Ties in Ad Hoc Mobile Cloud Computing

    Directory of Open Access Journals (Sweden)

    Ayotuyi Tosin Akinola

    2018-01-01

    Full Text Available The ad hoc mobile cloud (AMC allows mobile devices to connect together through a wireless connection or any other means and send a request for web services from one to another within the mobile cloud. However, one of the major challenges in the AMC is the occurrence of dissatisfaction experienced by the users. This is because there are many services with similar functionalities but varying nonfunctional properties. Moreover, another resultant cause of user dissatisfaction being coupled with runtime redundancy is the attainment of similar quality computations during service selection, often referred to as “service selection ties.” In an attempt to address this challenge, service selection mechanisms for the AMC were developed in this work. This includes the use of selected quality of service properties coupled with user feedback data to determine the most suitable service. These mechanisms were evaluated using the experimental method. The evaluation of the mechanisms mainly focused on the metrics that evaluate the satisfaction of users' interest via the quantitative evaluation. The experiments affirmed that the use of the shortest distance can help to break selection ties between potential servicing nodes. Also, a continuous use of updated and unlimited range of users' assessments enhances an optimal service selection.

  11. Analysis and Implement of Broadcast Program Monitoring Data

    Directory of Open Access Journals (Sweden)

    Song Jin Bao

    2016-01-01

    Full Text Available With the rapid development of the radio and TV industry and the implementation of INT (the integration of telecommunications networks, cable TV networks and the Internet, the contents of programs and advertisements is showing massive, live and interactive trends. In order to meet the security of radio and television, the broadcast of information have to be controlled and administered. In order to master the latest information of public opinion trends through radio and television network, it is necessary research the specific industry applications of broadcast program monitoring. In this paper, the importance of broadcast monitoring in public opinion analysis is firstly analysed. The monitoring radio and television programs broadcast system architecture is proposed combining with the practice, focusing on the technical requirements and implementation process of program broadcast, advertisement broadcast and TV station broadcast monitoring. The more efficient information is generated through statistical analysis, which provides data analysis for radio and television public opinion analysis.

  12. Reliable Multihop Broadcast Protocol with a Low-Overhead Link Quality Assessment for ITS Based on VANETs in Highway Scenarios

    Directory of Open Access Journals (Sweden)

    Alejandro Galaviz-Mosqueda

    2014-01-01

    Full Text Available Vehicular ad hoc networks (VANETs have been identified as a key technology to enable intelligent transport systems (ITS, which are aimed to radically improve the safety, comfort, and greenness of the vehicles in the road. However, in order to fully exploit VANETs potential, several issues must be addressed. Because of the high dynamic of VANETs and the impairments in the wireless channel, one key issue arising when working with VANETs is the multihop dissemination of broadcast packets for safety and infotainment applications. In this paper a reliable low-overhead multihop broadcast (RLMB protocol is proposed to address the well-known broadcast storm problem. The proposed RLMB takes advantage of the hello messages exchanged between the vehicles and it processes such information to intelligently select a relay set and reduce the redundant broadcast. Additionally, to reduce the hello messages rate dependency, RLMB uses a point-to-zone link evaluation approach. RLMB performance is compared with one of the leading multihop broadcast protocols existing to date. Performance metrics show that our RLMB solution outperforms the leading protocol in terms of important metrics such as packet dissemination ratio, overhead, and delay.

  13. Histories of Public Service Broadcasters on the Web

    DEFF Research Database (Denmark)

    This edited volume details multiple and dynamic histories of relations between public service broadcasters and the World Wide Web. What does it mean to be a national broadcaster in a global communications environment? What are the commercial and public service pressures that were brought to bear...... when public service broadcasters implemented web services? How did “one- to-many” broadcasters adapt to the “many-to-many” medium of the internet? The thematic or- ganisation of this collection addresses such major issues, while each chapter offers a particular historical account of relations between...... public service broadcasters and the World Wide Web....

  14. Metadata for the description of broadcast assets

    DEFF Research Database (Denmark)

    Efthimiadis, Efthimis N.; Mai, Jens Erik; Burrows, Paul E.

    2003-01-01

    The Corporation for Public Broadcasting (CPB) and public broadcasters consider Media Asset Management (MAM) of critical importance since without a concerted and cooperative plan to manage their vast library of content, broadcasters are unable to reach their potential for service in the digital age....... The concerns for Media Asset Management, human and technical, are myriad. Media Asset Management is the framework upon which many of the largest technology projects will be built, including the future interconnection system between and among CPB member stations. It is CPB's hope that its licensees...... and their partners in university, museum, and library communities, will work together to contribute to Media Asset Management solutions. These issues are not unique to Public Broadcasters. Similar issues are faced by all networks at different levels of complexity. This panel will present efforts by broadcasters...

  15. Mobile home automation-merging mobile value added services and home automation technologies

    OpenAIRE

    Rosendahl, Andreas; Hampe, Felix J.; Botterweck, Goetz

    2007-01-01

    non-peer-reviewed In this paper we study mobile home automation, a field that emerges from an integration of mobile application platforms and home automation technologies. In a conceptual introduction we first illustrate the need for such applications by introducing a two-dimensional conceptual model of mobility. Subsequently we suggest an architecture and discuss different options of how a user might access a mobile home automation service and the controlled devices. As another contrib...

  16. CAPITALISM VS BUSINESS ETHICS IN INDONESIA’S TELEVISION BROADCASTING

    Directory of Open Access Journals (Sweden)

    Rendra WIDYATAMA

    2018-05-01

    Full Text Available Generally, in every country, there is supervision of the television broadcasting system. In Indonesia, all television broadcasting is supervised by the Komisi Penyiaran Indonesia/KPI (Indonesian Broadcasting Commission. This commission oversees broadcast television, to ensure all TV broadcasts in Indonesia comply with government regulations. Often the KPI imposes sanctions, but frequent violations still occur. This article describes the results of research on the contradiction between business interests and ethics in the television industry in Indonesia. This study uses the method of evaluation research, where researchers analyze data, here in the form of sanctions documents released by broadcasting commissions. The results reveal that all national private television stations often violate regulations. They prioritize their business interests rather than follow broadcasting guidelines, especially since KPI does not have the full authority to grant and revoke a broadcasting license. The granting and revocation of permits remains under the authority of the government, where political lobbying plays a more significant role.

  17. 47 CFR 74.705 - TV broadcast analog station protection.

    Science.gov (United States)

    2010-10-01

    ... 47 Telecommunication 4 2010-10-01 2010-10-01 false TV broadcast analog station protection. 74.705... EXPERIMENTAL RADIO, AUXILIARY, SPECIAL BROADCAST AND OTHER PROGRAM DISTRIBUTIONAL SERVICES Low Power TV, TV Translator, and TV Booster Stations § 74.705 TV broadcast analog station protection. (a) The TV broadcast...

  18. Energy-Efficient Cluster Based Routing Protocol in Mobile Ad Hoc Networks Using Network Coding

    OpenAIRE

    Srinivas Kanakala; Venugopal Reddy Ananthula; Prashanthi Vempaty

    2014-01-01

    In mobile ad hoc networks, all nodes are energy constrained. In such situations, it is important to reduce energy consumption. In this paper, we consider the issues of energy efficient communication in MANETs using network coding. Network coding is an effective method to improve the performance of wireless networks. COPE protocol implements network coding concept to reduce number of transmissions by mixing the packets at intermediate nodes. We incorporate COPE into cluster based routing proto...

  19. IDMA: improving the defense against malicious attack for mobile ad hoc networks based on ARIP protocol

    Science.gov (United States)

    Peng, Chaorong; Chen, Chang Wen

    2008-04-01

    Malicious nodes are mounting increasingly sophisticated attacking operations on the Mobile Ad Hoc Networks (MANETs). This is mainly because the IP-based MANETs are vulnerable to attacks by various malicious nodes. However, the defense against malicious attack can be improved when a new layer of network architecture can be developed to separate true IP address from disclosing to the malicious nodes. In this paper, we propose a new algorithm to improve the defense against malicious attack (IDMA) that is based on a recently developed Assignment Router Identify Protocol (ARIP) for the clustering-based MANET management. In the ARIP protocol, we design the ARIP architecture based on the new Identity instead of the vulnerable IP addresses to provide the required security that is embedded seamlessly into the overall network architecture. We make full use of ARIP's special property to monitor gateway forward packets by Reply Request Route Packets (RREP) without additional intrusion detection layer. We name this new algorithm IDMA because of its inherent capability to improve the defense against malicious attacks. Through IDMA, a watching algorithm can be established so as to counterattack the malicious node in the routing path when it unusually drops up packets. We provide analysis examples for IDMA for the defense against a malicious node that disrupts the route discovery by impersonating the destination, or by responding with state of corrupted routing information, or by disseminating forged control traffic. The IDMA algorithm is able to counterattack the malicious node in the cases when the node lunch DoS attack by broadcast a large number of route requests, or make Target traffic congestion by delivering huge mount of data; or spoof the IP addresses and send forge packets with a fake ID to the same Target causing traffic congestion at that destination. We have implemented IDMA algorism using the GloMoSim simulator and have demonstrated its performance under a variety of

  20. Developments in the Regulation of Broadcasting Advertising

    OpenAIRE

    Morris, Yvonne; Randle, Paul

    2005-01-01

    This Intervention provides a review of developments in the regulation of broadcast advertising within the UK. The piece focuses on the implications of media convergence on broadcast advertising, and provides a brief history and analysis of the regulation of broadcast advertising within the UK. The piece also reviews Advertising Codes and provides an overview of regulatory bodies such as OFCOM and the ASA, and their respective roles.

  1. Investing in communities: evaluating the added value of community mobilization on HIV prevention outcomes among FSWs in India.

    Science.gov (United States)

    Kuhlmann, Anne Sebert; Galavotti, Christine; Hastings, Philip; Narayanan, Pradeep; Saggurti, Niranjan

    2014-04-01

    Community mobilization often requires greater time and resource investments than typical interventions, yet few evaluations exist to justify these investments. We evaluated the added benefit of community mobilization on HIV prevention outcomes among female sex workers (FSWs) using a composite measure of volunteer participation in program committees by FSWs. After adjusting for treatment propensity, we used multilevel structural equation modeling (MSEM) to test our program theory. We hypothesized that stronger community mobilization would be associated with increased levels of consistent condom use and with increased levels of perceived fairness, mediated by psychosocial processes. Community mobilization had an indirect effect on consistent condom use mediated through social cohesion and an indirect effect on perceived fairness mediated by collective efficacy. Our results suggest higher levels of community mobilization help improve condom use and reduce perceived discrimination beyond the effects of the core HIV intervention program. We recommend further testing of this model.

  2. Virtual Private Networks for mobile environments. Development of protocol for mobile security and algorithms for location update.

    OpenAIRE

    Tzvetkov, Vesselin Dimitrov

    2010-01-01

    The classical networks for broadcast, telephony and data are converging to services on the Next Generation Networks (NGN), which are introduced by all major Service Providers (SP). Major requirements on the future IP network are security and mobility, which are reflection of the Internet’s importance and wide use of portable smart devices. Secure IP mobility is the focus of this thesis, i.e. how the user can move through different access networks whilst maintaining uninterrupted and secure IP...

  3. Ad Hoc Access Gateway Selection Algorithm

    Science.gov (United States)

    Jie, Liu

    With the continuous development of mobile communication technology, Ad Hoc access network has become a hot research, Ad Hoc access network nodes can be used to expand capacity of multi-hop communication range of mobile communication system, even business adjacent to the community, improve edge data rates. For mobile nodes in Ad Hoc network to internet, internet communications in the peer nodes must be achieved through the gateway. Therefore, the key Ad Hoc Access Networks will focus on the discovery gateway, as well as gateway selection in the case of multi-gateway and handover problems between different gateways. This paper considers the mobile node and the gateway, based on the average number of hops from an average access time and the stability of routes, improved gateway selection algorithm were proposed. An improved gateway selection algorithm, which mainly considers the algorithm can improve the access time of Ad Hoc nodes and the continuity of communication between the gateways, were proposed. This can improve the quality of communication across the network.

  4. Reputation-Based Internet Protocol Security: A Multilayer Security Framework for Mobile Ad Hoc Networks

    Science.gov (United States)

    2010-09-01

    motivated research in behavior grading systems [56]. Peer-to-peer eCommerce appli- cations such as eBay, Amazon, uBid, and Yahoo have performed research that...Security in Mobile Ad Hoc Networks”. IEEE Security & Privacy , 72–75, 2008. 15. Chakeres, ID and EM Belding-Royer. “AODV Routing Protocol Implementa...Detection System”. Proceedings of IEEE Computer Society Symposium on Research in Security and Privacy , 240–250. 1992. 21. Devore, J.L. and N.R. Farnum

  5. Gossip-Based Broadcast

    Science.gov (United States)

    Leitão, João; Pereira, José; Rodrigues, Luís

    Gossip, or epidemic, protocols have emerged as a powerful strategy to implement highly scalable and resilient reliable broadcast primitives on large scale peer-to-peer networks. Epidemic protocols are scalable because they distribute the load among all nodes in the system and resilient because they have an intrinsic level of redundancy that masks node and network failures. This chapter provides an introduction to gossip-based broadcast on large-scale unstructured peer-to-peer overlay networks: it surveys the main results in the field, discusses techniques to build and maintain the overlays that support efficient dissemination strategies, and provides an in-depth discussion and experimental evaluation of two concrete protocols, named HyParView and Plumtree.

  6. Two-terminal reliability of a mobile ad hoc network under the asymptotic spatial distribution of the random waypoint model

    International Nuclear Information System (INIS)

    Chen, Binchao; Phillips, Aaron; Matis, Timothy I.

    2012-01-01

    The random waypoint (RWP) mobility model is frequently used in describing the movement pattern of mobile users in a mobile ad hoc network (MANET). As the asymptotic spatial distribution of nodes under a RWP model exhibits central tendency, the two-terminal reliability of the MANET is investigated as a function of the source node location. In particular, analytical expressions for one and two hop connectivities are developed as well as an efficient simulation methodology for two-terminal reliability. A study is then performed to assess the effect of nodal density and network topology on network reliability.

  7. PSO-Optimized Hopfield Neural Network-Based Multipath Routing for Mobile Ad-hoc Networks

    Directory of Open Access Journals (Sweden)

    Mansour Sheikhan

    2012-06-01

    Full Text Available Mobile ad-hoc network (MANET is a dynamic collection of mobile computers without the need for any existing infrastructure. Nodes in a MANET act as hosts and routers. Designing of robust routing algorithms for MANETs is a challenging task. Disjoint multipath routing protocols address this problem and increase the reliability, security and lifetime of network. However, selecting an optimal multipath is an NP-complete problem. In this paper, Hopfield neural network (HNN which its parameters are optimized by particle swarm optimization (PSO algorithm is proposed as multipath routing algorithm. Link expiration time (LET between each two nodes is used as the link reliability estimation metric. This approach can find either node-disjoint or link-disjoint paths in singlephase route discovery. Simulation results confirm that PSO-HNN routing algorithm has better performance as compared to backup path set selection algorithm (BPSA in terms of the path set reliability and number of paths in the set.

  8. Broadcast Copywriting and Computer Assisted Instruction.

    Science.gov (United States)

    Hagerman, William L.

    The teaching of broadcast copywriting can be enhanced by computer assisted instruction, especially in screening students' writing for adherence to classic "formulas" or "rules" for broadcast writing. Such rules might include avoiding cliches or not beginning a sentence with a subordinate clause. Other rules the computer can…

  9. The Digital Dividend of Terrestrial Broadcasting

    CERN Document Server

    Beutler, Roland

    2012-01-01

    The “digital revolution” of the last two decades has pervaded innumerable aspects of our daily lives and changed our planet irreversibly. The shift from analog to digital broadcasting has facilitated a seemingly infinite variety of new applications—audience interactivity being but one example. The greater efficiency and compression of digital media have endowed broadcasters with a “digital dividend” of spare transmission capacity over and above the requirements of terrestrial broadcasting. The question is, who will use it, and how? Comparing the European experience with that of broadcasters elsewhere in the world, the author sketches the current status of international frequency management, quantifies the value of the “dividend” itself, analyzes the details of the analog-to-digital switchovers already completed, and posits what the future holds for the sector. As we grapple with new devices, inconceivable a mere generation ago, that allow us to access digital media instantly, anywhere and at any...

  10. 47 CFR 73.9001 - Redistribution control of digital television broadcasts.

    Science.gov (United States)

    2010-10-01

    ... 47 Telecommunication 4 2010-10-01 2010-10-01 false Redistribution control of digital television... RADIO SERVICES RADIO BROADCAST SERVICES Digital Broadcast Television Redistribution Control § 73.9001 Redistribution control of digital television broadcasts. Licensees of TV broadcast stations may utilize the...

  11. Effect of ADS-B Characteristics on Airborne Conflict Detection and Resolution

    NARCIS (Netherlands)

    Langejan, T.P.; Sunil, E.; Ellerbroek, J.; Hoekstra, J.M.

    2016-01-01

    Most Free-Flight concepts rely on self-separation by means of airborne Conflict Detection and Resolution (CD&R) algorithms. A key enabling technology for airborne CD&R is the Automatic Dependent Surveillance-Broadcast (ADS-B) system, which is used for direct state information exchange

  12. 47 CFR 73.1217 - Broadcast hoaxes.

    Science.gov (United States)

    2010-10-01

    ... broadcast station shall broadcast false information concerning a crime or a catastrophe if: (a) The licensee... harm would occur. A “crime” is any act or omission that makes the offender subject to criminal punishment by law. A “catastrophe” is a disaster or imminent disaster involving violent or sudden event...

  13. MQARR-AODV: A NOVEL MULTIPATH QOS AWARE RELIABLE REVERSE ON-DEMAND DISTANCE VECTOR ROUTING PROTOCOL FOR MOBILE AD-HOC NETWORKS

    Directory of Open Access Journals (Sweden)

    K.G. Santhiya

    2012-12-01

    Full Text Available MANET (Mobile Ad-hoc Network is an infra structure less wireless ad-hoc network that does not require any basic central control. The topology of the network changes drastically due to very fast mobility of nodes. So an adaptive routing protocol is needed for routing in MANET. AODV (Ad-hoc On-demand Distance Vector routing is the effective and prominent on-demand Ad-hoc routing protocols. During route establishment phase in traditional AODV, only one route reply message will be sent in the reverse path to establish routing path. The high mobility of nodes may affect the reply messages which lead to the retransmission of route request message by the sender which in turn leads to higher communication delay, power consumption and the reduction in the ratio of packets delivered. Sending multiple route reply messages and establishing multiple paths in a single path discovery will reduce the routing overhead involved in maintaining the connection between source and destination nodes. Multipath routing can render high scalability, end-to-end throughput and provide load balancing in MANET. The new proposed novel Multipath QoS aware reliable routing protocol establishes two routes of maximum node disjoint paths and the data transfer is carried out in the two paths simultaneously. To select best paths, the new proposed protocol uses three parameters Link Eminence, MAC overhead and node residual energy. The experimental values prove that the MQARR-AODV protocol achieves high reliability, stability, low latency and outperforms AODV by the less energy consumption, overhead and delay.

  14. Emergency department visits during an Olympic gold medal television broadcast.

    Science.gov (United States)

    Redelmeier, Donald A; Vermeulen, Marian J

    2011-01-01

    Practice pattern variations are often attributed to physician decision-making with no accounting for patient preferences. To test whether a mass media television broadcast unrelated to health was associated with changes in the rate and characteristics of visits for acute emergency care. Time-series analysis of emergency department visits for any reason. Population-based sample of all patients seeking emergency care in Ontario, Canada. The broadcast day was defined as the Olympic men's gold medal ice hockey game final. The control days were defined as the 6 Sundays before and after the broadcast day. A total of 99 447 visits occurred over the 7 Sundays, of which 13 990 occurred on the broadcast day. Comparing the broadcast day with control days, we found no significant difference in the hourly rate of visits before the broadcast (544 vs 537, p = 0.41) or after the broadcast (647 vs 639, p = 0.55). In contrast, we observed a significant reduction in hourly rate of visits during the broadcast (647 vs 783, p television broadcasts can influence patient preferences and thereby lead to a decrease in emergency department visits.

  15. Energy-Aware Multipath Routing Scheme Based on Particle Swarm Optimization in Mobile Ad Hoc Networks.

    Science.gov (United States)

    Robinson, Y Harold; Rajaram, M

    2015-01-01

    Mobile ad hoc network (MANET) is a collection of autonomous mobile nodes forming an ad hoc network without fixed infrastructure. Dynamic topology property of MANET may degrade the performance of the network. However, multipath selection is a great challenging task to improve the network lifetime. We proposed an energy-aware multipath routing scheme based on particle swarm optimization (EMPSO) that uses continuous time recurrent neural network (CTRNN) to solve optimization problems. CTRNN finds the optimal loop-free paths to solve link disjoint paths in a MANET. The CTRNN is used as an optimum path selection technique that produces a set of optimal paths between source and destination. In CTRNN, particle swarm optimization (PSO) method is primly used for training the RNN. The proposed scheme uses the reliability measures such as transmission cost, energy factor, and the optimal traffic ratio between source and destination to increase routing performance. In this scheme, optimal loop-free paths can be found using PSO to seek better link quality nodes in route discovery phase. PSO optimizes a problem by iteratively trying to get a better solution with regard to a measure of quality. The proposed scheme discovers multiple loop-free paths by using PSO technique.

  16. Mass storage system by using broadcast technology

    International Nuclear Information System (INIS)

    Fujii, Hirofumi; Itoh, Ryosuke; Manabe, Atsushi; Miyamoto, Akiya; Morita, Youhei; Nozaki, Tadao; Sasaki, Takashi; Watase, Yoshiyuko; Yamasaki, Tokuyuki

    1996-01-01

    There are many similarities between data recording systems for high energy physics and broadcast systems; the data flow is almost one-way, requires real-time recording; requires large-scale automated libraries for 24-hours operation, etc. In addition to these functional similarities, the required data-transfer and data-recording speeds are also close to those for near future experiments. For these reasons, we have collaborated with SONY Broadcast Company to study the usability of broadcast devices for our data storage system. Our new data storage system consists of high-speed data recorders and tape-robots which are originally based on the digital video-tape recorder and the tape-robot for broadcast systems. We are also studying the possibility to use these technologies for the online data-recording system for B-physics experiment at KEK. (author)

  17. Sensor Sharing in Mobile Ad-Hoc Networks

    Science.gov (United States)

    Mitra, Pramita

    2013-01-01

    Today's modern mobile devices (such as smartphones and tablets) present great potential for growth of many novel, powerful, but also highly demanding applications. However, most mobile devices/users operate in isolation from one another, i.e., they are not aware of the presence of other devices in their proximity. There are numerous situations…

  18. Graceful Degradation in 3GPP MBMS Mobile TV Services Using H.264/AVC Temporal Scalability

    Directory of Open Access Journals (Sweden)

    Thomas Wiegand

    2009-01-01

    Full Text Available These days, there is an increasing interest in Mobile TV broadcast services shown by customers as well as service providers. One general problem of Mobile TV broadcast services is to maximize the coverage of users receiving an acceptable service quality, which is mainly influenced by the user's position and mobility within the cell. In this paper, graceful degradation is considered as an approach for improved service availability and coverage. We present a layered transmission approach for 3GPP's Release 6 Multimedia and Broadcast Service (MBMS based on temporal scalability using H.264/AVC Baseline Profile. A differentiation in robustness between temporal quality layers is achieved by unequal error protection approach based on either application layer Forward Error Correction (FEC or unequal transmit power for the layers or even a combination of both. We discuss the corresponding MBMS service as well as network settings and define measures allowing for evaluating the amount of users reached with a certain mobile terminal play-out quality while considering the network cell capacity usage. Using simulated 3GPP Rel. 6 network conditions, we show that if the service and network settings are chosen carefully, a noticeable extension of the coverage of the MBMS service can be achieved.

  19. Broadcasting in America; Second Edition. A Survey of Television and Radio.

    Science.gov (United States)

    Head, Sydney W.

    The plan of this volume follows that of the first (1956) edition: a section on physical bases of broadcasting, one on the origin and growth of broadcasting, another on the economics of broadcasting, a fourth on the social control of broadcasting, and a final section for an assessment of the effects and influences of broadcasting. Special attention…

  20. Research on the Safe Broadcasting of Television Program

    Directory of Open Access Journals (Sweden)

    Song Jin Bao

    2016-01-01

    Full Text Available The existing way of broadcasting and television monitoring has a lot of problems in China. On the basis of the signal technical indicators monitoring in the present broadcasting and television monitoring system, this paper further extends the function of the monitoring network in order to broaden the services of monitoring business and improve the effect and efficiency of monitoring work. The problem of identifying video content and channel in television and related electronic media is conquered at a low cost implementation way and the flexible technology mechanism. The coverage for video content and identification of the channel is expanded. The informative broadcast entries are generated after a series of video processing. The value of the numerous broadcast data is deeply excavated by using big data processing in order to realize a comprehensive, objective and accurate information monitoring for the safe broadcasting of television program.

  1. Generating Ideas for New Mobile TV Services

    DEFF Research Database (Denmark)

    Sørensen, Lene Tolstrup; Nicolajsen, Hanne Westh

    2010-01-01

    Mobile TV is still in its infancy in respect to identifying new services/content, which deploy the technology convergence of broadcasting, Internet and radio while satisfying the user with respect to interactivity, sociability and content, and at the same time fit the small screen of a mobile phone....... This paper reports on a semi-field trial performed with a group of young, IT literate users provided with handheld devices and the possibility of watching mobile TV as a basis for creation of ideas for more advanced services. The results shows that this group of users looks for personalized services...

  2. SURVEI PENANGANAN BROADCAST STORM PROBLEM PADA PROTOKOL ROUTING AODV DI MANET

    Directory of Open Access Journals (Sweden)

    Indera Zainul Muttaqien

    2015-07-01

    Full Text Available Komunikasi multi-hop pada lingkungan MANET dapat melibatkan broadcast paket dalam proses route discovery. Protokol routing pada MANET akan melakukan broadcast paket RREQ dan menjalarkannya ke node tujuan secepat dan seefisien mungkin, dimana paket RREQ dari rute yang optimal adalah paket RREQ yang terlebih dahulu sampai ke tujuan. Aktifitas broadcast yang tidak terkontrol dapat menyebabkan suatu kondisi yang disebut broadcast storm problem. Broadcast storm problem dapat berdampak pada terganggunya kinerja dari protokol routing akibat adanya packet redundancy, contention, dan collision. Broadcast storm problem dapat ditangani dengan membatasi jumlah node yang dapat melakukan broadcast. Tujuan utama dari pembuatan makalah ini adalah merangkum beberapa mekanisme terbaru yang telah diakukan oleh para peneliti untuk menangani broadcast storm problem. Kami juga menyajikan perbandingan dari mekanisme tersebut berdasarkan karakteristik dari mekanisme ditinjau dari kesesuaian dengan beberapa skema penanganan broadcast storm problem yang diajukan oleh peneliti sebelumnya, kebutuhan informasi tertentu antar node, lingkungan uji coba dan apakah mekanisme ini dapat diterapkan pada protokol routing lainnya.

  3. A Protocol for Content-Based Communication in Disconnected Mobile Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    Julien Haillot

    2010-01-01

    Full Text Available In content-based communication, information flows towards interested hosts rather than towards specifically set destinations. This new style of communication perfectly fits the needs of applications dedicated to information sharing, news distribution, service advertisement and discovery, etc. In this paper we address the problem of supporting content-based communication in partially or intermittently connected mobile ad hoc networks (MANETs. The protocol we designed leverages on the concepts of opportunistic networking and delay-tolerant networking in order to account for the absence of end-to-end connectivity in disconnected MANETs. The paper provides an overview of the protocol, as well as simulation results that show how this protocol can perform in realistic conditions.

  4. Management Theories and Broadcasting: A Handbook.

    Science.gov (United States)

    Craig, J. Robert; Hindmarsh, Wayne A.

    Today's contemporary management and motivation theories, as applied to the business of broadcasting, are the focus of the first section of this paper. It deals with the kinds and reactions of employees in broadcasting stations in relation to 11 motivational theories: (1) Theories X and Y, (2) Immaturity-Maturity Theory, (3) V Theory, (4) Z Theory,…

  5. The Traffic Adaptive Data Dissemination (TrAD Protocol for both Urban and Highway Scenarios

    Directory of Open Access Journals (Sweden)

    Bin Tian

    2016-06-01

    Full Text Available The worldwide economic cost of road crashes and injuries is estimated to be US$518 billion per year and the annual congestion cost in France is estimated to be €5.9 billion. Vehicular Ad hoc Networks (VANETs are one solution to improve transport features such as traffic safety, traffic jam and infotainment on wheels, where a great number of event-driven messages need to be disseminated in a timely way in a region of interest. In comparison with traditional wireless networks, VANETs have to consider the highly dynamic network topology and lossy links due to node mobility. Inter-Vehicle Communication (IVC protocols are the keystone of VANETs. According to our survey, most of the proposed IVC protocols focus on either highway or urban scenarios, but not on both. Furthermore, too few protocols, considering both scenarios, can achieve high performance. In this paper, an infrastructure-less Traffic Adaptive data Dissemination (TrAD protocol which takes into account road traffic and network traffic status for both highway and urban scenarios will be presented. TrAD has double broadcast suppression techniques and is designed to adapt efficiently to the irregular road topology. The performance of the TrAD protocol was evaluated quantitatively by means of realistic simulations taking into account different real road maps, traffic routes and vehicular densities. The obtained simulation results show that TrAD is more efficient in terms of packet delivery ratio, number of transmissions and delay in comparison with the performance of three well-known reference protocols. Moreover, TrAD can also tolerate a reasonable degree of GPS drift and still achieve efficient data dissemination.

  6. The Traffic Adaptive Data Dissemination (TrAD) Protocol for both Urban and Highway Scenarios.

    Science.gov (United States)

    Tian, Bin; Hou, Kun Mean; Zhou, Haiying

    2016-06-21

    The worldwide economic cost of road crashes and injuries is estimated to be US$518 billion per year and the annual congestion cost in France is estimated to be €5.9 billion. Vehicular Ad hoc Networks (VANETs) are one solution to improve transport features such as traffic safety, traffic jam and infotainment on wheels, where a great number of event-driven messages need to be disseminated in a timely way in a region of interest. In comparison with traditional wireless networks, VANETs have to consider the highly dynamic network topology and lossy links due to node mobility. Inter-Vehicle Communication (IVC) protocols are the keystone of VANETs. According to our survey, most of the proposed IVC protocols focus on either highway or urban scenarios, but not on both. Furthermore, too few protocols, considering both scenarios, can achieve high performance. In this paper, an infrastructure-less Traffic Adaptive data Dissemination (TrAD) protocol which takes into account road traffic and network traffic status for both highway and urban scenarios will be presented. TrAD has double broadcast suppression techniques and is designed to adapt efficiently to the irregular road topology. The performance of the TrAD protocol was evaluated quantitatively by means of realistic simulations taking into account different real road maps, traffic routes and vehicular densities. The obtained simulation results show that TrAD is more efficient in terms of packet delivery ratio, number of transmissions and delay in comparison with the performance of three well-known reference protocols. Moreover, TrAD can also tolerate a reasonable degree of GPS drift and still achieve efficient data dissemination.

  7. Evaluation of mobile ad hoc network reliability using propagation-based link reliability model

    International Nuclear Information System (INIS)

    Padmavathy, N.; Chaturvedi, Sanjay K.

    2013-01-01

    A wireless mobile ad hoc network (MANET) is a collection of solely independent nodes (that can move randomly around the area of deployment) making the topology highly dynamic; nodes communicate with each other by forming a single hop/multi-hop network and maintain connectivity in decentralized manner. MANET is modelled using geometric random graphs rather than random graphs because the link existence in MANET is a function of the geometric distance between the nodes and the transmission range of the nodes. Among many factors that contribute to the MANET reliability, the reliability of these networks also depends on the robustness of the link between the mobile nodes of the network. Recently, the reliability of such networks has been evaluated for imperfect nodes (transceivers) with binary model of communication links based on the transmission range of the mobile nodes and the distance between them. However, in reality, the probability of successful communication decreases as the signal strength deteriorates due to noise, fading or interference effects even up to the nodes' transmission range. Hence, in this paper, using a propagation-based link reliability model rather than a binary-model with nodes following a known failure distribution to evaluate the network reliability (2TR m , ATR m and AoTR m ) of MANET through Monte Carlo Simulation is proposed. The method is illustrated with an application and some imperative results are also presented

  8. Architecture and Design of IP Broadcasting System Using Passive Optical Network

    Science.gov (United States)

    Ikeda, Hiroki; Sugawa, Jun; Ashi, Yoshihiro; Sakamoto, Kenichi

    We propose an IP broadcasting system architecture using passive optical networks (PON) utilizing the optical broadcast links of a PON with a downstream bandwidth allocation algorithm to provide a multi-channel IP broadcasting service to home subscribers on single broadband IP network infrastructures. We introduce the design and adaptation of the optical broadcast links to effectively broadcast video contents to home subscribers. We present a performance analysis that includes the downstream bandwidth utilization efficiency of the broadcast link and the bandwidth control of the IP broadcasting and Internet data. Our analysis and simulation results show that the proposed system can provide 100 HDTV channels to every user over fiber lines. We also propose an IPTV channel selection mechanism in an ONT by selecting a broadcast stream. We developed and evaluated a prototype that can achieve a 15-msec IPTV channel selection speed.

  9. Dynamic ad hoc networks

    CERN Document Server

    Rashvand, Habib

    2013-01-01

    Motivated by the exciting new application paradigm of using amalgamated technologies of the Internet and wireless, the next generation communication networks (also called 'ubiquitous', 'complex' and 'unstructured' networking) are changing the way we develop and apply our future systems and services at home and on local, national and global scales. Whatever the interconnection - a WiMAX enabled networked mobile vehicle, MEMS or nanotechnology enabled distributed sensor systems, Vehicular Ad hoc Networking (VANET) or Mobile Ad hoc Networking (MANET) - all can be classified under new networking s

  10. Reliable Wireless Broadcast with Linear Network Coding for Multipoint-to-Multipoint Real-Time Communications

    Science.gov (United States)

    Kondo, Yoshihisa; Yomo, Hiroyuki; Yamaguchi, Shinji; Davis, Peter; Miura, Ryu; Obana, Sadao; Sampei, Seiichi

    This paper proposes multipoint-to-multipoint (MPtoMP) real-time broadcast transmission using network coding for ad-hoc networks like video game networks. We aim to achieve highly reliable MPtoMP broadcasting using IEEE 802.11 media access control (MAC) that does not include a retransmission mechanism. When each node detects packets from the other nodes in a sequence, the correctly detected packets are network-encoded, and the encoded packet is broadcasted in the next sequence as a piggy-back for its native packet. To prevent increase of overhead in each packet due to piggy-back packet transmission, network coding vector for each node is exchanged between all nodes in the negotiation phase. Each user keeps using the same coding vector generated in the negotiation phase, and only coding information that represents which user signal is included in the network coding process is transmitted along with the piggy-back packet. Our simulation results show that the proposed method can provide higher reliability than other schemes using multi point relay (MPR) or redundant transmissions such as forward error correction (FEC). We also implement the proposed method in a wireless testbed, and show that the proposed method achieves high reliability in a real-world environment with a practical degree of complexity when installed on current wireless devices.

  11. Performance Analysis of Mobile Ad Hoc Unmanned Aerial Vehicle Communication Networks with Directional Antennas

    Directory of Open Access Journals (Sweden)

    Abdel Ilah Alshbatat

    2010-01-01

    Full Text Available Unmanned aerial vehicles (UAVs have the potential of creating an ad hoc communication network in the air. Most UAVs used in communication networks are equipped with wireless transceivers using omnidirectional antennas. In this paper, we consider a collection of UAVs that communicate through wireless links as a mobile ad-hoc network using directional antennas. The network design goal is to maximize the throughput and minimize the end-to-end delay. In this respect, we propose a new medium access control protocol for a network of UAVs with directional antennas. We analyze the communication channel between the UAVs and the effect of aircraft attitude on the network performance. Using the optimized network engineering tool (OPNET, we compare our protocol with the IEEE 802.11 protocol for omnidirectional antennas. The simulation results show performance improvement in end-to-end delay as well as throughput.

  12. Analysis of Blocking Rate and Bandwidth Usage of Mobile IPTV Services in Wireless Cellular Networks

    Directory of Open Access Journals (Sweden)

    Mingfu Li

    2014-01-01

    Full Text Available Mobile IPTV services over wireless cellular networks become more and more popular, owing to the significant growth in access bandwidth of wireless cellular networks such as 3G/4G and WiMAX. However, the spectrum resources of wireless cellular networks is rare. How to enhance the spectral efficiency of mobile networks becomes an important issue. Unicast, broadcast, and multicast are the most important transport schemes for offering mobile IPTV services over wireless cellular networks. Therefore, bandwidth usages and blocking rates of unicast, broadcast, and multicast IPTV services were analyzed and compared in this paper. Simulations were also conducted to validate the analytical results. Numerical results demonstrate that the presented analysis is correct, and multicast scheme achieves the best bandwidth usage and blocking rate performance, relative to the other two schemes.

  13. Analysis of blocking rate and bandwidth usage of mobile IPTV services in wireless cellular networks.

    Science.gov (United States)

    Li, Mingfu

    2014-01-01

    Mobile IPTV services over wireless cellular networks become more and more popular, owing to the significant growth in access bandwidth of wireless cellular networks such as 3G/4G and WiMAX. However, the spectrum resources of wireless cellular networks is rare. How to enhance the spectral efficiency of mobile networks becomes an important issue. Unicast, broadcast, and multicast are the most important transport schemes for offering mobile IPTV services over wireless cellular networks. Therefore, bandwidth usages and blocking rates of unicast, broadcast, and multicast IPTV services were analyzed and compared in this paper. Simulations were also conducted to validate the analytical results. Numerical results demonstrate that the presented analysis is correct, and multicast scheme achieves the best bandwidth usage and blocking rate performance, relative to the other two schemes.

  14. Broadcasting football rights in Brazil: the case of Globo and "Club of 13" in the antitrust perspective

    Directory of Open Access Journals (Sweden)

    César Mattos

    2012-06-01

    Full Text Available In 2010, the Brazilian Antitrust Authority -CADE- concluded an agreeement with Globo and the "Club of 13" on a three-year deal for the exclusive broadcasting rights to all Brazilian Football League (BFL games spanning the five principal media platforms: free-to-air TV, pay TV, Pay per View, Internet and Mobile. The deal eliminates competition in broadcasting of Brazilian League games (primarily other networks, including Record, SBT, ESPN, etc., reducing "competition in the market." However, it is plausible to assume that exclusivity can bring efficiencies to the market by ensuring a return on investments. In addition, the sale of broadcasting rights accounts for nearly 40% of the revenues of Brazilian clubs. Banning exclusivity will likely reduce revenues and dampen sector efficiency. However, the contract included a preference clause for Globo that adversely affected "competition for the market." Globo abandoned the preference clause under the agreement. Another important provision of the agreement was the requirement that the Club of 13 auction the five media platforms separately. This article examines the economic rationale of the agreement and provides a brief analysis of the main lessons arising from the fragmentation of negotiations in 2011.

  15. 75 FR 27199 - Promoting Diversification of Ownership in the Broadcasting Services

    Science.gov (United States)

    2010-05-14

    ...'' in explaining the requirements for broadcasters to certify that their advertising contracts do not... for the Commission to require broadcasters renewing their licenses to certify that their advertising... broadcast licensee, cable television system, daily newspaper, or other media outlet subject to the broadcast...

  16. Distribution of Multimedia Streams to Mobile Internet Users

    NARCIS (Netherlands)

    Hesselman, C.E.W.

    2005-01-01

    In this thesis, we consider the efficient distribution of live and scheduled multimedia content (e.g., radio and TV broadcasts) to mobile users via a ubiquitous wireless Internet. The objective is to design and develop a content delivery system that (1) enables content owners to deliver their

  17. Digital terrestrial broadcasting receiver in the U.K; Eikoku chijoha digital hoso jushinki

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1999-03-01

    Digital terrestrial broadcasting is broadcasted in parallel with existing UHF analog broadcasting, whereas each of allocated channel frequencies can transmit five to six programs simultaneously. Each home can receive a number of programs with the existing antenna without a need of installing a new satellite antenna or cable. Among the countries of the world running forward to digitization of broadcasting all at once, the U.K. develops advancing movements and leads the world by starting the digital terrestrial broadcasting. In addition to the digitized broadcasting of conventional analog broadcasting programs, the `Ondigitals` (broadcasting operators) have started newly the pay broadcasting. Toshiba has been selected as one of the six developers and manufacturers of digital terrestrial broadcasting receivers, and has developed the digital terrestrial broadcasting receiver DTB2000. For the modulation system, the orthogonal frequency division multiplex (OFDM) was chosen as a system being strong against ghost and most suitable for digital terrestrial broadcasting. In addition, the receiver is equipped with software download function by using the broadcasting waves, and the common interface being the communication specification specified in the DVB (digital video broadcasting) to provide future function expandability. (translated by NEDO)

  18. Beyond the Anchor: Students and Broadcasting Opportunities.

    Science.gov (United States)

    Marks, Rick

    1999-01-01

    Describes how the author taught a class (called "Editing for Broadcasting") for 19 neophyte newspeople through total immersion: students learned how to run a newsroom while operating one. Notes that students learned the principles and fundamentals of broadcast journalism, including news judgment, writing, editing, reporting, and…

  19. Perceptions of Advertising Influence on Broadcast News.

    Science.gov (United States)

    Brown, Hubert W.; Barnes, Beth E.

    2001-01-01

    Finds that while students (studying broadcast journalism or advertising) and practitioners (station news directors and agency media directors) were in agreement on the majority of opinion statements discussing advertising's influence on broadcast news content, except students were less bothered by advertising's influence on news content than were…

  20. 47 CFR 73.297 - FM stereophonic sound broadcasting.

    Science.gov (United States)

    2010-10-01

    ... broadcast station may, without specific authority from the FCC, transmit stereophonic (biphonic... broadcasting must measure the pilot subcarrier frequency as often as necessary to ensure that it is kept at all...

  1. Novel store–carry–forward scheme for message dissemination in vehicular ad-hoc networks

    Directory of Open Access Journals (Sweden)

    Truc D.T. Nguyen

    2017-12-01

    Full Text Available To improve traffic safety in intelligent transportation systems, vehicles formed by vehicular ad-hoc networks (VANETs conventionally disseminate warning messages to their nearby vehicles as soon as a dangerous situation occurs. In this paper, we propose a novel scheme employing a novel story–carry–forward (SCF mechanism to tackle the network partition and broadcast storm problems, which are two major challenges in VANETs. The experimental result in the Veins simulation framework shows that the proposed SCF scheme significantly mitigates broadcast storms relative to other schemes, and maintains good coverage across various traffic densities.

  2. AUTHENTICATION ARCHITECTURE USING THRESHOLD CRYPTOGRAPHY IN KERBEROS FOR MOBILE AD HOC NETWORKS

    Directory of Open Access Journals (Sweden)

    Hadj Gharib

    2014-06-01

    Full Text Available The use of wireless technologies is gradually increasing and risks related to the use of these technologies are considerable. Due to their dynamically changing topology and open environment without a centralized policy control of a traditional network, a mobile ad hoc network (MANET is vulnerable to the presence of malicious nodes and attacks. The ideal solution to overcome a myriad of security concerns in MANET’s is the use of reliable authentication architecture. In this paper we propose a new key management scheme based on threshold cryptography in kerberos for MANET’s, the proposed scheme uses the elliptic curve cryptography method that consumes fewer resources well adapted to the wireless environment. Our approach shows a strength and effectiveness against attacks.

  3. Equilibrium in a random viewer model of television broadcasting

    DEFF Research Database (Denmark)

    Hansen, Bodil Olai; Keiding, Hans

    2014-01-01

    The authors considered a model of commercial television market with advertising with probabilistic viewer choice of channel, where private broadcasters may coexist with a public television broadcaster. The broadcasters influence the probability of getting viewer attention through the amount...... number of channels. The authors derive properties of equilibrium in an oligopolistic market with private broadcasters and show that the number of firms has a negative effect on overall advertising and viewer satisfaction. If there is a public channel that also sells advertisements but does not maximize...... profits, this will have a positive effect on advertiser and viewer satisfaction....

  4. Method and apparatus for scheduling broadcasts in social networks

    KAUST Repository

    Manzoor, Emaad Ahmed

    2016-08-25

    A method, apparatus, and computer readable medium are provided for maximizing consumption of broadcasts by a producer. An example method includes receiving selection of a total number of time slots to use for scheduling broadcasts, and receiving information regarding the producer\\'s followers. The example method further 5 includes identifying, by a processor and based on the received information, discount factors associated with the producer\\'s followers, and calculating, by the processor and based on the received information, a predicted number of competitor broadcasts during each time slot of the total number of time slots. Finally, the example method includes determining, by the processor and based on the discount factors and the predicted 10 number of competitor broadcasts during each time slot, a number of broadcasts for the producer to transmit in each time slot of the total number of time slots.

  5. Mobile Ad Hoc Network Energy Cost Algorithm Based on Artificial Bee Colony

    Directory of Open Access Journals (Sweden)

    Mustafa Tareq

    2017-01-01

    Full Text Available A mobile ad hoc network (MANET is a collection of mobile nodes that dynamically form a temporary network without using any existing network infrastructure. MANET selects a path with minimal number of intermediate nodes to reach the destination node. As the distance between each node increases, the quantity of transmission power increases. The power level of nodes affects the simplicity with which a route is constituted between a couple of nodes. This study utilizes the swarm intelligence technique through the artificial bee colony (ABC algorithm to optimize the energy consumption in a dynamic source routing (DSR protocol in MANET. The proposed algorithm is called bee DSR (BEEDSR. The ABC algorithm is used to identify the optimal path from the source to the destination to overcome energy problems. The performance of the BEEDSR algorithm is compared with DSR and bee-inspired protocols (BeeIP. The comparison was conducted based on average energy consumption, average throughput, average end-to-end delay, routing overhead, and packet delivery ratio performance metrics, varying the node speed and packet size. The BEEDSR algorithm is superior in performance than other protocols in terms of energy conservation and delay degradation relating to node speed and packet size.

  6. A Multi-User Game-Theoretical Multipath Routing Protocol to Send Video-Warning Messages over Mobile Ad Hoc Networks.

    Science.gov (United States)

    Mezher, Ahmad Mohamad; Igartua, Mónica Aguilar; de la Cruz Llopis, Luis J; Pallarès Segarra, Esteve; Tripp-Barba, Carolina; Urquiza-Aguiar, Luis; Forné, Jordi; Sanvicente Gargallo, Emilio

    2015-04-17

    The prevention of accidents is one of the most important goals of ad hoc networks in smart cities. When an accident happens, dynamic sensors (e.g., citizens with smart phones or tablets, smart vehicles and buses, etc.) could shoot a video clip of the accident and send it through the ad hoc network. With a video message, the level of seriousness of the accident could be much better evaluated by the authorities (e.g., health care units, police and ambulance drivers) rather than with just a simple text message. Besides, other citizens would be rapidly aware of the incident. In this way, smart dynamic sensors could participate in reporting a situation in the city using the ad hoc network so it would be possible to have a quick reaction warning citizens and emergency units. The deployment of an efficient routing protocol to manage video-warning messages in mobile Ad hoc Networks (MANETs) has important benefits by allowing a fast warning of the incident, which potentially can save lives. To contribute with this goal, we propose a multipath routing protocol to provide video-warning messages in MANETs using a novel game-theoretical approach. As a base for our work, we start from our previous work, where a 2-players game-theoretical routing protocol was proposed to provide video-streaming services over MANETs. In this article, we further generalize the analysis made for a general number of N players in the MANET. Simulations have been carried out to show the benefits of our proposal, taking into account the mobility of the nodes and the presence of interfering traffic. Finally, we also have tested our approach in a vehicular ad hoc network as an incipient start point to develop a novel proposal specifically designed for VANETs.

  7. A Multi-User Game-Theoretical Multipath Routing Protocol to Send Video-Warning Messages over Mobile Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    Ahmad Mohamad Mezher

    2015-04-01

    Full Text Available The prevention of accidents is one of the most important goals of ad hoc networks in smart cities. When an accident happens, dynamic sensors (e.g., citizens with smart phones or tablets, smart vehicles and buses, etc. could shoot a video clip of the accident and send it through the ad hoc network. With a video message, the level of seriousness of the accident could be much better evaluated by the authorities (e.g., health care units, police and ambulance drivers rather than with just a simple text message. Besides, other citizens would be rapidly aware of the incident. In this way, smart dynamic sensors could participate in reporting a situation in the city using the ad hoc network so it would be possible to have a quick reaction warning citizens and emergency units. The deployment of an efficient routing protocol to manage video-warning messages in mobile Ad hoc Networks (MANETs has important benefits by allowing a fast warning of the incident, which potentially can save lives. To contribute with this goal, we propose a multipath routing protocol to provide video-warning messages in MANETs using a novel game-theoretical approach. As a base for our work, we start from our previous work, where a 2-players game-theoretical routing protocol was proposed to provide video-streaming services over MANETs. In this article, we further generalize the analysis made for a general number of N players in the MANET. Simulations have been carried out to show the benefits of our proposal, taking into account the mobility of the nodes and the presence of interfering traffic. Finally, we also have tested our approach in a vehicular ad hoc network as an incipient start point to develop a novel proposal specifically designed for VANETs.

  8. Ad-Me: A Context-Sensitive Advertising System

    OpenAIRE

    Hristova, Nataliya; O'Hare, G. M. P. (Greg M. P.)

    2001-01-01

    The mobile commerce sector and in particular the context sensitive advertising will represent a high yield revenue stream. This paper introduces the Ad-me (Advertising for the Mobile E-commerce user) system. The Ad-me is a mobile tourist guide that proactively delivers advertisements to users based upon perceived individual user needs together with their location. A Multi-Agent Systems (MAS) design philosophy is adopted. In order to achieve maximum content diffusion a range of presentation...

  9. 77 FR 33098 - Unlicensed Operation in the TV Broadcast Band

    Science.gov (United States)

    2012-06-05

    ...] Unlicensed Operation in the TV Broadcast Band AGENCY: Federal Communications Commission. ACTION: Correcting... matter of ``Unlicensed Operation in the TV Broadcast Band Approval.'' This document contains corrections... of this correction relate to ``Unlicensed Operation in the TV Broadcast Band Approval'' under Sec. 15...

  10. How we use online broadcasting - Web TV - for community engagement

    Science.gov (United States)

    Allison, M. L.; Conway, F. M.; Matti, J.; Palmer, R.

    2013-12-01

    The Arizona Geological Survey uses online broadcasting (Webcast or 'Web TV') to help fulfill our statutory mission to 'Inform, advise and assist the public in matters concerning the geological processes, materials and landscapes and the development and use of the mineral resources of this state.' We launched a monthly online broadcast called 'Arizona Mining Review' via Livestream, a low-cost or free video streaming service. The show provides news, interviews, and discussions about mining and mineral resources topics of interest in Arizona, the nation's second largest non-fuel mining state. The costs to set up and broadcast are minor. Interviews with local guests are held in a corner of the AZGS conference room with easy chairs and a couch; long-distance interviews are held via Skype. The broadcast originates from a desktop computer with a webcam, a $60 microphone, three sets of earbud headphones and a powered amplifier. During broadcasts, we supplement interview footage with slides, photos, or video clips that we have or are provided by guests. Initial broadcasts were live; recordings of these were later uploaded to our YouTube channel. Because scheduling and executing a live Internet broadcast is stressful and demanding for both the production team and guests, we recently elected to record and produce episodes prior to broadcasting them. This allows us more control over supplementary materials used during the broadcast; it also permits us to record the broadcast using a high-definition digital video camera that cannot be used for streaming video. In addition to the Arizona Mining Review, we record conferences and workshops and special presentations on topical issues. A video on the recently discovered Little Chino fault has drawn over 3,000 views. Our latest presentations are short 1-2 minute 'video abstracts' delivered by authors of new publications released by the Survey. These include maps and graphics from the reports to help illustrate the topics and their

  11. Mobile Ad Hoc Networks in Bandwidth-Demanding Mission-Critical Applications: Practical Implementation Insights

    KAUST Repository

    Bader, Ahmed

    2016-09-28

    There has been recently a growing trend of using live video feeds in mission-critical applications. Real-time video streaming from front-end personnel or mobile agents is believed to substantially improve situational awareness in mission-critical operations such as disaster relief, law enforcement, and emergency response. Mobile Ad Hoc Networks (MANET) is a natural contender in such contexts. However, classical MANET routing schemes fall short in terms of scalability, bandwidth and latency; all three metrics being quite essential for mission-critical applications. As such, autonomous cooperative routing (ACR) has gained traction as the most viable MANET proposition. Nonetheless, ACR is also associated with a few implementation challenges. If they go unaddressed, will deem ACR practically useless. In this paper, efficient and low-complexity remedies to those issues are presented, analyzed, and validated. The validation is based on field experiments carried out using software-defined radio (SDR) platforms. Compared to classical MANET routing schemes, ACR was shown to offer up to 2X better throughput, more than 4X reduction in end-to-end latency, while observing a given target of transport rate normalized to energy consumption.

  12. 76 FR 14855 - Television Broadcasting Services; Nashville, TN

    Science.gov (United States)

    2011-03-18

    ... FEDERAL COMMUNICATIONS COMMISSION 47 CFR Part 73 [MB Docket No. 11-29, RM-11622; DA 11-335] Television Broadcasting Services; Nashville, TN AGENCY: Federal Communications Commission. ACTION: Proposed... 73 Television, Television broadcasting. Federal Communications Commission. Kevin R. Harding...

  13. Water vapor estimation using digital terrestrial broadcasting waves

    Science.gov (United States)

    Kawamura, S.; Ohta, H.; Hanado, H.; Yamamoto, M. K.; Shiga, N.; Kido, K.; Yasuda, S.; Goto, T.; Ichikawa, R.; Amagai, J.; Imamura, K.; Fujieda, M.; Iwai, H.; Sugitani, S.; Iguchi, T.

    2017-03-01

    A method of estimating water vapor (propagation delay due to water vapor) using digital terrestrial broadcasting waves is proposed. Our target is to improve the accuracy of numerical weather forecast for severe weather phenomena such as localized heavy rainstorms in urban areas through data assimilation. In this method, we estimate water vapor near a ground surface from the propagation delay of digital terrestrial broadcasting waves. A real-time delay measurement system with a software-defined radio technique is developed and tested. The data obtained using digital terrestrial broadcasting waves show good agreement with those obtained by ground-based meteorological observation. The main features of this observation are, no need for transmitters (receiving only), applicable wherever digital terrestrial broadcasting is available and its high time resolution. This study shows a possibility to estimate water vapor using digital terrestrial broadcasting waves. In the future, we will investigate the impact of these data toward numerical weather forecast through data assimilation. Developing a system that monitors water vapor near the ground surface with time and space resolutions of 30 s and several kilometers would improve the accuracy of the numerical weather forecast of localized severe weather phenomena.

  14. An Efficient Live TV Scheduling System for 4G LTE Broadcast

    KAUST Repository

    Lau, Chun Pong

    2016-01-01

    Traditional live television (TV) broadcasting systems are proven to be spectrum inefficient. Therefore, researchers propose to provide TV services on fourth-generation (4G) long-term evolution (LTE) networks. However, static broadcast, a typical broadcasting method over cellular network, is inefficient in terms of radio resource usage. To solve this problem, the audience-driven live TV scheduling (ADTVS) framework is proposed, to maximize radio resource usage when providing TV broadcasting services over LTE networks. ADTVS, a system-level scheduling framework, considers both available radio resources and audience preferences, in order to dynamically schedule TV channels for broadcasting at various time and locations. By conducting a simulation using real-life data and scenarios, it is shown that ADTVS significantly outperforms the static broadcast method. Numerical results indicate that, on average, ADTVS enables substantial improvement to broadcast efficiency and conserves considerable amount of radio resources, while forgoing less than 5% of user services compared to the benchmark system.

  15. 47 CFR 73.6026 - Broadcast regulations applicable to Class A television stations.

    Science.gov (United States)

    2010-10-01

    ... television stations. 73.6026 Section 73.6026 Telecommunication FEDERAL COMMUNICATIONS COMMISSION (CONTINUED) BROADCAST RADIO SERVICES RADIO BROADCAST SERVICES Class A Television Broadcast Stations § 73.6026 Broadcast regulations applicable to Class A television stations. The following rules are applicable to Class A...

  16. 75 FR 10692 - Television Broadcasting Services; Birmingham, AL

    Science.gov (United States)

    2010-03-09

    ...] Television Broadcasting Services; Birmingham, AL AGENCY: Federal Communications Commission. ACTION: Final... Television Commission, the licensee of noncommercial educational station WBIQ(TV), channel *10, Birmingham... Part 73 Television, Television broadcasting. 0 For the reasons discussed in the preamble, the Federal...

  17. 76 FR 76337 - Television Broadcasting Services; Lincoln, NE

    Science.gov (United States)

    2011-12-07

    ... FEDERAL COMMUNICATIONS COMMISSION 47 CFR Part 73 [MB Docket No. 11-192, RM-11646; DA 11-1924] Television Broadcasting Services; Lincoln, NE AGENCY: Federal Communications Commission. ACTION: Proposed... 73 Television, Television broadcasting. Federal Communications Commission Barbara A. Kreisman, Chief...

  18. 76 FR 9991 - Television Broadcasting Services; Kalispell, MT

    Science.gov (United States)

    2011-02-23

    ... FEDERAL COMMUNICATIONS COMMISSION 47 CFR Part 73 [DA 11-224; MB Docket No. 11-20; RM-11619] Television Broadcasting Services; Kalispell, MT AGENCY: Federal Communications Commission. ACTION: Proposed... 73 Television, Television broadcasting. For the reasons discussed in the preamble, the Federal...

  19. 75 FR 67077 - Television Broadcasting Services; Huntsville, AL

    Science.gov (United States)

    2010-11-01

    ... FEDERAL COMMUNICATIONS COMMISSION 47 CFR Part 73 [DA 10-2000; MB Docket No. 08-194; RM-11488] Television Broadcasting Services; Huntsville, AL AGENCY: Federal Communications Commission. ACTION: Proposed... 73 Television, Television broadcasting. For the reasons discussed in the preamble, the Federal...

  20. 75 FR 25119 - Television Broadcasting Services; Seaford, DE

    Science.gov (United States)

    2010-05-07

    ...] Television Broadcasting Services; Seaford, DE AGENCY: Federal Communications Commission. ACTION: Final rule... very high frequency commercial television channel to each State, if technically feasible. DATES: This... Part 73 Television, Television broadcasting. 0 For the reasons discussed in the preamble, the Federal...

  1. 76 FR 54188 - Television Broadcasting Services; Montgomery, AL

    Science.gov (United States)

    2011-08-31

    ... FEDERAL COMMUNICATIONS COMMISSION 47 CFR Part 73 [MB Docket No. 11-137, RM-11637; DA 11-1414] Television Broadcasting Services; Montgomery, AL AGENCY: Federal Communications Commission. ACTION: Proposed... 47 CFR Part 73 Television, Television broadcasting. Federal Communications Commission. Barbara A...

  2. 75 FR 9859 - Television Broadcasting Services; Beaumont, TX

    Science.gov (United States)

    2010-03-04

    ... FEDERAL COMMUNICATIONS COMMISSION 47 CFR Part 73 [DA 10-307; MB Docket No. 10-49; RM-11593] Television Broadcasting Services; Beaumont, TX AGENCY: Federal Communications Commission. ACTION: Proposed... 73 Television, Television broadcasting. For the reasons discussed in the preamble, the Federal...

  3. 76 FR 13966 - Television Broadcasting Services; Topeka, KS

    Science.gov (United States)

    2011-03-15

    ... FEDERAL COMMUNICATIONS COMMISSION 47 CFR Part 73 [MB Docket No. 11-33, RM-11623; DA 11-406] Television Broadcasting Services; Topeka, KS AGENCY: Federal Communications Commission. ACTION: Proposed rule... 73 Television, Television broadcasting. Federal Communications Commission. Barbara A. Kreisman, Chief...

  4. 76 FR 3875 - Television Broadcasting Services; Decatur, IL

    Science.gov (United States)

    2011-01-21

    ... FEDERAL COMMUNICATIONS COMMISSION 47 CFR Part 73 [DA 10-2426; MB Docket No. 10-264; RM-11615] Television Broadcasting Services; Decatur, IL AGENCY: Federal Communications Commission. ACTION: Proposed... 73 Television, Television broadcasting. For the reasons discussed in the preamble, the Federal...

  5. Adding navigation, artificial audition and vital sign monitoring capabilities to a telepresence mobile robot for remote home care applications.

    Science.gov (United States)

    Laniel, Sebastien; Letourneau, Dominic; Labbe, Mathieu; Grondin, Francois; Polgar, Janice; Michaud, Francois

    2017-07-01

    A telepresence mobile robot is a remote-controlled, wheeled device with wireless internet connectivity for bidirectional audio, video and data transmission. In health care, a telepresence robot could be used to have a clinician or a caregiver assist seniors in their homes without having to travel to these locations. Many mobile telepresence robotic platforms have recently been introduced on the market, bringing mobility to telecommunication and vital sign monitoring at reasonable costs. What is missing for making them effective remote telepresence systems for home care assistance are capabilities specifically needed to assist the remote operator in controlling the robot and perceiving the environment through the robot's sensors or, in other words, minimizing cognitive load and maximizing situation awareness. This paper describes our approach adding navigation, artificial audition and vital sign monitoring capabilities to a commercially available telepresence mobile robot. This requires the use of a robot control architecture to integrate the autonomous and teleoperation capabilities of the platform.

  6. Enhanced Secure Trusted AODV (ESTA Protocol to Mitigate Blackhole Attack in Mobile Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    Dilraj Singh

    2015-09-01

    Full Text Available The self-organizing nature of the Mobile Ad hoc Networks (MANETs provide a communication channel anywhere, anytime without any pre-existing network infrastructure. However, it is exposed to various vulnerabilities that may be exploited by the malicious nodes. One such malicious behavior is introduced by blackhole nodes, which can be easily introduced in the network and, in turn, such nodes try to crumble the working of the network by dropping the maximum data under transmission. In this paper, a new protocol is proposed which is based on the widely used Ad hoc On-Demand Distance Vector (AODV protocol, Enhanced Secure Trusted AODV (ESTA, which makes use of multiple paths along with use of trust and asymmetric cryptography to ensure data security. The results, based on NS-3 simulation, reveal that the proposed protocol is effectively able to counter the blackhole nodes in three different scenarios.

  7. LITERATURE SURVEY ON EXISTING POWER SAVING ROUTING METHODS AND TECHNIQUES FOR INCREASING NETWORK LIFE TIME IN MANET

    Directory of Open Access Journals (Sweden)

    K Mariyappan

    2017-06-01

    Full Text Available Mobile ad hoc network (MANET is a special type of wireless network in which a collection of wireless mobile devices (called also nodes dynamically forming a temporary network without the need of any pre-existing network infrastructure or centralized administration. Currently, Mobile ad hoc networks (MANETs play a significant role in university campus, advertisement, emergency response, disaster recovery, military use in battle fields, disaster management scenarios, in sensor network, and so on. However, wireless network devices, especially in ad hoc networks, are typically battery-powered. Thus, energy efficiency is a critical issue for battery-powered mobile devices in ad hoc networks. This is due to the fact that failure of node or link allows re-routing and establishing a new path from source to destination which creates extra energy consumption of nodes and sparse network connectivity, leading to a more likelihood occurrences of network partition. Routing based on energy related parameters is one of the important solutions to extend the lifetime of the node and reduce energy consumption of the network. In this paper detail literature survey on existing energy efficient routing method are studied and compared for their performance under different condition. The result has shown that both the broadcast schemes and energy aware metrics have great potential in overcoming the broadcast storm problem associated with flooding. However, the performances of these approaches rely on either the appropriate selection of the broadcast decision parameter or an energy efficient path. In the earlier proposed broadcast methods, the forwarding probability is selected based on fixed probability or number of neighbors regardless of nodes battery capacity whereas in energy aware schemes energy inefficient node could be part of an established path. Therefore, in an attempt to remedy the paucity of research and to address the gaps identified in this area, a study

  8. Public and Private Activity in Commercial TV Broadcasting

    DEFF Research Database (Denmark)

    Olai Hansen, Bodil; Keiding, Hans

    2006-01-01

    We consider a model of commercial television market, where private broadcasters coexist with a public television broadcaster. Assuming that the public TV station follows a policy of Ramsey pricing whereas the private stations are profit maximizers, we consider the equilibria in this market...

  9. An Opportunistic Routing for Data Forwarding Based on Vehicle Mobility Association in Vehicular Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    Leilei Wang

    2017-11-01

    Full Text Available Vehicular ad hoc networks (VANETs have emerged as a new powerful technology for data transmission between vehicles. Efficient data transmission accompanied with low data delay plays an important role in selecting the ideal data forwarding path in VANETs. This paper proposes a new opportunity routing protocol for data forwarding based on vehicle mobility association (OVMA. With assistance from the vehicle mobility association, data can be forwarded without passing through many extra intermediate nodes. Besides, each vehicle carries the only replica information to record its associated vehicle information, so the routing decision can adapt to the vehicle densities. Simulation results show that the OVMA protocol can extend the network lifetime, improve the performance of data delivery ratio, and reduce the data delay and routing overhead when compared to the other well-known routing protocols.

  10. Quality-of-Service Routing Using Path and Power Aware Techniques in Mobile Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    R. Asokan

    2008-01-01

    Full Text Available Mobile ad hoc network (MANET is a collection of wireless mobile hosts dynamically forming a temporary network without the aid of any existing established infrastructure. Quality of service (QoS is a set of service requirements that needs to be met by the network while transporting a packet stream from a source to its destination. QoS support MANETs is a challenging task due to the dynamic topology and limited resources. The main objective of this paper is to enhance the QoS routing for MANET using temporally ordered routing algorithm (TORA with self-healing and optimized routing techniques (SHORT. SHORT improves routing optimality by monitoring routing paths continuously and redirecting the path whenever a shortcut path is available. In this paper, the performance comparison of TORA and TORA with SHORT has been analyzed using network simulator for various parameters. TORA with SHORT enhances performance of TORA in terms of throughput, packet loss, end-to-end delay, and energy.

  11. A Survey on Distributed Mobile Database and Data Mining

    Science.gov (United States)

    Goel, Ajay Mohan; Mangla, Neeraj; Patel, R. B.

    2010-11-01

    The anticipated increase in popular use of the Internet has created more opportunity in information dissemination, Ecommerce, and multimedia communication. It has also created more challenges in organizing information and facilitating its efficient retrieval. In response to this, new techniques have evolved which facilitate the creation of such applications. Certainly the most promising among the new paradigms is the use of mobile agents. In this paper, mobile agent and distributed database technologies are applied in the banking system. Many approaches have been proposed to schedule data items for broadcasting in a mobile environment. In this paper, an efficient strategy for accessing multiple data items in mobile environments and the bottleneck of current banking will be proposed.

  12. Mechanism design for mobile geo-location advertising

    OpenAIRE

    Gatti, Nicola; Rocco, Marco; Ceppi, Sofia; Gerding, Enrico H.

    2014-01-01

    Mobile geo–location advertising, where mobile ads are targeted based on a user’s location, has been identified as a key growth factor for the mobile market. As with online advertising, a crucial ingredient for their success is the development of effective economic mechanisms. An important difference is that mobile ads are shown sequentially over time and information about the user can be learned based on their movements. Furthermore, ads need to be shown selectively to prevent ad fatigue. To ...

  13. A special broadcast of CERN's Video news

    CERN Multimedia

    2003-01-01

    A special edition of CERN's video news giving a complete update on the LHC project is to be broadcast in the Main Auditorium. After your lunch make a small detour to the Main Auditorium, where you see the big picture. On 14, 15 and 16 May, between 12:30 and 14:00, a special edition of CERN's video news bulletin will be broadcast in the Main Auditorium. You will have the chance get up-to-date on the LHC project and its experiments. With four years to go before the first collisions in the LHC, the LHC Project Leader Lyn Evans will present a status report on the construction of the accelerator. The spokesmen of the five LHC experiments (ALICE, ATLAS, CMS, LHCb and TOTEM) will explain how the work is going and what the state of play will be in four years' time. This special video news broadcast is the result of collaboration between the CERN Audiovisual Service, the Photo Service and the External communication section. The broadcast will begin with a brand-new programme title sequence. And just as in the real c...

  14. 76 FR 5119 - Television Broadcasting Services; Jackson, MS

    Science.gov (United States)

    2011-01-28

    ... FEDERAL COMMUNICATIONS COMMISSION 47 CFR Part 73 [DA 11-96; MB Docket No. 11-8; RM-11618] Television Broadcasting Services; Jackson, MS AGENCY: Federal Communications Commission. ACTION: Proposed... CFR 1.415 and 1.420. List of Subjects in 47 CFR Part 73 Television, Television broadcasting. For the...

  15. 76 FR 5290 - Television Broadcasting Services; Huntsville, AL

    Science.gov (United States)

    2011-01-31

    ...] Television Broadcasting Services; Huntsville, AL AGENCY: Federal Communications Commission. ACTION: Final... the Congressional review Act, see 5 U.S.C. 801(a)(1)(A). List of Subjects in 47 CFR Part 73 Television, Television broadcasting. For the reasons discussed in the preamble, the Federal Communications Commission...

  16. Stochastic dynamics of genetic broadcasting networks

    Science.gov (United States)

    Potoyan, Davit A.; Wolynes, Peter G.

    2017-11-01

    The complex genetic programs of eukaryotic cells are often regulated by key transcription factors occupying or clearing out of a large number of genomic locations. Orchestrating the residence times of these factors is therefore important for the well organized functioning of a large network. The classic models of genetic switches sidestep this timing issue by assuming the binding of transcription factors to be governed entirely by thermodynamic protein-DNA affinities. Here we show that relying on passive thermodynamics and random release times can lead to a "time-scale crisis" for master genes that broadcast their signals to a large number of binding sites. We demonstrate that this time-scale crisis for clearance in a large broadcasting network can be resolved by actively regulating residence times through molecular stripping. We illustrate these ideas by studying a model of the stochastic dynamics of the genetic network of the central eukaryotic master regulator NFκ B which broadcasts its signals to many downstream genes that regulate immune response, apoptosis, etc.

  17. Between Postage Stamps and Digitalization: The Changing Roles of Educational Broadcasting.

    Science.gov (United States)

    Fleisher, Frederic

    1995-01-01

    Provides a broadcasting practitioner's perspective of educational broadcasting in Europe, and how, with data compression, the emergence of more television channels can affect the educationalist and public service broadcasting. Discusses technological development, equal access to education, cultural maintenance, advertising, future outlooks, and…

  18. 75 FR 76294 - Radio Broadcasting Services; Fairbanks, AK

    Science.gov (United States)

    2010-12-08

    ... FEDERAL COMMUNICATIONS COMMISSION 47 CFR Part 73 [DA 10-2211; MB Docket No. 10-81; RM-11600] Radio Broadcasting Services; Fairbanks, AK AGENCY: Federal Communications Commission. ACTION: Final rule. SUMMARY... Subjects in 47 CFR Part 73 Radio, Radio broadcasting. 0 For the reasons discussed in the preamble, the...

  19. 75 FR 1546 - Television Broadcasting Services; Bangor, ME

    Science.gov (United States)

    2010-01-12

    ...] Television Broadcasting Services; Bangor, ME AGENCY: Federal Communications Commission. ACTION: Final rule... the Congressional review Act, see 5 U.S.C. 801(a)(1)(A). List of Subjects in 47 CFR Part 73 Television, Television broadcasting. 0 For the reasons discussed in the preamble, the Federal Communications Commission...

  20. 78 FR 44090 - Television Broadcasting Services; Cedar Rapids, Iowa

    Science.gov (United States)

    2013-07-23

    ...] Television Broadcasting Services; Cedar Rapids, Iowa AGENCY: Federal Communications Commission. ACTION... acceptance of full power television rulemaking petitions requesting channel substitutions in May 2011, it... 73 Television, Television broadcasting. Federal Communications Commission. Hossein Hashemzadeh...

  1. Assessment of Multipath and Shadowing Effects on UHF Band in ...

    African Journals Online (AJOL)

    Sultan

    bands are used for television broadcasting, mobile cellular systems, Wi-Fi, satellite communications and many others. Effective communication link in the UHF band requires direct line of sight ..... ad-hoc 802.11 wireless LAN (WLAN) devices.

  2. Mobility Based Key Management Technique for Multicast Security in Mobile Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    B. Madhusudhanan

    2015-01-01

    Full Text Available In MANET multicasting, forward and backward secrecy result in increased packet drop rate owing to mobility. Frequent rekeying causes large message overhead which increases energy consumption and end-to-end delay. Particularly, the prevailing group key management techniques cause frequent mobility and disconnections. So there is a need to design a multicast key management technique to overcome these problems. In this paper, we propose the mobility based key management technique for multicast security in MANET. Initially, the nodes are categorized according to their stability index which is estimated based on the link availability and mobility. A multicast tree is constructed such that for every weak node, there is a strong parent node. A session key-based encryption technique is utilized to transmit a multicast data. The rekeying process is performed periodically by the initiator node. The rekeying interval is fixed depending on the node category so that this technique greatly minimizes the rekeying overhead. By simulation results, we show that our proposed approach reduces the packet drop rate and improves the data confidentiality.

  3. 47 CFR 74.1205 - Protection of channel 6 TV broadcast stations.

    Science.gov (United States)

    2010-10-01

    ... 47 Telecommunication 4 2010-10-01 2010-10-01 false Protection of channel 6 TV broadcast stations... 6 TV broadcast stations. The provisions of this section apply to all applications for construction... applicant and each affected TV Channel 6 broadcast station licensee or permittee concurring with the...

  4. Tearing the Fabric of Canada: The Broadcast Media and Canadian Identity.

    Science.gov (United States)

    Weiss, Elaine F.

    This paper explores the perceived threat of American cultural "imperialism" in Canada, the effect of constant exposure to American broadcasting on the Canadian national identity, the role broadcasting plays in shaping Canadian identity, and the efforts by the Canadian government to "Canadianize" its broadcasting. A brief…

  5. A Simulation Study: The Impact of Random and Realistic Mobility Models on the Performance of Bypass-AODV in Ad Hoc Wireless Networks

    Directory of Open Access Journals (Sweden)

    Baroudi Uthman

    2010-01-01

    Full Text Available To bring VANET into reality, it is crucial to devise routing protocols that can exploit the inherited characteristics of VANET environment to enhance the performance of the running applications. Previous studies have shown that a certain routing protocol behaves differently under different presumed mobility patterns. Bypass-AODV is a new optimization of the AODV routing protocol for mobile ad-hoc networks. It is proposed as a local recovery mechanism to enhance the performance of the AODV routing protocol. It shows outstanding performance under the Random Waypoint mobility model compared with AODV. However, Random Waypoint is a simple model that may be applicable to some scenarios but it is not sufficient to capture some important mobility characteristics of scenarios where VANETs are deployed. In this paper, we will investigate the performance of Bypass-AODV under a wide range of mobility models including other random mobility models, group mobility models, and vehicular mobility models. Simulation results show an interesting feature that is the insensitivity of Bypass-AODV to the selected random mobility model, and it has a clear performance improvement compared to AODV. For group mobility model, both protocols show a comparable performance, but for vehicular mobility models, Bypass-AODV suffers from performance degradation in high-speed conditions.

  6. Obstacles to broadcasting for national integration in Nigeria.

    Science.gov (United States)

    Amienyi, O P

    1989-01-01

    In Nigeria, the media is the major government vehicle to achieve national integration. The problems arise from the approximately 250 ethnic groups speaking many languages. Television and radio have caused disintegration by emphasizing alienation and polarization rather than unity. With more than 178 languages there are major problems for radio and television. The government leaders have promoted a strong interest in creating a unified society through broadcasting, but at the same time have allowed media managers to operate towards goals of ethnic protection. Religion is also a factor that hinders broadcasting for national unity, since there are Hausa and Muslim in the north, Catholic in the south-east, and in the south-west there are many African ethnic religions. More than 60% of the local programming on television is keyed to local religious subjects. Illiteracy is also a problem in the use of broadcasting in the goal of national integration. Only through education of a socially conscious people can the religious fanaticism, ethnocentrism, and tribalism be overcome to form a united nation. Broadcasting can play an important role consistent with the needs of society as a whole. Managers in broadcasting must be well educated, well trained and understand the needs and ambitions of society. They need to support these needs and ambitions, and be constructively critical when necessary for the betterment of society.

  7. National association of broadcasters engineering handbook NAB engineering handbook

    CERN Document Server

    Jones, Graham A; Osenkowsky, Thomas G; Williams, Edmund A

    2013-01-01

    The NAB Engineering Handbook provides detailed information on virtually every aspect of the broadcast chain, from news gathering, program production and postproduction through master control and distribution links to transmission, antennas, RF propagation, cable and satellite. Hot topics covered include HD Radio, HDTV, 2 GHz broadcast auxiliary services, EAS, workflow, metadata, digital asset management, advanced video and audio compression, audio and video over IP, and Internet broadcasting. A wide range of related topics that engineers and managers need to understand are also covered, includ

  8. Collaboration Layer for Robots in Mobile Ad-hoc Networks

    DEFF Research Database (Denmark)

    Borch, Ole; Madsen, Per Printz; Broberg, Jacob Honor´e

    2009-01-01

    networks to solve tasks collaboratively. In this proposal the Collaboration Layer is modelled to handle service and position discovery, group management, and synchronisation among robots, but the layer is also designed to be extendable. Based on this model of the Collaboration Layer, generic services...... are provided to the application running on the robot. The services are generic because they can be used by many different applications, independent of the task to be solved. Likewise, specific services are requested from the underlying Virtual Machine, such as broadcast, multicast, and reliable unicast....... A prototype of the Collaboration Layer has been developed to run in a simulated environment and tested in an evaluation scenario. In the scenario five robots solve the tasks of vacuum cleaning and entrance guarding, which involves the ability to discover potential co-workers, form groups, shift from one group...

  9. A Dynamic Reputation Management System for Mobile Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    Eric Chiejina

    2015-04-01

    Full Text Available Nodes in mobile ad hoc networks (MANETs are mandated to utilize their limited energy resources in forwarding routing control and data packets for other nodes. Since a MANET lacks a centralized administration and control, a node may decide to act selfishly, either by refusing to respond to route requests from other nodes or deceitfully by responding to some route requests, but dropping the corresponding data packets that are presented for forwarding. A significant increase in the presence of these misbehaving nodes in a MANET can subsequently degrade network performance. In this paper, we propose a dynamic reputation management system for detecting and isolating misbehaving nodes in MANETs. Our model employs a novel direct monitoring technique to evaluate the reputation of a node in the network, which ensures that nodes that expend their energy in transmitting data and routing control packets for others are allowed to carry out their network activities while the misbehaving nodes are detected and isolated from the network. Simulation results show that our model is effective at curbing and mitigating the effects of misbehaving nodes in the network.

  10. Associations Between Thematic Content and Industry Self-Regulation Code Violations in Beer Advertising Broadcast During the U.S. NCAA Basketball Tournament.

    Science.gov (United States)

    Noel, Jonathan K; Xuan, Ziming; Babor, Thomas F

    2017-07-03

    Beer marketing in the United States is controlled through self-regulation, whereby the beer industry has created a marketing code and enforces its use. We performed a thematic content analysis on beer ads broadcast during a U.S. college athletic event and determined which themes are associated with violations of a self-regulated alcohol marketing code. 289 beer ads broadcast during the U.S. NCAA Men's and Women's 1999-2008 basketball tournaments were assessed for the presence of 23 thematic content areas. Associations between themes and violations of the U.S. Beer Institute's Marketing and Advertising Code were determined using generalized linear models. Humor (61.3%), taste (61.0%), masculinity (49.2%), and enjoyment (36.5%) were the most prevalent content areas. Nine content areas (i.e., conformity, ethnicity, sensation seeking, sociability, romance, special occasions, text responsibility messages, tradition, and individuality) were positively associated with code violations (p marketing codes to ensure better protection of vulnerable populations. The use of several themes is concerning in relation to adolescent alcohol use and health disparities.

  11. Joint Transmit Antenna Selection and Power Allocation for ISDF Relaying Mobile-to-Mobile Sensor Networks.

    Science.gov (United States)

    Xu, Lingwei; Zhang, Hao; Gulliver, T Aaron

    2016-02-19

    The outage probability (OP) performance of multiple-relay incremental-selective decode-and-forward (ISDF) relaying mobile-to-mobile (M2M) sensor networks with transmit antenna selection (TAS) over N-Nakagami fading channels is investigated. Exact closed-form OP expressions for both optimal and suboptimal TAS schemes are derived. The power allocation problem is formulated to determine the optimal division of transmit power between the broadcast and relay phases. The OP performance under different conditions is evaluated via numerical simulation to verify the analysis. These results show that the optimal TAS scheme has better OP performance than the suboptimal scheme. Further, the power allocation parameter has a significant influence on the OP performance.

  12. 76 FR 52632 - Television Broadcasting Services; Panama City, FL

    Science.gov (United States)

    2011-08-23

    ...] Television Broadcasting Services; Panama City, FL AGENCY: Federal Communications Commission. ACTION: Proposed rule. SUMMARY: The Commission has before it a petition for rulemaking filed by Gray Television Licensee... 73 Television, Television broadcasting. Federal Communications Commission. Barbara A. Kreisman, Chief...

  13. 76 FR 35831 - Television Broadcasting Services; Eau Claire, WI

    Science.gov (United States)

    2011-06-20

    ...] Television Broadcasting Services; Eau Claire, WI AGENCY: Federal Communications Commission. ACTION: Proposed rule. SUMMARY: The Commission has before it a petition for rulemaking filed by Gray Television Licensee... 73 Television, Television broadcasting. Federal Communications Commission. Barbara A. Kreisman, Chief...

  14. Broadcasting a message in a parallel computer

    Science.gov (United States)

    Berg, Jeremy E [Rochester, MN; Faraj, Ahmad A [Rochester, MN

    2011-08-02

    Methods, systems, and products are disclosed for broadcasting a message in a parallel computer. The parallel computer includes a plurality of compute nodes connected together using a data communications network. The data communications network optimized for point to point data communications and is characterized by at least two dimensions. The compute nodes are organized into at least one operational group of compute nodes for collective parallel operations of the parallel computer. One compute node of the operational group assigned to be a logical root. Broadcasting a message in a parallel computer includes: establishing a Hamiltonian path along all of the compute nodes in at least one plane of the data communications network and in the operational group; and broadcasting, by the logical root to the remaining compute nodes, the logical root's message along the established Hamiltonian path.

  15. A Performance Evaluation Model for Mobile Ad Hoc Networks and Sensor Networks

    Directory of Open Access Journals (Sweden)

    Heng LUO

    2014-03-01

    Full Text Available Potential applications in areas such as military sites and disaster relief fields that are characterized by absence of prefixed infrastructure justify the development of mobile ad hoc networks (MANETs and wireless sensor networks (WSNs. However, unfavorable wireless links and dynamic topology are still challenging, leading to the proposal of a collection of routing protocols for MANETs and WSNs. Nevertheless the performance of algorithms may vary with deployment scenario due to the application dependent philosophy behind algorithms. In this paper, the performance evaluation problem for MANETs and WSNs is investigated and a novel performance ranking model, termed AHP-SAW, is proposed. For simplicity but without loss of generality, the performance of two routing protocols DSDV and DSR are studies based on which ranking results are provided. Extensive simulations show that an overall 37.2 %, at most, gain may be achieved based on the AHP-SAW model.

  16. Characteristics of hybrid broadcast broadband television (HbbTV

    Directory of Open Access Journals (Sweden)

    Jakšić Branimir

    2017-01-01

    Full Text Available This paper describes the working principle of hybrid broadcast-broadband TV (Hybrid Broadcast Broadband TV - HbbTV. The architecture of HbbTV system is given, the principle of its operation, as well as an overview of HbbTV specification standards that are in use, with their basic characteristics. Here are described the services provided by Hybrid TV. It is also provided an overview of the distribution of HbbTV services in Europe in terms of the number of TV channels that HbbTV services offer, the number of active hybrid TV devices, HbbTV standards which are in use and models of broadcast networks used to distribute HbbTV service.

  17. Modeling Consumer Adoption and Usage of Value-Added Mobile Services

    NARCIS (Netherlands)

    R. Prins (Remco)

    2008-01-01

    textabstractIn recent years, the mobile telecommunications market has been very dynamic in terms of innovations. Mobile service providers continuously invest in new technologies and introduce many new mobile services for consumers, such as MMS and web services. However, adoption rates are often not

  18. Canal + Spain & Live Football Broadcasts: A Whole Different Game

    NARCIS (Netherlands)

    Rodríguez Ortega, Vicente; Romero Santos, Rubén

    2017-01-01

    textabstractIn 1988 the Law for Private Television Broadcasting was approved by Spanish parliament. Three licenses were initially awarded. Soon thereafter, in 1990, three channels started broadcasting: Antena 3, Berlusconi-related Tele 5 and, against all odds, a pay channel, Canal + Spain. This

  19. Airborne evaluation/verification of antenna patterns of broadcasting stations

    NARCIS (Netherlands)

    Witvliet, Ben

    2006-01-01

    This paper describes a method for airborne evaluation and verification of the antenna patterns of broadcasting stations. Although it is intended for governmental institutions and broadcasters it may be also of interest to anyone who wants to evaluate large radiating structures. An airborne

  20. 76 FR 5120 - Television Broadcasting Services; El Paso, TX

    Science.gov (United States)

    2011-01-28

    ... FEDERAL COMMUNICATIONS COMMISSION 47 CFR Part 73 [DA 11-74; MB Docket No. 11-4; RM-11616] Television Broadcasting Services; El Paso, TX AGENCY: Federal Communications Commission. ACTION: Proposed... 73 Television, Television broadcasting. For the reasons discussed in the preamble, the Federal...

  1. Mobility2.0: co-operative ITS systems for enhanced electric vehicle mobility

    NARCIS (Netherlands)

    Unknown, [Unknown; Dimitrova, D.C.; Brogle, M.; Braun, T.; Heijenk, Gerhard J.

    Mobility2.0 will develop and test an in-vehicle commuting assistant for FEV mobility, resulting in more reliable and energy-efficient electro-mobility. In order to achieve a maximum impact, Mobility2.0 takes an integrated approach of ad- dressing the main bottlenecks of urban FEV mobility: range

  2. Religious Broadcasting in the Middle East : Content Analysis of ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    Over the past decade, television broadcasting has become central in shaping public attitudes in the Middle East. Against a backdrop of authoritarian governments, political instability, war and pervasive foreign military intervention, broadcasting has emerged as a platform for expressing views and opinions that might ...

  3. 78 FR 78318 - Television Broadcasting Services; Oklahoma City, Oklahoma

    Science.gov (United States)

    2013-12-26

    ...: Proposed rule. SUMMARY: The Commission has before it a petition for rulemaking filed by Family Broadcasting Group, Inc. (``Family Broadcasting''), the licensee of station KSBI(TV), channel 51, Oklahoma City... instituted a freeze on the acceptance of full power television rulemaking petitions requesting channel...

  4. 75 FR 5015 - Television Broadcasting Services; Oklahoma City, OK

    Science.gov (United States)

    2010-02-01

    ...] Television Broadcasting Services; Oklahoma City, OK AGENCY: Federal Communications Commission. ACTION... procedures for comments, see 47 CFR 1.415 and 1.420. List of Subjects in 47 CFR Part 73 Television, Television broadcasting. For the reasons discussed in the preamble, the Federal Communications Commission...

  5. Effect Through Broadcasting System Access Point For Video Transmission

    Directory of Open Access Journals (Sweden)

    Leni Marlina

    2015-08-01

    Full Text Available Most universities are already implementing wired and wireless network that is used to access integrated information systems and the Internet. At present it is important to do research on the influence of the broadcasting system through the access point for video transmitter learning in the university area. At every university computer network through the access point must also use the cable in its implementation. These networks require cables that will connect and transmit data from one computer to another computer. While wireless networks of computers connected through radio waves. This research will be a test or assessment of how the influence of the network using the WLAN access point for video broadcasting means learning from the server to the client. Instructional video broadcasting from the server to the client via the access point will be used for video broadcasting means of learning. This study aims to understand how to build a wireless network by using an access point. It also builds a computer server as instructional videos supporting software that can be used for video server that will be emitted by broadcasting via the access point and establish a system of transmitting video from the server to the client via the access point.

  6. GPS Ephemeris Message Broadcast Simulation

    National Research Council Canada - National Science Library

    Browne, Nathan J; Light, James J

    2005-01-01

    The warfighter constantly needs increased accuracy from GPS and a means to increasing this accuracy to the decimeter level is a broadcast ephemeris message containing GPS satellite orbit and clock corrections...

  7. Over the top mobile TV : A field trial by public and commercial broadcasters

    NARCIS (Netherlands)

    Bouwman, W.A.G.A.; De Reuver, G.A.; Stalman, S.

    2014-01-01

    Mobile TV has been on the research agenda and promoted by Telecom operators as the killer app for their services for a long time. However with the emergence of Over The Top providers (OTT’s) mobile Internet offers the opportunity to fulfil this unmet promise. In this paper we discuss the results of

  8. Energy-Efficient Broadcasting Scheme for Smart Industrial Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Zhuangbin Chen

    2017-01-01

    Full Text Available In smart Industrial Wireless Sensor Networks (IWSNs, sensor nodes usually adopt a programmable technology. These smart devices can obtain new or special functions by reprogramming: they upgrade their soft systems through receiving new version of program codes. If sensor nodes need to be upgraded, the sink node will propagate program code packets to them through “one-to-many” broadcasting, and therefore new capabilities can be obtained, forming the so-called Software Defined Network (SDN. However, due to the high volume of code packet, the constraint energy of sensor node, and the unreliable link quality of wireless network, rapidly broadcasting the code packets to all nodes in network can be a challenge issue. In this paper, a novel Energy-efficient Broadcast scheme with adjustable broadcasting radius is proposed aiming to improve the performance of network upgrade. In our scheme, the nonhotspots sensor nodes take full advantage of their residual energy caused in data collection period to improve the packet reception probability and reduce the broadcasting delay of code packet transmission by enlarging the broadcasting radius, that is, the transmitting power. The theoretical analyses and experimental results show that, compared with previous work, our approach can averagely reduce the Network Upgrade Delay (NUD by 14.8%–45.2% and simultaneously increase the reliability without harming the lifetime of network.

  9. Virtue Broadcasting - directorate change

    CERN Multimedia

    2003-01-01

    The Board of Virtue Broadcasting Plc ("Virtue") have announced the appointment of Mr. Klaus Ackerstaff as the CEO of the main Board. He began his professional career at CERN, where he was responsible for the IT infrastructure of the OPAL (particle physics) project (1/2 page).

  10. THE ROLE OF BROADCASTING AGENCY TO BUILD THE LEGAL COMPLIANCE OF SOCIETY

    Directory of Open Access Journals (Sweden)

    Lilik Rukitasari

    2016-06-01

    Full Text Available Abstract Broadcasting has become part of peoples’ lives needs for information, entertainment and education. Broadcasting agency as mass communication media play a role to shape the behavior of political, social, and economic in every society, in order to establish the public legal compliance through broadcasting activities that are counseling and law clarification, it takes effective communication media so that the target is expected to be achieved through increased the quality broadcast programs and attractive containing understanding and knowledge about the law will be able to increase publics’ consciousness and legal compliance. This study using sociological-juridical approach by analyzing the empirical data in order to understand the social and legal responsibilities and functions of broadcasting as a mass communication media is effective in disseminating the law and the formation of values, the result of study drawn through the broadcast media were able to create a culture norms, it means the function of media is not only as a transmitter of information to disseminate the law to the public but also it can have the effect of influencing and encouraging the change of behavior towards the law-abiding. Keywords: Broadcasting Agency, Law Compliance, Society

  11. Construction of Pipelined Strategic Connected Dominating Set for Mobile Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    Ceronmani Sharmila

    2016-06-01

    Full Text Available Efficient routing between nodes is the most important challenge in a Mobile Ad Hoc Network (MANET. A Connected Dominating Set (CDS acts as a virtual backbone for routing in a MANET. Hence, the construction of CDS based on the need and its application plays a vital role in the applications of MANET. The PipeLined Strategic CDS (PLS-CDS is constructed based on strategy, dynamic diameter and transmission range. The strategy used for selecting the starting node is, any source node in the network, which has its entire destination within a virtual pipelined coverage, instead of the node with maximum connectivity. The other nodes are then selected based on density and velocity. The proposed CDS also utilizes the energy of the nodes in the network in an optimized manner. Simulation results showed that the proposed algorithm is better in terms of size of the CDS and average hop per path length.

  12. Satellite broadcasting - The European experience and perspective

    Science.gov (United States)

    Watson, Alan

    1991-11-01

    The use of satellites is considered as a means for developing a European transnational broadcasting system with attention given to the control of technology. A tension is described between maintaining technology as the property of one nation when the DBSs are developed for multinational program broadcasting. The simultaneous development of satellite systems is theorized to lead eventually to a single merged program for a particular nation, and the effect is considered of the regulation of cross-holding and cross-selling systems by investors.

  13. Retrieving Radio News Broadcasts in Danish: Accuracy and Categorization of Unrecognized Words

    DEFF Research Database (Denmark)

    Hertzum, Morten; Lund, Haakon; Troelsgaard, Rasmus

    2016-01-01

    Digital archives of radio news broadcasts can possibly be made searchable by combining speech recognition with information retrieval. We explore this possibility for the retrieval of news broadcasts in Danish. An average of 84% of the words in the broadcasts was recognized. Most of the unrecogniz...

  14. TV Recommendation and Personalization Systems: Integrating Broadcast and Video On demand Services

    Directory of Open Access Journals (Sweden)

    SOARES, M.

    2014-02-01

    Full Text Available The expansion of Digital Television and the convergence between conventional broadcasting and television over IP contributed to the gradual increase of the number of available channels and on demand video content. Moreover, the dissemination of the use of mobile devices like laptops, smartphones and tablets on everyday activities resulted in a shift of the traditional television viewing paradigm from the couch to everywhere, anytime from any device. Although this new scenario enables a great improvement in viewing experiences, it also brings new challenges given the overload of information that the viewer faces. Recommendation systems stand out as a possible solution to help a watcher on the selection of the content that best fits his/her preferences. This paper describes a web based system that helps the user navigating on broadcasted and online television content by implementing recommendations based on collaborative and content based filtering. The algorithms developed estimate the similarity between items and users and predict the rating that a user would assign to a particular item (television program, movie, etc.. To enable interoperability between different systems, programs? characteristics (title, genre, actors, etc. are stored according to the TV-Anytime standard. The set of recommendations produced are presented through a Web Application that allows the user to interact with the system based on the obtained recommendations.

  15. Loops of Spoken Language i Danish Broadcasting Corporation News

    DEFF Research Database (Denmark)

    le Fevre Jakobsen, Bjarne

    2012-01-01

    The tempo of Danish television news broadcasts has changed markedly over the past 40 years, while the language has essentially always been conservative, and remains so today. The development in the tempo of the broadcasts has gone through a number of phases from a newsreader in a rigid structure...

  16. Research of Ad Hoc Networks Access Algorithm

    Science.gov (United States)

    Xiang, Ma

    With the continuous development of mobile communication technology, Ad Hoc access network has become a hot research, Ad Hoc access network nodes can be used to expand capacity of multi-hop communication range of mobile communication system, even business adjacent to the community, improve edge data rates. When the ad hoc network is the access network of the internet, the gateway discovery protocol is very important to choose the most appropriate gateway to guarantee the connectivity between ad hoc network and IP based fixed networks. The paper proposes a QoS gateway discovery protocol which uses the time delay and stable route to the gateway selection conditions. And according to the gateway discovery protocol, it also proposes a fast handover scheme which can decrease the handover time and improve the handover efficiency.

  17. 47 CFR 73.1210 - TV/FM dual-language broadcasting in Puerto Rico.

    Science.gov (United States)

    2010-10-01

    ... 47 Telecommunication 4 2010-10-01 2010-10-01 false TV/FM dual-language broadcasting in Puerto Rico...-language broadcasting in Puerto Rico. (a) For the purpose of this section, dual-language broadcasting shall... a different language. (b) Television and Class A television licensees in Puerto Rico may enter into...

  18. A content analysis of health-related advertisements in Islamic Republic of Iran broadcasting (IRIB)

    Science.gov (United States)

    Etemad, Koorosh; Ebrahimi, Parvin; Azimi, Hassan; Lotfi, Mansoureh; Nojomi, Marzieh

    2016-01-01

    Background: Media advertisements especially radio and TV are one of the most important and effective ways for health promotion and consumption of healthy productions worldwide. Ministry of Health and some other ministries in Iran agreed to control and restrict the advertising of unhealthy products and services. Therefore, adequate supervision and monitoring should be done in this field. A content analysis of Health-related Advertisements was done in Islamic Republic of Iran Broadcasting (IRIB) Methods: This study was a cross-sectional research and collecting of data was carried out in 2012. Ten selected TV and radio channels were recorded from 6 a.m. to 12 p.m. for two successive months in the special weekdays. Broadcasted advertisements data were extracted by the trained observers according to a checklist and analyzed using SPSS 18 software and described with descriptive statistics. Results: The percentage of different types of advertising were including 73.9% unrelated to health, 21.9% harmless health related, 2.9% less healthy, 1.3% harmful or harmful with a probability of abuse. Non-harmful to health advertisements included 95.86% of total advertisements out of ten TV and radio channels; and the remained advertisements (4.14%) were related to the harmful, less healthy foodstuff and detrimental services and products. Also, 0.8% of the advertisements were shown during children programs. Conclusion: The main findings of the current study revealed that majority of the advertisements of Islamic Republic Broadcasting were unrelated to health. It seems advertising of harmful for health in IRIB was less than 5%, and the levels of these type ads were less than the other countries. Even so, the policymakers need to pass and enforce some executive and governing law for the prevention of broadcasting unhealthy advertisements to increase the society health level and prevent the diseases resulted from unhealthy products causing the considerable damages in a long time. PMID

  19. 47 CFR 74.1204 - Protection of FM broadcast, FM Translator and LP100 stations.

    Science.gov (United States)

    2010-10-01

    ... 47 Telecommunication 4 2010-10-01 2010-10-01 false Protection of FM broadcast, FM Translator and... SERVICES FM Broadcast Translator Stations and FM Broadcast Booster Stations § 74.1204 Protection of FM broadcast, FM Translator and LP100 stations. (a) An application for an FM translator station will not be...

  20. CATV and the Broadcasters.

    Science.gov (United States)

    Flanagan, Bill

    Competition between cable television systems (CATV) and regular broadcast stations concerns pay-TV and distant signal importation. The pay-TV that CATV provides competes with the networks by "siphoning" away sports and feature films, while the distant signals that CATV imports to a local market "fragment" the local audience and…

  1. Evaluation of ADS-B Surveillance Data to Identify Flight Operations with Reduced Safety Margin in the National Airspace System, Phase I

    Data.gov (United States)

    National Aeronautics and Space Administration — As part of the FAA's plans for modernization of the Air Traffic Control (ATC) system, Automatic Dependent Surveillance - Broadcast (ADS-B) will be the basis of the...

  2. Secure and Fair Cluster Head Selection Protocol for Enhancing Security in Mobile Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    B. Paramasivan

    2014-01-01

    Full Text Available Mobile ad hoc networks (MANETs are wireless networks consisting of number of autonomous mobile devices temporarily interconnected into a network by wireless media. MANETs become one of the most prevalent areas of research in the recent years. Resource limitations, energy efficiency, scalability, and security are the great challenging issues in MANETs. Due to its deployment nature, MANETs are more vulnerable to malicious attack. The secure routing protocols perform very basic security related functions which are not sufficient to protect the network. In this paper, a secure and fair cluster head selection protocol (SFCP is proposed which integrates security factors into the clustering approach for achieving attacker identification and classification. Byzantine agreement based cooperative technique is used for attacker identification and classification to make the network more attack resistant. SFCP used to solve this issue by making the nodes that are totally surrounded by malicious neighbors adjust dynamically their belief and disbelief thresholds. The proposed protocol selects the secure and energy efficient cluster head which acts as a local detector without imposing overhead to the clustering performance. SFCP is simulated in network simulator 2 and compared with two protocols including AODV and CBRP.

  3. Secure and fair cluster head selection protocol for enhancing security in mobile ad hoc networks.

    Science.gov (United States)

    Paramasivan, B; Kaliappan, M

    2014-01-01

    Mobile ad hoc networks (MANETs) are wireless networks consisting of number of autonomous mobile devices temporarily interconnected into a network by wireless media. MANETs become one of the most prevalent areas of research in the recent years. Resource limitations, energy efficiency, scalability, and security are the great challenging issues in MANETs. Due to its deployment nature, MANETs are more vulnerable to malicious attack. The secure routing protocols perform very basic security related functions which are not sufficient to protect the network. In this paper, a secure and fair cluster head selection protocol (SFCP) is proposed which integrates security factors into the clustering approach for achieving attacker identification and classification. Byzantine agreement based cooperative technique is used for attacker identification and classification to make the network more attack resistant. SFCP used to solve this issue by making the nodes that are totally surrounded by malicious neighbors adjust dynamically their belief and disbelief thresholds. The proposed protocol selects the secure and energy efficient cluster head which acts as a local detector without imposing overhead to the clustering performance. SFCP is simulated in network simulator 2 and compared with two protocols including AODV and CBRP.

  4. 47 CFR 73.4082 - Comparative broadcast hearings-specialized programming formats.

    Science.gov (United States)

    2010-10-01

    ... 47 Telecommunication 4 2010-10-01 2010-10-01 false Comparative broadcast hearings-specialized programming formats. 73.4082 Section 73.4082 Telecommunication FEDERAL COMMUNICATIONS COMMISSION (CONTINUED... Comparative broadcast hearings—specialized programming formats. (a) See Memorandum Opinion and Order, FCC 80...

  5. Unequal Error Protected JPEG 2000 Broadcast Scheme with Progressive Fountain Codes

    OpenAIRE

    Chen, Zhao; Xu, Mai; Yin, Luiguo; Lu, Jianhua

    2012-01-01

    This paper proposes a novel scheme, based on progressive fountain codes, for broadcasting JPEG 2000 multimedia. In such a broadcast scheme, progressive resolution levels of images/video have been unequally protected when transmitted using the proposed progressive fountain codes. With progressive fountain codes applied in the broadcast scheme, the resolutions of images (JPEG 2000) or videos (MJPEG 2000) received by different users can be automatically adaptive to their channel qualities, i.e. ...

  6. An Adaption Broadcast Radius-Based Code Dissemination Scheme for Low Energy Wireless Sensor Networks.

    Science.gov (United States)

    Yu, Shidi; Liu, Xiao; Liu, Anfeng; Xiong, Naixue; Cai, Zhiping; Wang, Tian

    2018-05-10

    Due to the Software Defined Network (SDN) technology, Wireless Sensor Networks (WSNs) are getting wider application prospects for sensor nodes that can get new functions after updating program codes. The issue of disseminating program codes to every node in the network with minimum delay and energy consumption have been formulated and investigated in the literature. The minimum-transmission broadcast (MTB) problem, which aims to reduce broadcast redundancy, has been well studied in WSNs where the broadcast radius is assumed to be fixed in the whole network. In this paper, an Adaption Broadcast Radius-based Code Dissemination (ABRCD) scheme is proposed to reduce delay and improve energy efficiency in duty cycle-based WSNs. In the ABCRD scheme, a larger broadcast radius is set in areas with more energy left, generating more optimized performance than previous schemes. Thus: (1) with a larger broadcast radius, program codes can reach the edge of network from the source in fewer hops, decreasing the number of broadcasts and at the same time, delay. (2) As the ABRCD scheme adopts a larger broadcast radius for some nodes, program codes can be transmitted to more nodes in one broadcast transmission, diminishing the number of broadcasts. (3) The larger radius in the ABRCD scheme causes more energy consumption of some transmitting nodes, but radius enlarging is only conducted in areas with an energy surplus, and energy consumption in the hot-spots can be reduced instead due to some nodes transmitting data directly to sink without forwarding by nodes in the original hot-spot, thus energy consumption can almost reach a balance and network lifetime can be prolonged. The proposed ABRCD scheme first assigns a broadcast radius, which doesn’t affect the network lifetime, to nodes having different distance to the code source, then provides an algorithm to construct a broadcast backbone. In the end, a comprehensive performance analysis and simulation result shows that the proposed

  7. An Adaption Broadcast Radius-Based Code Dissemination Scheme for Low Energy Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Shidi Yu

    2018-05-01

    Full Text Available Due to the Software Defined Network (SDN technology, Wireless Sensor Networks (WSNs are getting wider application prospects for sensor nodes that can get new functions after updating program codes. The issue of disseminating program codes to every node in the network with minimum delay and energy consumption have been formulated and investigated in the literature. The minimum-transmission broadcast (MTB problem, which aims to reduce broadcast redundancy, has been well studied in WSNs where the broadcast radius is assumed to be fixed in the whole network. In this paper, an Adaption Broadcast Radius-based Code Dissemination (ABRCD scheme is proposed to reduce delay and improve energy efficiency in duty cycle-based WSNs. In the ABCRD scheme, a larger broadcast radius is set in areas with more energy left, generating more optimized performance than previous schemes. Thus: (1 with a larger broadcast radius, program codes can reach the edge of network from the source in fewer hops, decreasing the number of broadcasts and at the same time, delay. (2 As the ABRCD scheme adopts a larger broadcast radius for some nodes, program codes can be transmitted to more nodes in one broadcast transmission, diminishing the number of broadcasts. (3 The larger radius in the ABRCD scheme causes more energy consumption of some transmitting nodes, but radius enlarging is only conducted in areas with an energy surplus, and energy consumption in the hot-spots can be reduced instead due to some nodes transmitting data directly to sink without forwarding by nodes in the original hot-spot, thus energy consumption can almost reach a balance and network lifetime can be prolonged. The proposed ABRCD scheme first assigns a broadcast radius, which doesn’t affect the network lifetime, to nodes having different distance to the code source, then provides an algorithm to construct a broadcast backbone. In the end, a comprehensive performance analysis and simulation result shows that

  8. Buryat Ethnic Mentality and National Broadcasting

    Directory of Open Access Journals (Sweden)

    Dagbaev E.D.

    2016-01-01

    Full Text Available The article focuses on ways the national (in a regional aspect broadcasting impacts ethnic mind formation and its further development, the latter issues being under a main focus of Buryat State University scholars as well. They set an objective to investigate the issue from different angles, for this reason gathering within scientific projects into scholars’groups took place. In this case the group of educators, philologists and sociologists have focused on media which construct ethnic mind via interiorizing and cultivating ethnic-related ideas and images for five years. Providing a general outlook of the world, National Broadcasting (NB is a proper institutional mechanism that helps a person identify himself / herself among different ethnic groups. Ethnic identity and self-consciousness are manifested in various social and intercultural communications. This allows a person to become aware of the peculiarities of his / her and others’ ethnic communities. The outcomes of a sociological research held by the authors verify the significance of both the posed problems and the TV role. One may find theoretical and empirical data in Zandeeva, S.K. (2012, Dagbaeva, N.Zh.(2012, Dagbaev (2014, Dashinimaeva, P.P., et al (2015. Generally, national programs do contribute to integrating people of the same ethnicity into a common community, to shaping such moral qualities as humanity, love to motherland, respect for the elders and other ethnic nationalities. All these characteristics form proper rules of living in a tolerant community. At the same time, they contribute to strengthening of the feeling of ethnic unity. Beyond any doubt, NB needs a relevant assessment and interest to promote and advance its function in a modern society. On the one hand, telecommunications markets liberalize. On the other hand, broadcasting technologies have developed to a highest extent, leading to the increase of international competition [14]. Anyway, both directions force

  9. A Bioinspired Adaptive Congestion-Avoidance Routing for Mobile Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    Huang Qiong

    2014-01-01

    Full Text Available Traditional mobile Ad Hoc network routing protocols are mainly based on the Shortest Path, which possibly results in many congestion nodes that incur routing instability and rerouting. To mitigate the side-efforts, this paper proposed a new bioinspired adaptive routing protocol (ATAR based on a mathematics biology model ARAS. This paper improved the ARAS by reducing the randomness and by introducing a new routing-decision metric “the next-hop fitness” which was denoted as the congestion level of node and the length of routing path. In the route maintenance, the nodes decide to forward the data to next node according to a threshold value of the fitness. In the recovery phase, the node will adopt random manner to select the neighbor as the next hop by calculation of the improved ARAS. With this route mechanism, the ATAR could adaptively circumvent the congestion nodes and the rerouting action is taken in advance. Theoretical analysis and numerical simulation results show that the ATAR protocol outperforms AODV and MARAS in terms of delivery ratio, ETE delay, and the complexity. In particular, ATAR can efficiently mitigate the congestion.

  10. Advertising on mobile applications

    OpenAIRE

    Sobolevsky, Alexandr

    2015-01-01

    The article analyzes the new method of mobile advertising. Advertising in mobile applications - a subspecies of mobile marketing, where advertising is distributed using mobile phones and smartphones. Ad placement is going on inside of applications and games for smartphones. It has a high potential due to the large number of mobile phone users (over 6.5 billion in 2013).

  11. Improving the Dominating-Set Routing over Delay-Tolerant Mobile Ad-Hoc Networks via Estimating Node Intermeeting Times

    Directory of Open Access Journals (Sweden)

    Preiss Bruno

    2011-01-01

    Full Text Available With limited coverage of wireless networks and frequent roaming of mobile users, providing a seamless communication service poses a technical challenge. In our previous research, we presented a supernode system architecture that employs the delay-tolerant network (DTN concept to provide seamless communications for roaming users over interconnected heterogeneous wireless networks. Mobile ad hoc networks (MANETs are considered a key component of the supernode system for services over an area not covered by other wireless networks. Within the super node system, a dominating-set routing technique is proposed to improve message delivery over MANETs and to achieve better resource utilization. The performance of the dominating-set routing technique depends on estimation accuracy of the probability of a future contact between nodes. This paper studies how node mobility can be modeled and used to better estimate the probability of a contact. We derive a distribution for the node-to-node intermeeting time and present numerical results to demonstrate that the distribution can be used to improve the dominating-set routing technique performance. Moreover, we investigate how the distribution can be employed to relax the constraints of selecting the dominating-set members in order to improve the system resource utilization.

  12. A survey and taxonomy of distributed certificate authorities in mobile ad hoc networks

    Directory of Open Access Journals (Sweden)

    Jabbehdari Sam

    2011-01-01

    Full Text Available Abstract Certificate authorities (CAs are the main components of PKI that enable us for providing basic security services in wired networks and Internet. But, we cannot use centralized CAs, in mobile ad hoc networks (MANETs. So, many efforts have been made to adapt CA to the special characteristics of MANETs and new concepts such as distributed CAs (DCAs have been proposed that distribute the functionality of CA between MANET nodes. In this article, we study various proposed DCA schemes for MANET and then classify these schemes according to their internal structures and techniques. Finally, we propose the characteristics of an ideal DCA system that can be used to verify the completeness of any DCA scheme. This classification and taxonomy identify the weakness and constraints of each scheme, and are very important for designing more secure, scalable, and high performance DCA systems for MANETs and other networks.

  13. Improved AODV route recovery in mobile ad-hoc networks using a genetic algorithm

    Directory of Open Access Journals (Sweden)

    Ahmad Maleki

    2014-09-01

    Full Text Available An important issue in ad-hoc on-demand distance vector (AODV routing protocols is route failure caused by node mobility in the MANETs. The AODV requires a new route discovery procedure whenever a route breaks and these frequent route discoveries increase transmission delays and routing overhead. The present study proposes a new method for AODVs using a genetic algorithm to improve the route recovery mechanism. When failure occurs in a route, the proposed method (GAAODV makes decisions regarding the QOS parameter to select source or local repair. The task of the genetic algorithm is to find an appropriate combination of weights to optimize end-to-end delay. This paper evaluates the metrics of routing overhead, average end-to-end delay, and packet delivery ratio. Comparison of the new algorithm and AODV (RFC 3561 using a NS-2 simulator shows that GAAODV obtains better results for the QOS parameters.

  14. Disentangling location based mobile advertising: the effects of location congruence and type of the medium on consumers' ad-recall and buying behaviour

    NARCIS (Netherlands)

    Bernritter, S.; Ketelaar, P.; van Woudenberg, T.J.; Vantriet, J.; Huhn, A.; Janssen, L.

    2015-01-01

    An emerging body of research focuses on location-based advertising (LBA). This literature suggests that the merits of LBA rely on the fact that consumers can be targeted with location-congruent ads on their personal mobile devices. However, it has not yet been taken into account that LBA consists of

  15. Counter-Based Broadcast Scheme Considering Reachability, Network Density, and Energy Efficiency for Wireless Sensor Networks.

    Science.gov (United States)

    Jung, Ji-Young; Seo, Dong-Yoon; Lee, Jung-Ryun

    2018-01-04

    A wireless sensor network (WSN) is emerging as an innovative method for gathering information that will significantly improve the reliability and efficiency of infrastructure systems. Broadcast is a common method to disseminate information in WSNs. A variety of counter-based broadcast schemes have been proposed to mitigate the broadcast-storm problems, using the count threshold value and a random access delay. However, because of the limited propagation of the broadcast-message, there exists a trade-off in a sense that redundant retransmissions of the broadcast-message become low and energy efficiency of a node is enhanced, but reachability become low. Therefore, it is necessary to study an efficient counter-based broadcast scheme that can dynamically adjust the random access delay and count threshold value to ensure high reachability, low redundant of broadcast-messages, and low energy consumption of nodes. Thus, in this paper, we first measure the additional coverage provided by a node that receives the same broadcast-message from two neighbor nodes, in order to achieve high reachability with low redundant retransmissions of broadcast-messages. Second, we propose a new counter-based broadcast scheme considering the size of the additional coverage area, distance between the node and the broadcasting node, remaining battery of the node, and variations of the node density. Finally, we evaluate performance of the proposed scheme compared with the existing counter-based broadcast schemes. Simulation results show that the proposed scheme outperforms the existing schemes in terms of saved rebroadcasts, reachability, and total energy consumption.

  16. 75 FR 76731 - Request for Comment for Report on In-State Broadcast Programming

    Science.gov (United States)

    2010-12-09

    ... Report on In-State Broadcast Programming AGENCY: Federal Communications Commission. ACTION: Notice... to submit a report on in- state broadcast programming to the appropriate Congressional committees no.... REPORT ON IN-STATE BROADCAST PROGRAMMING. Not later than 18 months after the date of the enactment of...

  17. 47 CFR 73.674 - Digital television transition notices by broadcasters.

    Science.gov (United States)

    2010-10-01

    ... broadcasters. 73.674 Section 73.674 Telecommunication FEDERAL COMMUNICATIONS COMMISSION (CONTINUED) BROADCAST... of the following per day: (i) Graphic display. A graphic super-imposed during programming content... least five (5) seconds. (ii) Animated graphic. A moving or animated graphic that ends up as a countdown...

  18. A Simple and Robust Dissemination Protocol for VANETs

    NARCIS (Netherlands)

    de Souza Schwartz, Ramon; Barbosa, R.R.R.; Meratnia, Nirvana; Heijenk, Geert; Scholten, Johan

    2010-01-01

    Several promising applications for Vehicular Ad-hoc Networks (VANETs) exist. For most of these applications, the communication among vehicles is envisioned to be based on the broadcasting of messages. This is due to the inherent highly mobile environment and importance of these messages to vehicles

  19. Sadhana | Indian Academy of Sciences

    Indian Academy of Sciences (India)

    Position based opportunistic routing (POR) is a stateless, robust, and reliable geographic routing protocol in Mobile AdHoc NETwork (MANET). The opportunistic routing embraces broadcast property of wireless channels and utilizes it for opportunistic forwarding. Both the malicious node behavior and the backupnodes' ...

  20. Picture-Quality Optimization for the High Definition TV Broadcast Chain

    NARCIS (Netherlands)

    Dimou, A.; Van der Vleuten, R.J.; De Haan, G.

    2007-01-01

    The High Definition scene is constantly changing. The arrival of Full HD flat panel displays, the constant improvement of the AVC encoder, and the trend towards 1920x1080 progressive broadcasting have changed the balances of the High Definition broadcasting chain. It is, therefore, required to

  1. Advanced mobile satellite communications using COMETS satellite in MM-wave and Ka-band

    Science.gov (United States)

    Ohmori, Shingo; Isobe, Shunkichi; Takeuchi, Makoto; Naito, Hideyuki

    1993-01-01

    Early in the 21st century, the demand for personal communications using mobile, hand-held, and VSAT terminals will rapidly increase. In a future system, many different types of services should be provided with one-hop connection. The Communications Research Laboratory (CRL) has studied a future advanced mobile satellite communications system using millimeter wave and Ka band. In 1990, CRL started the Communications and Broadcasting Engineering Test Satellite (COMETS) project. The satellite has been developed in conjunction with NASDA and will be launched in 1997. This paper describes the COMETS payload configuration and the experimental system for the advanced mobile communications mission.

  2. Broadcasting environmental knowledge: Open University & BBC collaborations serving massive global audiences

    Science.gov (United States)

    Brandon, M. A.; Smith, J.; Garrow, K. H.; Law, A.

    2013-12-01

    The UK Open University has a long history of working with broadcast media - indeed before it first formed over 40 years ago it was proposed to be a "University of the Air ". Originally the University made its own television programmes that were directly connected with teaching. They were usually recordings of academics giving lectures that were broadcast late at night. Over recent times we have moved into developing co-productions with mainstream broadcast media specifically designed to be of general educational interest to UK and worldwide audiences. These include both high impact one-off programmes such as Are we changing planet Earth?, multiple international award winning series such as Frozen Planet, and World Service radio such as Earth Reporters. These programmes have had global audiences; in some cases of tens of millions. Whilst we have only worked using clear scientific evidence and expertise, we have co-produced media which small sections of the general public could consider controversial. For example, in Are we changing planet Earth? the case was presented pre IPCC AR4 for anthropogenic climate change. The final episode of Frozen Planet "On thin ice" presented evidence of how the polar climate is changing and likely future global impacts. It created a large and occasionally hostile international media impact long before broadcast. This continued after broadcast in some media but we believe it stopped because the science presented was robust within the current literature. Based around broadcasting, we used a communication strategy based on our personal experience over the last decade along with our institutional experience going back 40 years. For example our outreach include social media, newspapers, radio and podcasts to speak about underpinning science. We use Twitter during actual broadcasts to circulate links to journal articles and provide context around the science presented on screen. Backed up by a large public outreach campaign at science fairs

  3. An interference cancellation strategy for broadcast in hierarchical cell structure

    KAUST Repository

    Yang, Yuli; Aï ssa, Sonia; Eltawil, Ahmed M.; Salama, Khaled N.

    2014-01-01

    In this paper, a hierarchical cell structure is considered, where public safety broadcasting is fulfilled in a femtocell located within a macrocell. In the femtocell, also known as local cell, an access point broadcasts to each local node (LN) over an orthogonal frequency sub-band independently. Since the local cell shares the spectrum licensed to the macrocell, a given LN is interfered by transmissions of the macrocell user (MU) in the same sub-band. To improve the broadcast performance in the local cell, a novel scheme is proposed to mitigate the interference from the MU to the LN while achieving diversity gain. For the sake of performance evaluation, ergodic capacity of the proposed scheme is quantified and a corresponding closed-form expression is obtained. By comparing with the traditional scheme that suffers from the MU's interference, numerical results substantiate the advantage of the proposed scheme and provide a useful tool for the broadcast design in hierarchical cell systems.

  4. Using the interactive distance learning broadcast format for international audiences

    International Nuclear Information System (INIS)

    Callan, C.; Hylko, J.M.

    1997-01-01

    Since 1989, the National Environmental Technology Network (NETN) has been broadcasting interactive presentations on topics of national and international concern. Each interactive presentation covers such topics as decommissioning, environmental risk management, radioactive waste management, waste minimization, and total quality management. Course materials are provided to the attendees which feature case studies, legal and regulatory issues, and the application of existing and new technologies. The interactive presentations are broadcast by satellite and videotaped, allowing employees to participate who do not have convenient access to traditional classroom training resources. Over 8,000 professionals and students in the United States and several foreign countries have participated in the distance learning broadcast format, thus providing a proven and cost-effective method for managing educational and facility resources effectively. A case study is presented depicting why training, if neglected, can result in costly errors, and how the distance learning broadcast format can be expanded to assist regulatory officials, and even the local populace, in making cost-effective decisions. (author)

  5. An interference cancellation strategy for broadcast in hierarchical cell structure

    KAUST Repository

    Yang, Yuli

    2014-12-01

    In this paper, a hierarchical cell structure is considered, where public safety broadcasting is fulfilled in a femtocell located within a macrocell. In the femtocell, also known as local cell, an access point broadcasts to each local node (LN) over an orthogonal frequency sub-band independently. Since the local cell shares the spectrum licensed to the macrocell, a given LN is interfered by transmissions of the macrocell user (MU) in the same sub-band. To improve the broadcast performance in the local cell, a novel scheme is proposed to mitigate the interference from the MU to the LN while achieving diversity gain. For the sake of performance evaluation, ergodic capacity of the proposed scheme is quantified and a corresponding closed-form expression is obtained. By comparing with the traditional scheme that suffers from the MU\\'s interference, numerical results substantiate the advantage of the proposed scheme and provide a useful tool for the broadcast design in hierarchical cell systems.

  6. Watershed Education for Broadcast Meteorologists

    Science.gov (United States)

    Lamos, J. P.; Sliter, D.; Espinoza, S.; Spangler, T. C.

    2006-12-01

    The National Environmental Education and Training Organization (NEETF) published a report in 2005 that summarized the findings of ten years of NEETF and Roper Research. The report stated, "Our years of data from Roper surveys show a persistent pattern of environmental ignorance even among the most educated and influential members of society." Market research has also shown that 80% of television viewers list the weather as the primary reason for watching the local news. Broadcast meteorologists, with a broader understanding of environmental and related sciences have an opportunity to use their weathercasts to inform the public about the environment and the factors that influence environmental health. As "station scientists," broadcast meteorologists can use the weather, and people's connection to it, to broaden their understanding of the environment they live in. Weather and watershed conditions associated with flooding and drought have major human and environmental impacts. Increasing the awareness of the general public about basic aspects of the hydrologic landscape can be an important part of mitigating the adverse effects of too much or too little precipitation, and of protecting the environment as well. The concept of a watershed as a person's natural neighborhood is a very important one for understanding hydrologic and environmental issues. Everyone lives in a watershed, and the health of a watershed is the result of the interplay between weather and human activity. This paper describes an online course to give broadcast meteorologists a basic understanding of watersheds and how watersheds are impacted by weather. It discusses how to convey watershed science to a media- savvy audience as well as how to model the communication of watershed and hydrologic concepts to the public. The course uses a narrative, story-like style to present its content. It is organized into six short units of instruction, each approximately 20 minutes in duration. Each unit is

  7. An Efficient Live TV Scheduling System for 4G LTE Broadcast

    KAUST Repository

    Lau, Chun Pong; Alabbasi, AbdulRahman; Shihada, Basem

    2016-01-01

    Traditional live television (TV) broadcasting systems are proven to be spectrum inefficient. Therefore, researchers propose to provide TV services on fourth-generation (4G) long-term evolution (LTE) networks. However, static broadcast, a typical

  8. The role of the public service broadcasting in the european countries

    Directory of Open Access Journals (Sweden)

    Budacia Elisabeta Andreea

    2008-04-01

    Full Text Available Broadcasting in particular has seen remarkable change from the days of single-channel public broadcasting systems. The audiovisual “explosion” is a cultural, social and economic phenomenon of global dimension. The audiovisual sector forms an essential part of Europe’s economic and cultural influence in the world. The fundamental principle of the Union’s audiovisual policy is to provide for the free circulation of reception of trans frontier broadcasts. So the European audiovisual industry is likely to become a stronger and more competitive player on the global scene. The future of public service broadcasting in Europe is increasingly challenged by unfavorable external factors, such as intensifying competition from commercial media, media concentrations, political and economic interests adversary to independent media, and by internal difficulties, such as cost ineffectiveness.

  9. Servicing a globally broadcast interrupt signal in a multi-threaded computer

    Science.gov (United States)

    Attinella, John E.; Davis, Kristan D.; Musselman, Roy G.; Satterfield, David L.

    2015-12-29

    Methods, apparatuses, and computer program products for servicing a globally broadcast interrupt signal in a multi-threaded computer comprising a plurality of processor threads. Embodiments include an interrupt controller indicating in a plurality of local interrupt status locations that a globally broadcast interrupt signal has been received by the interrupt controller. Embodiments also include a thread determining that a local interrupt status location corresponding to the thread indicates that the globally broadcast interrupt signal has been received by the interrupt controller. Embodiments also include the thread processing one or more entries in a global interrupt status bit queue based on whether global interrupt status bits associated with the globally broadcast interrupt signal are locked. Each entry in the global interrupt status bit queue corresponds to a queued global interrupt.

  10. Broadcast Reserved Opportunity Assisted Diversity Relaying Scheme and Its Performance Evaluation

    Directory of Open Access Journals (Sweden)

    Xia Chen

    2008-05-01

    Full Text Available Relay-based transmission can over the benefits in terms of coverage extension as well as throughput improvement if compared to conventional direct transmission. In a relay enhanced cellular (REC network, where multiple mobile terminals act as relaying nodes (RNs, multiuser diversity gain can be exploited. We propose an efficient relaying scheme, referred to as Broadcast Reserved Opportunity Assisted Diversity (BROAD for the REC networks. Unlike the conventional Induced Multiuser Diversity Relaying (IMDR scheme, our scheme acquires channel quality information (CQI in which the destined node (DN sends pilots on a reserved radio resource. The BROAD scheme can significantly decrease the signaling overhead among the mobile RNs while achieving the same multiuser diversity as the conventional IMDR scheme. In addition, an alternative version of the BROAD scheme, named as A-BROAD scheme, is proposed also, in which the candidate RN(s feed back partial or full CQI to the base station (BS for further scheduling purpose. The A-BROAD scheme achieves a higher throughput than the BROAD scheme at the cost of extra signalling overhead. The theoretical analysis given in this paper demonstrates the feasibility of the schemes in terms of their multiuser diversity gains in a REC network.

  11. Transmission techniques for emergent multicast and broadcast systems

    CERN Document Server

    da Silva, Mario Marques; Dinis, Rui; Souto, Nuno; Silva, Joao Carlos

    2010-01-01

    Describing efficient transmission schemes for broadband wireless systems, Transmission Techniques for Emergent Multicast and Broadcast Systems examines advances in transmission techniques and receiver designs capable of supporting the emergent wireless needs for multimedia broadcast and multicast service (MBMS) requirements. It summarizes the research and development taking place in wireless communications for multimedia MBMS and addresses the means to improved spectral efficiency to allow for increased user bit rate, as well as increased capacity of the digital cellular radio network.The text

  12. ADDED VALUE-BASED APROACH TO ANALYZE ELECTRONIC COMMERCE AND MOBILE COMMERCE BUSINESS MODELS

    Directory of Open Access Journals (Sweden)

    Moritz Weizmann

    2004-03-01

    Full Text Available

    Se propone aplicar la teoría del valor informacional agregado (Theory of Informational Added Values, IAV al Electronic Commerce (EC y al Mobile Commerce (MC. El trabajo presentado es una propuesta para acercarse a modelos de negocio, con el foco de criterios típicos de evaluación para modelos de negocio de Internet y del MC. Es también conveniente para comparar modelos de negocio distintos y para poner el valor añadido para los participantes en un contexto. De esta manera, se establecen criterios objetivos que reducen la subjetividad y permiten hacer ciertas predicciones. El artículo termina con un análisis crítico del estado del arte y un comentario sobre las perspectivas futuras.

  13. 78 FR 18527 - Implementation of Competitive Bidding for Commercial Broadcast and Instructional Television Fixed...

    Science.gov (United States)

    2013-03-27

    ... Broadcast and Instructional Television Fixed Service Licenses AGENCY: Federal Communications Commission... Implementation of Competitive Bidding for Commercial Broadcast and Instructional Television Fixed Service... for Commercial Broadcast and Instructional Television Fixed Service Licenses, MM Docket No. 97- 234 et...

  14. High data-rate video broadcasting over 3G wireless systems

    NARCIS (Netherlands)

    Atici, C.; Sunay, M.O.

    2007-01-01

    In cellular environments, video broadcasting is a challenging problem in which the number of users receiving the service and the average successfully decoded video data-rate have to be intelligently optimized. When video is broadcasted using the 3G packet data standard, 1xEV-DO, the code space may

  15. Accessing data transfer reliability for duty cycled mobile wireless sensor network

    International Nuclear Information System (INIS)

    Shaikh, F.K.

    2014-01-01

    Mobility in WSNs (Wireless Sensor Networks) introduces significant challenges which do not arise in static WSNs. Reliable data transport is an important aspect of attaining consistency and QoS (Quality of Service) in several applications of MWSNs (Mobile Wireless Sensor Networks). It is important to understand how each of the wireless sensor networking characteristics such as duty cycling, collisions, contention and mobility affects the reliability of data transfer. If reliability is not managed well, the MWSN can suffer from overheads which reduce its applicability in the real world. In this paper, reliability assessment is being studied by deploying MWSN in different indoor and outdoor scenarios with various duty cycles of the motes and speeds of the mobile mote. Results show that the reliability is greatly affected by the duty cycled motes and the mobility using inherent broadcast mechanisms. (author)

  16. FHWA White Paper on Mobile Ad Hoc Networks

    Science.gov (United States)

    2018-01-01

    Advanced next generation communications technologies offer the potential to greatly improve safety, system efficiency, and mobility across our Nations roadways. These new technologies and processes can address both traditionally difficult as well ...

  17. The large satellite program of ESA and its relevance for broadcast missions

    Science.gov (United States)

    Fromm, H.-H.; Herdan, B. L.

    1981-03-01

    In an investigation of the market prospects and payload requirements of future communications satellites, it was concluded that during the next 15 years many space missions will demand larger satellite platforms than those currently available. These platforms will be needed in connection with direct-broadcasting satellites, satellites required to enhance capacities in the case of traditional services, and satellites employed to introduce new types of satellite-based communications operating with small terminals. Most of the larger satellites would require the Ariane III capability, corresponding to about 1400 kg satellite mass in geostationary orbit. Attention is given to L-SAT platform capabilities and broadcast payload requirements, taking into account a European direct-broadcast satellite and Canadian direct-broadcast missions.

  18. Composite Broadcasting and Ranging via a Satellite Dual-Frequency MPPSK System

    Directory of Open Access Journals (Sweden)

    Yu Yao

    2013-01-01

    Full Text Available Since digital video broadcasting via satellite (DVB-S signals are “inefficient”, regarding the amount of information they convey on the bandwidth they occupy, a joint broadcasting and ranging system would constitute a unique platform for future digital video broadcasting satellite services effecting the essential tasks of satellite navigation system and direct to home (DTH services, in terms of both spectrum efficiency and cost effectiveness. In this paper, the design of dual frequency M-ary position phase shift keying (MPPSK system which is suitable for, respectively, performing both data transmission and range measurement is proposed. The approach is based on MPPSK modulation waveforms utilized in digital video broadcasting. In particular, requirements that allow for employing such signals for range measurements with high accuracy and high range are investigated. Also, the relationship between the frequency difference of dual frequency MPPSK system and range accuracy is discussed. Moreover, the selection of MPPSK modulation parameter for data rate and ranging is considered. In addition to theoretical considerations, the paper presents system simulations and measurement results of new systems, demonstrating the high spectral utilization of integrated broadcasting and ranging applications.

  19. All-optical broadcast and multicast technologies based on PPLN waveguide

    DEFF Research Database (Denmark)

    Ye, Lingyun; Wang, Ju; Hu, Hao

    2013-01-01

    All-optical 1×4 broadcast and 1×3 multicast experiments of a 40-Gb/s return-to-zero on-off keying (RZ-OOK) signal based on a periodically poled lithium niobate (PPLN) waveguide are demonstrated in this letter. Clear opened eye diagrams and error-free performance are achieved for the broadcast...

  20. 75 FR 8070 - Closed Auction of Broadcast Construction Permits Scheduled for July 20, 2010; Auction 88...

    Science.gov (United States)

    2010-02-23

    ... to support their claims with valuation analyses and suggested amounts or formulas for reserve prices... seek comment on factors that could reasonably have an impact on valuation of the broadcast spectrum..., Inc. Arkansas Valley Broadcasting, LLC BBK Broadcasting Big Sky Company Birach Broadcasting...

  1. Simplified Multicast Forwarding in Mobile Ad Hoc Networks

    National Research Council Canada - National Science Library

    Macker, Joseph P; Dean, Justin; Chao, William

    2004-01-01

    ...) based upon flooding mechanisms. We present the design of a working experimental prototype and some initial performance results using the NRL mobile network emulation system and various optional flooding approaches within the design framework...

  2. Broadcast sound technology

    CERN Document Server

    Talbot-Smith, Michael

    1990-01-01

    Broadcast Sound Technology provides an explanation of the underlying principles of modern audio technology. Organized into 21 chapters, the book first describes the basic sound; behavior of sound waves; aspects of hearing, harming, and charming the ear; room acoustics; reverberation; microphones; phantom power; loudspeakers; basic stereo; and monitoring of audio signal. Subsequent chapters explore the processing of audio signal, sockets, sound desks, and digital audio. Analogue and digital tape recording and reproduction, as well as noise reduction, are also explained.

  3. Comparison of effectiveness of advertising expenses during broadcasts of main hockey events

    OpenAIRE

    Kozlová, Natálie

    2017-01-01

    Title: Comparison of effectiveness of advertising expenses during broadcasts of main hockey events Objectives: The main goal of this dissertation is to compare the amount of money invested into the commercial advertisement during sport broadcasts at the ČT sport channel with viewer ratings. The used metric is a coefficient computed as a ratio between the viewer rating of the particular broadcast and the corresponding advertisement cost, normalized using Cost per Thousand method. Another goal ...

  4. Live broadcast from the Globe

    CERN Multimedia

    La tête au carréTuesday, 17 June 2008 between 2.00 and 3.00 p.m.“La tête au carré”, a France Inter radio programme devoted to science, will set up its sound booth at CERN for a special broadcast on the LHC.The journalist Mathieu Vidard will interview the following guests: - Pierre Van Hove, an experimental physicist working on CMS. He is a CNRS research scientist from the Institut Hubert Curien in Strasbourg, France.- Abdelhak Djouadi is a theoretical physicist. He is a research director at the CNRS’s Laboratoire de physique théorique at Orsay, France and holder of the CNRS silver medal.- Magali Gruwe, one of the engineers in charge of LHC operations at CERN.» To take part in this live broadcast, which is open to the public, come to the Globe at 1:30 p.m. The number of places is limited.» No specialist knowledge required.» See the programme's homepage

  5. Transmission Quality Measurements in DAB+ Broadcast System

    Directory of Open Access Journals (Sweden)

    Gilski Przemysław

    2017-12-01

    Full Text Available In the age of digital media, delivering broadcast content to customers at an acceptable level of quality is one of the most challenging tasks. The most important factor is the efficient use of available resources, including bandwidth. An appropriate way of managing the digital multiplex is essential for both the economic and technical issues. In this paper we describe transmission quality measurements in the DAB+ broadcast system. We provide a methodology for analysing parameters and factors related with the efficiency and reliability of a digital radio link. We describe a laboratory stand that can be used for transmission quality assessment on a regional and national level.

  6. The Use of Computer Simulation Gaming in Teaching Broadcast Economics.

    Science.gov (United States)

    Mancuso, Louis C.

    The purpose of this study was to develop a broadcast economic computer simulation and to ascertain how a lecture-computer simulation game compared as a teaching method with a more traditional lecture and case study instructional methods. In each of three sections of a broadcast economics course, a different teaching methodology was employed: (1)…

  7. Citizens’ adaptive or avoiding behavioral response to an emergency message on their mobile phone

    NARCIS (Netherlands)

    Gutteling, J.M.; Terpstra, T.; Kerstholt, J.H.

    2017-01-01

    Since November 2012, Dutch civil defense organizations employ NL-Alert, a cellular broadcast-based warning system to inform the public. Individuals receive a message on their mobile phone about the actual threat, as well as some advice how to deal with the situation at hand. This study reports on

  8. Admission and Preventive Load Control for Delivery of Multicast and Broadcast Services via S-UMTS

    Science.gov (United States)

    Angelou, E.; Koutsokeras, N.; Andrikopoulos, I.; Mertzanis, I.; Karaliopoulos, M.; Henrio, P.

    2003-07-01

    An Admission Control strategy is proposed for unidirectional satellite systems delivering multicast and broadcast services to mobile users. In such systems, both the radio interface and the targeted services impose particular requirements on the RRM task. We briefly discuss the RRM requirements that stem from the services point of view and from the features of the SATIN access scheme that differentiate it from the conventional T-UMTS radio interface. The main functional entities of RRM and the alternative modes of operation are outlined and the proposed Admission Control algorithm is described in detail. The results from the simulation study that demonstrate its performance for a number of different scenarios are finally presented and conclusions derived.

  9. Time coded distribution via broadcasting stations

    Science.gov (United States)

    Leschiutta, S.; Pettiti, V.; Detoma, E.

    1979-01-01

    The distribution of standard time signals via AM and FM broadcasting stations presents the distinct advantages to offer a wide area coverage and to allow the use of inexpensive receivers, but the signals are radiated a limited number of times per day, are not usually available during the night, and no full and automatic synchronization of a remote clock is possible. As an attempt to overcome some of these problems, a time coded signal with a complete date information is diffused by the IEN via the national broadcasting networks in Italy. These signals are radiated by some 120 AM and about 3000 FM and TV transmitters around the country. In such a way, a time ordered system with an accuracy of a couple of milliseconds is easily achieved.

  10. How Ad-talk and Word-of-Mouth Influence Consumers’ Responses

    DEFF Research Database (Denmark)

    Martensen, Anne; Mouritsen, Jan

    2014-01-01

    This study investigates: (a) if consumers talk about advertizing messages – ad-talk – is a new, distinct concept that differs from word-of-mouth (WOM) communication in definition and impact; (b) how ad-talk mobilizes WOM; (c) how WOM mediates the relationship between ad-talk and consumer responses....... A new model is developed that adapts the classic Theory of Reasoned Action (TRA) framework by replacing the social norm with consumers’ ad-talk and WOM. Two large scale internet surveys are conducted to test and validate the model. Findings show that ad-talk and WOM are two different social processes....... Ad-talk only mobilizes PWOM. PWOM mediates and leverages ad-talk’s influence on consumer responses, because PWOM adds personal experiences, preferences and social acceptance to the brand promise seen in the firm’s advertizing. This changes the value of the brand and makes the firm’s offer better than...

  11. Direct broadcast of a sporting event as televisual cultural form

    Directory of Open Access Journals (Sweden)

    Jože Vogrinc

    2012-07-01

    Full Text Available Direct TV broadcasting of sport events is undoubtedly the focal point of interest of sport fans in sports media as well as of sponsors and investors responsible for the global mediatisation of popular sports. In this article, the centrality of direct TV broadcasts in the televisual coverage of sports, as well as in the presence of sports in new media in general is explained in the context of the impact of the mediatisation of sports upon cultural forms of TV coverage of sports. The complexity of these forms and its main features (the role of the commentator, the rules of editing, dramatisation and narrativisation in direct broadcasts are analysed.

  12. 76 FR 4078 - Television Broadcasting Services; North Pole and Plattsburgh, NY

    Science.gov (United States)

    2011-01-24

    ... FEDERAL COMMUNICATIONS COMMISSION 47 CFR Part 73 [DA 10-2443; MM Docket No. 99-238; RM-9669] Television Broadcasting Services; North Pole and Plattsburgh, NY AGENCY: Federal Communications Commission... CFR Part 73 Television, Television broadcasting. For the reasons discussed in the preamble, the...

  13. The Accuracy and Correction of Fuel Consumption from Controller Area Network Broadcast

    Energy Technology Data Exchange (ETDEWEB)

    Wang, Lijuan [National Renewable Energy Laboratory (NREL), Golden, CO (United States); Gonder, Jeffrey D [National Renewable Energy Laboratory (NREL), Golden, CO (United States); Wood, Eric W [National Renewable Energy Laboratory (NREL), Golden, CO (United States); Ragatz, Adam C [National Renewable Energy Laboratory (NREL), Golden, CO (United States)

    2017-10-13

    Fuel consumption (FC) has always been an important factor in vehicle cost. With the advent of electronically controlled engines, the controller area network (CAN) broadcasts information about engine and vehicle performance, including fuel use. However, the accuracy of the FC estimates is uncertain. In this study, the researchers first compared CAN-broadcasted FC against physically measured fuel use for three different types of trucks, which revealed the inaccuracies of CAN-broadcast fueling estimates. To match precise gravimetric fuel-scale measurements, polynomial models were developed to correct the CAN-broadcasted FC. Lastly, the robustness testing of the correction models was performed. The training cycles in this section included a variety of drive characteristics, such as high speed, acceleration, idling, and deceleration. The mean relative differences were reduced noticeably.

  14. Improving Teacher-Student Contact in a Campus through a Location-Based Mobile Application

    Science.gov (United States)

    Ferreira, Vítor Manuel; Ramos, Fernando

    2014-01-01

    This paper presents a new mobile micro-broadcast (or near-me) Location-Based Service designed to promote face-to-face communication among users located within a given geographical area such as a University campus. Because the communication services provided are time dependent, the application decides whom to contact based on the geographic…

  15. The broadcast of shared attention and its impact on political persuasion.

    Science.gov (United States)

    Shteynberg, Garriy; Bramlett, James M; Fles, Elizabeth H; Cameron, Jaclyn

    2016-11-01

    In democracies where multitudes yield political influence, so does broadcast media that reaches those multitudes. However, broadcast media may not be powerful simply because it reaches a certain audience, but because each of the recipients is aware of that fact. That is, watching broadcast media can evoke a state of shared attention, or the perception of simultaneous coattention with others. Whereas past research has investigated the effects of shared attention with a few socially close others (i.e., friends, acquaintances, minimal ingroup members), we examine the impact of shared attention with a multitude of unfamiliar others in the context of televised broadcasting. In this paper, we explore whether shared attention increases the psychological impact of televised political speeches, and whether fewer numbers of coattending others diminishes this effect. Five studies investigate whether the perception of simultaneous coattention, or shared attention, on a mass broadcasted political speech leads to more extreme judgments. The results indicate that the perception of synchronous coattention (as compared with coattending asynchronously and attending alone) renders persuasive speeches more persuasive, and unpersuasive speeches more unpersuasive. We also find that recall memory for the content of the speech mediates the effect of shared attention on political persuasion. The results are consistent with the notion that shared attention on mass broadcasted information results in deeper processing of the content, rendering judgments more extreme. In all, our findings imply that shared attention is a cognitive capacity that supports large-scale social coordination, where multitudes of people can cognitively prioritize simultaneously coattended information. (PsycINFO Database Record (c) 2016 APA, all rights reserved).

  16. Power saving control for the mobile DVB-H receivers based on H.264/SVC standard

    DEFF Research Database (Denmark)

    Belyaev, Evgeny; Grinko, Vitaly; Ukhanova, Ann

    2009-01-01

    This paper discusses the utilization of scalable extension of H.264/AVC standard in digital video broadcasting for handheld devices. In this area the problem of mobile receiver power consumption is critically important. This paper amplifies the well-known idea of the time-slicing and allows...

  17. Delivering Live Multimedia Streams to Mobile Hosts in a Wireless Internet with Multiple Content Aggregators

    NARCIS (Netherlands)

    Bianchi, G.; Hesselman, C.E.W.; Eertink, E.H.; Eertink, Henk; Kermani, P.; Lee, S.J.; Widya, I.A.; Huizer, E.

    We consider the distribution of channels of live multimedia content (e.g., radio or TV broadcasts) via multiple content aggregators. In our work, an aggregator receives channels from content sources and redistributes them to a potentially large number of mobile hosts. Each aggregator can offer a

  18. An Efficient Periodic Broadcasting with Small Latency and Buffer Demand for Near Video on Demand

    Directory of Open Access Journals (Sweden)

    Ying-Nan Chen

    2012-01-01

    Full Text Available Broadcasting Protocols can efficiently transmit videos that simultaneously shared by clients with partitioning the videos into segments. Many studies focus on decreasing clients' waiting time, such as the fixed-delay pagoda broadcasting (FDPB and the harmonic broadcasting schemes. However, limited-capability client devices such as PDAs and set-top boxes (STBs suffer from storing a significant fraction of each video while it is being watched. How to reduce clients' buffer demands is thus an important issue. Related works include the staircase broadcasting (SB, the reverse fast broadcasting (RFB, and the hybrid broadcasting (HyB schemes. This work improves FDPB to save client buffering space as well as waiting time. In comparison with SB, RFB, and HyB, the improved FDPB scheme can yield the smallest waiting time under the same buffer requirements.

  19. 47 CFR 73.6016 - Digital Class A TV station protection of TV broadcast stations.

    Science.gov (United States)

    2010-10-01

    ... 47 Telecommunication 4 2010-10-01 2010-10-01 false Digital Class A TV station protection of TV... Class A TV station protection of TV broadcast stations. Digital Class A TV stations must protect authorized TV broadcast stations, applications for minor changes in authorized TV broadcast stations filed on...

  20. Low-cost mobile phone microscopy with a reversed mobile phone camera lens.

    Directory of Open Access Journals (Sweden)

    Neil A Switz

    Full Text Available The increasing capabilities and ubiquity of mobile phones and their associated digital cameras offer the possibility of extending low-cost, portable diagnostic microscopy to underserved and low-resource areas. However, mobile phone microscopes created by adding magnifying optics to the phone's camera module have been unable to make use of the full image sensor due to the specialized design of the embedded camera lens, exacerbating the tradeoff between resolution and field of view inherent to optical systems. This tradeoff is acutely felt for diagnostic applications, where the speed and cost of image-based diagnosis is related to the area of the sample that can be viewed at sufficient resolution. Here we present a simple and low-cost approach to mobile phone microscopy that uses a reversed mobile phone camera lens added to an intact mobile phone to enable high quality imaging over a significantly larger field of view than standard microscopy. We demonstrate use of the reversed lens mobile phone microscope to identify red and white blood cells in blood smears and soil-transmitted helminth eggs in stool samples.

  1. Low-cost mobile phone microscopy with a reversed mobile phone camera lens.

    Science.gov (United States)

    Switz, Neil A; D'Ambrosio, Michael V; Fletcher, Daniel A

    2014-01-01

    The increasing capabilities and ubiquity of mobile phones and their associated digital cameras offer the possibility of extending low-cost, portable diagnostic microscopy to underserved and low-resource areas. However, mobile phone microscopes created by adding magnifying optics to the phone's camera module have been unable to make use of the full image sensor due to the specialized design of the embedded camera lens, exacerbating the tradeoff between resolution and field of view inherent to optical systems. This tradeoff is acutely felt for diagnostic applications, where the speed and cost of image-based diagnosis is related to the area of the sample that can be viewed at sufficient resolution. Here we present a simple and low-cost approach to mobile phone microscopy that uses a reversed mobile phone camera lens added to an intact mobile phone to enable high quality imaging over a significantly larger field of view than standard microscopy. We demonstrate use of the reversed lens mobile phone microscope to identify red and white blood cells in blood smears and soil-transmitted helminth eggs in stool samples.

  2. Broadcast and Aggregation in BBC

    DEFF Research Database (Denmark)

    Hüttel, Hans; Kiilerich Pratas, Nuno

    2015-01-01

    In this paper we introduce a process calculus BBC that has both forms of communication. For both many-to-one and one-to-many communication, it is often a natural assumption that communication is bounded; this reflects two distinct aspects of the limitations of a medium. In the case of broadcast, ...

  3. Secure Broadcasting with Uncertain Channel State Information

    KAUST Repository

    Hyadi, Amal

    2016-01-06

    We investigate the problem of secure broadcasting over fast fading channels with imperfect main channel state information (CSI) at the transmitter. In particular, we analyze the effect of the noisy estimation of the main CSI on the throughput of a broadcast channel where the transmission is intended for multiple legitimate receivers in the presence of an eavesdropper. Besides, we consider the realistic case where the transmitter is only aware of the statistics of the eavesdropper s CSI and not of its channel s realizations. First, we discuss the common message transmission case where the source broadcasts the same information to all the receivers, and we provide an upper and a lower bounds on the ergodic secrecy capacity. For this case, we show that the secrecy rate is limited by the legitimate receiver having, on average, the worst main channel link and we prove that a non-zero secrecy rate can still be achieved even when the CSI at the transmitter is noisy. Then, we look at the independent messages case where the transmitter broadcasts multiple messages to the receivers, and each intended user is interested in an independent message. For this case, we present an expression for the achievable secrecy sum-rate and an upper bound on the secrecy sum-capacity and we show that, in the limit of large number of legitimate receivers K, our achievable secrecy sum-rate follows the scaling law log((1-a ) log(K)), where is the estimation error variance of the main CSI. The special cases of high SNR, perfect and no-main CSI are also analyzed. Analytical derivations and numerical results are presented to illustrate the obtained expressions for the case of independent and identically distributed Rayleigh fading channels.

  4. Secure Broadcasting with Uncertain Channel State Information

    KAUST Repository

    Hyadi, Amal

    2017-03-13

    We investigate the problem of secure broadcasting over fast fading channels with imperfect main channel state information (CSI) at the transmitter. In particular, we analyze the effect of the noisy estimation of the main CSI on the throughput of a broadcast channel where the transmission is intended for multiple legitimate receivers in the presence of an eavesdropper. Besides, we consider the realistic case where the transmitter is only aware of the statistics of the eavesdropper\\'s CSI and not of its channel\\'s realizations. First, we discuss the common message transmission case where the source broadcasts the same information to all the receivers, and we provide an upper and a lower bounds on the ergodic secrecy capacity. For this case, we show that the secrecy rate is limited by the legitimate receiver having, on average, the worst main channel link and we prove that a non-zero secrecy rate can still be achieved even when the CSI at the transmitter is noisy. Then, we look at the independent messages case where the transmitter broadcasts multiple messages to the receivers, and each intended user is interested in an independent message. For this case, we present an expression for the achievable secrecy sum-rate and an upper bound on the secrecy sum-capacity and we show that, in the limit of large number of legitimate receivers K, our achievable secrecy sum-rate follows the scaling law log((1-a ) log(K)), where is the estimation error variance of the main CSI. The special cases of high SNR, perfect and no-main CSI are also analyzed. Analytical derivations and numerical results are presented to illustrate the obtained expressions for the case of independent and identically distributed Rayleigh fading channels.

  5. A new challenge for advertising on mobile devices: Social TV

    Directory of Open Access Journals (Sweden)

    Natalia Quintas-Froufe

    2015-01-01

    Full Text Available Mobile device advertising is a rapidly growing market due to the penetration of mobile devices in Spanish society. Advertising communication in this digital ecosystem continually poses new challenges. One of these - the subject of this proposal - is the link-up between mobile advertising with social TV. It opens up new possibilities for the development of advertising strategies on mobile devices.The aim of this paper is to describe the challenges faced by the Spanish advertising industry with the recent introduction of Social TV. Spain has one of the most developed Social TV sectors in Europe. It will provide a global overview of this new reality and uncover the new possibilities and main challenges for the development of advertising strategies for mobile devices. To this end we propose an examination of the perception of two of Spain’s major broadcasting empires, Atresmedia and Mediaset España, of this phenomenon.

  6. Power-Controlled MAC Protocols with Dynamic Neighbor Prediction for Ad hoc Networks

    Institute of Scientific and Technical Information of China (English)

    LI Meng; ZHANG Lin; XIAO Yong-kang; SHAN Xiu-ming

    2004-01-01

    Energy and bandwidth are the scarce resources in ad hoc networks because most of the mobile nodes are battery-supplied and share the exclusive wireless medium. Integrating the power control into MAC protocol is a promising technique to fully exploit these precious resources of ad hoc wireless networks. In this paper, a new intelligent power-controlled Medium Access Control (MAC) (iMAC) protocol with dynamic neighbor prediction is proposed. Through the elaborate design of the distributed transmit-receive strategy of mobile nodes, iMAC greatly outperforms the prevailing IEEE 802.11 MAC protocols in not only energy conservation but also network throughput. Using the Dynamic Neighbor Prediction (DNP), iMAC performs well in mobile scenes. To the best of our knowledge, iMAC is the first protocol that considers the performance deterioration of power-controlled MAC protocols in mobile scenes and then proposes a solution. Simulation results indicate that DNP is important and necessary for power-controlled MAC protocols in mobile ad hoc networks.

  7. Contribution to design a communication framework for vehicular ad hoc networks in urban scenarios

    OpenAIRE

    Tripp Barba, Carolina

    2013-01-01

    The constant mobility of people, the growing need to be always connected, the large number of vehicles that nowadays can be found in the roads and the advances in technology make Vehicular Ad hoc Networks (VANETs) be a major area of research. Vehicular Ad hoc Networks are a special type of wireless Mobile Ad hoc Networks (MANETs), which allow a group of mobile nodes configure a temporary network and maintain it without the need of a fixed infrastructure. A vehicular network presents some spec...

  8. Productivity and its Decomposition in the Japanese Broadcasting Market

    OpenAIRE

    Asai, Sumiko

    2005-01-01

    The purpose of this paper is to calculate the total factor productivity (TFP) as well as scale economies of Japanese terrestrial broadcasters and examine the industry’s characteristics through the decomposition of TFP growth. In order to calculate TFP growth rate, a variable cost function is estimated using data on twenty-five broadcasters for the period 1997–2002, and the TFP growth rate is decomposed into three sources: output effect, capital adjustment and technical change. Calculation rev...

  9. Health Education by Open Broadcast.

    Science.gov (United States)

    ICIT Report, 1976

    1976-01-01

    This issue focuses on uses and techniques of radio for educational purposes in developing nations. Two health education projects are described which are utilizing open broadcasting to attract a mass audience of listeners not committed to a structured radio education program. Kenya's Swahili language radio serial, "Giving Birth and Caring for your…

  10. Food advertising during children's television programming on broadcast and cable channels.

    Science.gov (United States)

    Stitt, Carmen; Kunkel, Dale

    2008-11-01

    The rise in the number of overweight and obese children in the United States is recognized as a serious health threat. Among the factors contributing to this increase is the preponderance of food marketing on television targeted at children. Previous content analysis studies have identified patterns of food product types that are commonly associated with unhealthy diets, but few have attempted to independently evaluate the nutritional quality of advertised foods. This study identifies the nature and extent of food marketing messages presented during children's television programs, while also classifying the products advertised using a U.S. Department of Health and Human Services consumer food rating scheme. The findings indicate that food advertising accounts for nearly half of all commercial messages on children's programs. An average hour includes 11 food ads that account for 4:25 of total ad time. Broadcast channels deliver more food advertising than cable channels, although the types of food products marketed on both channels are highly similar. The overwhelming majority of foods ads directed to children are for high-calorie, low nutrient food products that should not be part of a regular diet. These data provide a baseline for evaluating anticipated future industry efforts at reform, such as attempts to comply with a recent Institute of Medicine (2006) policy recommendation that food marketing to children should be balanced between more healthy and less healthy food products within two years time.

  11. Hard Content, Fab Front-End : Archiving Websites of Dutch Public Broadcasters

    NARCIS (Netherlands)

    Baltussen, L; Blom, J; Medjoune, L; Pop, R; van Gorp, Jasmijn; Huurdeman, H; Haaijer, L

    2014-01-01

    Although there are a great variety of web archiving projects around the world, there are not many that focus explicitly on websites of broadcasters. The reason is that funds are often lacking to do this, and that broadcaster websites are difficult to archive, due to their dynamic and audiovisual

  12. Decentralized position verification in geographic ad hoc routing

    NARCIS (Netherlands)

    Leinmüller, Tim; Schoch, Elmar; Kargl, Frank; Maihöfer, Christian

    Inter-vehicle communication is regarded as one of the major applications of mobile ad hoc networks (MANETs). Compared to MANETs or wireless sensor networks (WSNs), these so-called vehicular ad hoc networks (VANETs) have unique requirements on network protocols. The requirements result mainly from

  13. 47 CFR 74.401 - Definitions.

    Science.gov (United States)

    2010-10-01

    ... automatic means and is used to relay transmissions between remote pickup broadcast base and mobile stations, between remote pickup broadcast mobile stations and from remote pickup broadcast mobile stations to... programming operation of a broadcast station and its auxiliaries. Remote control operation. Operation of a...

  14. Power-Aware DVB-H Mobile TV System on Heterogeneous Multicore Platform

    Directory of Open Access Journals (Sweden)

    Chao Han-Chieh

    2010-01-01

    Full Text Available In mobile communication network, the mobile device integrated with TV player is a novel technology that provides TV program services to end users. As TV program is a real-time video service, it has greater technical difficulties to overcome than a traditional video file download or online streaming, especially when TV programs are played on handheld devices. A challenge is how to save power in order to provide users with longer TV program services. To address this issue, this study proposes a mobile TV system on a heterogeneous multicore platform, which utilizes a Digital Video Broadcasting-Handheld (DVB-H wireless network to receive the TV program signal, thus, saving power according to the features of DVB-H TV signal and heterogeneous multi-core.

  15. Geo-targeted Weather Alerts Coming to Millions of Mobile Devices

    Science.gov (United States)

    Gerber, M.

    2011-12-01

    The Personal Localized Alert Network (PLAN), aka Commercial Mobile Alert System (CMAS), is readying for roll out and will be broadcasting emergency public alerts to millions of cell phones by the middle of 2012. Learn how the National Weather Serivce (NWS) is supplying PLAN with geo-referenced weather alert information in the industry standard Common Alerting Protocol (CAP) format and how you can access this same information for integration with mobile devices, other consumer electronics, and decision support systems. Information will also be provided on the NWS' new collaborative venue that encourages wide participation in the evolution and use of NWS CAP alerts in a variety of applications.

  16. On locality of Generalized Reed-Muller codes over the broadcast erasure channel

    KAUST Repository

    Alloum, Amira

    2016-07-28

    One to Many communications are expected to be among the killer applications for the currently discussed 5G standard. The usage of coding mechanisms is impacting broadcasting standard quality, as coding is involved at several levels of the stack, and more specifically at the application layer where Rateless, LDPC, Reed Slomon codes and network coding schemes have been extensively studied, optimized and standardized in the past. Beyond reusing, extending or adapting existing application layer packet coding mechanisms based on previous schemes and designed for the foregoing LTE or other broadcasting standards; our purpose is to investigate the use of Generalized Reed Muller codes and the value of their locality property in their progressive decoding for Broadcast/Multicast communication schemes with real time video delivery. Our results are meant to bring insight into the use of locally decodable codes in Broadcasting. © 2016 IEEE.

  17. IF-MANET: Interoperable framework for heterogeneous mobile ad hoc networks

    OpenAIRE

    Hassan, H.

    2015-01-01

    The advances in low power micro-processors, wireless networks and embedded systems have raised the need to utilize the significant resources of mobile devices. These devices for example, smart phones, tablets, laptops, wearables, and sensors are gaining enormous processing power, storage capacity and wireless bandwidth. In addition, the advancement in wireless mobile technology has created a new communication paradigm via which a wireless network can be created without any priori infrastructu...

  18. Intrusion detection in wireless ad-hoc networks

    CERN Document Server

    Chaki, Nabendu

    2014-01-01

    Presenting cutting-edge research, Intrusion Detection in Wireless Ad-Hoc Networks explores the security aspects of the basic categories of wireless ad-hoc networks and related application areas. Focusing on intrusion detection systems (IDSs), it explains how to establish security solutions for the range of wireless networks, including mobile ad-hoc networks, hybrid wireless networks, and sensor networks.This edited volume reviews and analyzes state-of-the-art IDSs for various wireless ad-hoc networks. It includes case studies on honesty-based intrusion detection systems, cluster oriented-based

  19. Displays enabling mobile multimedia

    Science.gov (United States)

    Kimmel, Jyrki

    2007-02-01

    With the rapid advances in telecommunications networks, mobile multimedia delivery to handsets is now a reality. While a truly immersive multimedia experience is still far ahead in the mobile world, significant advances have been made in the constituent audio-visual technologies to make this become possible. One of the critical components in multimedia delivery is the mobile handset display. While such alternatives as headset-style near-to-eye displays, autostereoscopic displays, mini-projectors, and roll-out flexible displays can deliver either a larger virtual screen size than the pocketable dimensions of the mobile device can offer, or an added degree of immersion by adding the illusion of the third dimension in the viewing experience, there are still challenges in the full deployment of such displays in real-life mobile communication terminals. Meanwhile, direct-view display technologies have developed steadily, and can provide a development platform for an even better viewing experience for multimedia in the near future. The paper presents an overview of the mobile display technology space with an emphasis on the advances and potential in developing direct-view displays further to meet the goal of enabling multimedia in the mobile domain.

  20. Residential exposure to radiofrequency fields from mobile phone base stations, and broadcast transmitters: a population-based survey with personal meter

    OpenAIRE

    VIEL, JF; CLERC, S; BARRERA, C; RYMZHANOVA, R; MOISSONNIER, M; HOURS, M; CARDIS, E

    2009-01-01

    Objectives: Both the public perceptions, and most published epidemiologic studies, rely on the assumption that the distance of a particular residence from a base station or a broadcast transmitter is an appropriate surrogate for exposure to radiofrequency fields, although complex propagation characteristics affect the beams from antennas. The main goal of this study was to characterise the distribution of residential exposure from antennas using personal exposure meters.Results: Much of the t...

  1. 78 FR 11222 - Solicitation for a Cooperative Agreement-Production of Five Live Satellite/Internet Broadcasts...

    Science.gov (United States)

    2013-02-15

    ... each broadcast. Significant contribution to the development of the storyboard will come from designated... the storyboard/rundown development for each broadcast, must be carefully developed. The following... clips for inclusion in the storyboard of a broadcast and to allow sufficient time for editing. These...

  2. 77 FR 71104 - Determination of Reasonable Rates and Terms for Noncommercial Broadcasting

    Science.gov (United States)

    2012-11-29

    ... full-time students 2013 2014 2015 2016 2017 Level 1 =20% Feature Music programming: Population count..., Composers and Publishers (``ASCAP''); SESAC, Inc.; Broadcast Music, Inc. (``BMI''); Educational Media Foundation (``EMF''); Music Reports, Inc. (``MRI''); National Public Radio, the Public Broadcasting Service...

  3. MUSICAL ARRANGEMENT OF MEDIA ADS

    Directory of Open Access Journals (Sweden)

    Chernyshov Alexander V.

    2015-01-01

    Full Text Available The music-compositional principles of commercial and political advertising and also the self-promotion of electronic media (radio, television, Internet are considered in this mediatext: from the elementary beeps, symbolic functions, emblems/logos and musical brands to the sound engineering technology to underscore the product's name and the complex synthesis between music and intra movements and color-light design of frames. Simultaneously examines, how the musical arrangement of ethereal advertising is involved in creation the emotional drama or bravado which reach the level of explicit or associative counterpoint 'music with the advertised object or subject' and which extend to expression of cultural image of all the broadcast channel. The article explores the works of the next genres like infomercial, teleshopping, film-ad, and autonomous commercials that have been produced in European countries or USA.

  4. Analysis and Transceiver Design for the MIMO Broadcast Channel

    CERN Document Server

    Hunger, Raphael

    2013-01-01

    This book deals with the optimization-based joint design of the transmit and receive filters in   MIMO broadcast channel in which the user terminals may be equipped with several antenna elements. Furthermore, the maximum performance of the system in the high power regime as well as the set of all feasible quality-of-service requirements is analyzed. First, a fundamental duality is derived that holds between the MIMO broadcast channel and virtual MIMO multiple access channel. This duality construct allows for the efficient solution of problems originally posed in the broadcast channel in the dual domain where a possibly hidden convexity can often be revealed. On the basis of the established duality result, the gradient-projection algorithm is introduced as a tool to solve constrained optimization problems to global optimality under certain conditions. The gradient-projection tool is then applied to solving the weighted sum rate maximization problem which is a central optimization that arises in any network u...

  5. The method of quick satellite aiming with 3-Steps on the mobile satellite station

    Directory of Open Access Journals (Sweden)

    Sheng Liang

    2017-02-01

    Full Text Available The study analyses and concludes the technology of the satellite aiming during real-time broadcast of mobile video.We conclude a method of quick satellite aiming with 3-steps according to practical exercises and users' requirement to meet situation of facts and standardized operation,which can improve efficiency and quality of service.

  6. Introduction to “International Broadcasting and Public Diplomacy in the 21st Century”

    Directory of Open Access Journals (Sweden)

    Gary D. Rawnsley

    2016-05-01

    Full Text Available International broadcasting remains a key activity in public diplomacy. In this Introduction I discuss how international broadcasting has long been associated with the projection of foreign policy interests, from an instrument of empire building in the 1920s and 1930s, through the Cold War and beyond. In particular, the Introduction evaluates how modern Information Communications Technologies, especially the internet and social media, have transformed the way international broadcasting contributes to public diplomacy.

  7. The evolution of gonad expenditure and gonadosomatic index (GSI) in male and female broadcast-spawning invertebrates.

    Science.gov (United States)

    Parker, Geoff A; Ramm, Steven A; Lehtonen, Jussi; Henshaw, Jonathan M

    2018-05-01

    Sedentary broadcast-spawning marine invertebrates, which release both eggs and sperm into the water for fertilization, are of special interest for sexual selection studies. They provide unique insight into the early stages of the evolutionary succession leading to the often-intense operation of both pre- and post-mating sexual selection in mobile gonochorists. Since they are sessile or only weakly mobile, adults can interact only to a limited extent with other adults and with their own fertilized offspring. They are consequently subject mainly to selection on gamete production and gamete success, and so high gonad expenditure is expected in both sexes. We review literature on gonadosomatic index (GSI; the proportion of body tissue devoted to gamete production) of gonochoristic broadcast spawners, which we use as a proxy for gonad expenditure. We show that such taxa most often have a high GSI that is approximately equal in both sexes. When GSI is asymmetric, female GSI usually exceeds male GSI, at least in echinoderms (the majority of species recorded). Intriguingly, though, higher male GSI also occurs in some species and appears more common than female-biased GSI in certain orders of gastropod molluscs. Our limited data also suggest that higher male GSI may be the prevalent pattern in sperm casters (where only males release gametes). We explore how selection might have shaped these patterns using game theoretic models for gonad expenditure that consider possible trade-offs with (i) somatic maintenance or (ii) growth, while also considering sperm competition, sperm limitation, and polyspermy. Our models of the trade-off between somatic tissue (which increases survival) and gonad (which increases reproductive success) predict that GSI should be equal for the two sexes when sperm competition is intense, as is probably common in broadcast spawners due to synchronous spawning in aggregations. Higher female GSI occurs under low sperm competition. Sperm limitation appears

  8. 77 FR 22755 - Sunshine Act Meeting; Notice of Meeting of the Broadcasting Board of Governors

    Science.gov (United States)

    2012-04-17

    ... BROADCASTING BOARD OF GOVERNORS Sunshine Act Meeting; Notice of Meeting of the Broadcasting Board of Governors DATE AND TIME: Friday, April 20, 2012, 10 a.m. PLACE: Office of Cuba Broadcasting, 4201... Strategy and Budget Committee on the implementation of the BBG strategy and a report from the Governance...

  9. Video Broadcasting Using Queue Proportional Scheduling

    Directory of Open Access Journals (Sweden)

    Dimitris Toumpakaris

    2007-01-01

    using a Markov Chain approach leading to a method for approximating the packet delay distribution. Based on the resulting distribution, it is discussed how the video encoding rate can be chosen in order to reduce the expected distortion of streams transmitted through Broadcast Channels.

  10. Browse Title Index

    African Journals Online (AJOL)

    Items 201 - 250 of 298 ... Vol 17, No 2 (2009), On the Performance of Counter-Based Broadcast Scheme for Mobile Ad Hoc Networks, Abstract PDF .... Vol 16, No 2 (2008), Profitability Analysis of Three Methods of Suya Production and Marketing in Maiduguri metropolitan Council, Borno State, Nigeria, Abstract PDF. A Iliyasu ...

  11. Air Traffic Security: Aircraft Classification Using ADS-B Message’s Phase-Pattern

    Directory of Open Access Journals (Sweden)

    Mauro Leonardi

    2017-10-01

    Full Text Available Automatic Dependent Surveillance-Broadcast (ADS-B is a surveillance system used in Air Traffic Control. With this system, the aircraft transmits their own information (identity, position, velocity, etc. to any equipped listener for surveillance scope. The ADS-B is based on a very simple protocol and does not provide any kind of authentication and encryption, making it vulnerable to many types of cyber-attacks. In the paper, the use of the airplane/transmitter carrier phase is proposed as a feature to perform a classification of the aircraft and, therefore, distinguish legitimate messages from fake ones. The feature extraction process is described and a classification method is selected. Finally, a complete intruder detection algorithm is proposed and evaluated with real data.

  12. Relay-based information broadcast in complex networks

    Science.gov (United States)

    Fan, Zhongyan; Han, Zeyu; Tang, Wallace K. S.; Lin, Dong

    2018-04-01

    Information broadcast (IB) is a critical process in complex network, usually accomplished by flooding mechanism. Although flooding is simple and no prior topological information is required, it consumes a lot of transmission overhead. Another extreme is the tree-based broadcast (TB), for which information is disseminated via a spanning tree. It achieves the minimal transmission overhead but the maintenance of spanning tree for every node is an obvious obstacle for implementation. Motivated by the success of scale-free network models for real-world networks, in this paper, we investigate the issues in IB by considering an alternative solution in-between these two extremes. A novel relay-based broadcast (RB) mechanism is proposed by employing a subset of nodes as relays. Information is firstly forwarded to one of these relays and then re-disseminated to others through the spanning tree whose root is the relay. This mechanism provides a trade-off solution between flooding and TB. On one hand, it saves up a lot of transmission overhead as compared to flooding; on the other hand, it costs much less resource for maintenance than TB as only a few spanning trees are needed. Based on two major criteria, namely the transmission overhead and the convergence time, the effectiveness of RB is confirmed. The impacts of relay assignment and network structures on performance are also studied in this work.

  13. 75 FR 71148 - Solicitation for a Cooperative Agreement-Production of Seven Live Satellite/Internet Broadcasts

    Science.gov (United States)

    2010-11-22

    ... storyboard will come from designated content experts, the talent selected to appear in the broadcast, and NIC.... Therefore, the content development process, as part of the storyboard development for each broadcast, must... ensure ample time for considering the clips for inclusion in the storyboard of a broadcast and to allow...

  14. Resource allocation for multichannel broadcasting visible light communication

    Science.gov (United States)

    Le, Nam-Tuan; Jang, Yeong Min

    2015-11-01

    Visible light communication (VLC), which offers the possibility of using light sources for both illumination and data communications simultaneously, will be a promising incorporation technique with lighting applications. However, it still remains some challenges especially coverage because of field-of-view limitation. In this paper, we focus on this issue by suggesting a resource allocation scheme for VLC broadcasting system. By using frame synchronization and a network calculus QoS approximation, as well as diversity technology, the proposed VLC architecture and QoS resource allocation for the multichannel-broadcasting MAC (medium access control) protocol can solve the coverage limitation problem and the link switching problem of exhibition service.

  15. New Generation of Broadcasting Satellite Systems: New Markets and Business Developments

    Science.gov (United States)

    Perrot, Bruno; Michel, Cyril; Villaret, Stéfanie

    2002-01-01

    Since the deployment of the first Digital Broadcasting Satellite Systems, European satellite operators and service providers have been faced with the continuously increasing demand for Digital Broadcasting Services. Their success is built on the availability of the MPEG and DVB standards. Undoubtedly, conventional digital television broadcasting is today the `Killer' application. Various service providers already offer multimedia applications through DVB-S systems based upon the `Push' technology. Although these services do not currently represent the core business for broadcasting satellite operators, their percentage is increasing. `Push' technology services include Data Carousel, Webcasting, Turbo Internet, File casting and so on. Such technology can support the implementation of different emerging multimedia services scenarios from Newsgroups, Network collaborative learning, and tele-medicine, to others that may be invented in the near future. The penetration rate of multi-channel television reception is still increasing. Broadcasting satellites benefit both from the development of new, more segmented and sophisticated offers and from the development of Internet services. Satellite is likely to enter these new markets at different levels of the value chain: Even if the satellite has demonstrated its capacity to fully serve the television, combinations with other networks may be necessary to address the new markets: at the consumer premises, Internet-related services will require a return path; at the backbone level, satellite becomes a component of a full telecommunications solution. This article focuses on the European market and proposes:

  16. Implementing voice over Internet protocol in mobile ad hoc network – analysing its features regarding efficiency, reliability and security

    Directory of Open Access Journals (Sweden)

    Naveed Ahmed Sheikh

    2014-05-01

    Full Text Available Providing secure and efficient real-time voice communication in mobile ad hoc network (MANET environment is a challenging problem. Voice over Internet protocol (VoIP has originally been developed over the past two decades for infrastructure-based networks. There are strict timing constraints for acceptable quality VoIP services, in addition to registration and discovery issues in VoIP end-points. In MANETs, ad hoc nature of networks and multi-hop wireless environment with significant packet loss and delays present formidable challenges to the implementation. Providing a secure real-time VoIP service on MANET is the main design objective of this paper. The authors have successfully developed a prototype system that establishes reliable and efficient VoIP communication and provides an extremely flexible method for voice communication in MANETs. The authors’ cooperative mesh-based MANET implementation can be used for rapidly deployable VoIP communication with survivable and efficient dynamic networking using open source software.

  17. Strategy and Space for Broadcasting Facilities

    DEFF Research Database (Denmark)

    Jensen, Per Anker

    2006-01-01

    The paper is based on results from an ongoing research project on space strategies and building values, which in-cludes a major case study of the development of facilities for the Danish Broadcasting Corporation over time. The focus is to identify, how different space strategies have been...

  18. A Cross-Layer Route Discovery Framework for Mobile Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    Wu Jieyi

    2005-01-01

    Full Text Available Most reactive routing protocols in MANETs employ a random delay between rebroadcasting route requests (RREQ in order to avoid "broadcast storms." However this can lead to problems such as "next hop racing" and "rebroadcast redundancy." In addition to this, existing routing protocols for MANETs usually take a single routing strategy for all flows. This may lead to inefficient use of resources. In this paper we propose a cross-layer route discovery framework (CRDF to address these problems by exploiting the cross-layer information. CRDF solves the above problems efficiently and enables a new technique: routing strategy automation (RoSAuto. RoSAuto refers to the technique that each source node automatically decides the routing strategy based on the application requirements and each intermediate node further adapts the routing strategy so that the network resource usage can be optimized. To demonstrate the effectiveness and the efficiency of CRDF, we design and evaluate a macrobian route discovery strategy under CRDF.

  19. Localization with a mobile beacon in underwater acoustic sensor networks.

    Science.gov (United States)

    Lee, Sangho; Kim, Kiseon

    2012-01-01

    Localization is one of the most important issues associated with underwater acoustic sensor networks, especially when sensor nodes are randomly deployed. Given that it is difficult to deploy beacon nodes at predetermined locations, localization schemes with a mobile beacon on the sea surface or along the planned path are inherently convenient, accurate, and energy-efficient. In this paper, we propose a new range-free Localization with a Mobile Beacon (LoMoB). The mobile beacon periodically broadcasts a beacon message containing its location. Sensor nodes are individually localized by passively receiving the beacon messages without inter-node communications. For location estimation, a set of potential locations are obtained as candidates for a node's location and then the node's location is determined through the weighted mean of all the potential locations with the weights computed based on residuals.

  20. Localization with a Mobile Beacon in Underwater Acoustic Sensor Networks

    Directory of Open Access Journals (Sweden)

    Sangho Lee

    2012-04-01

    Full Text Available Localization is one of the most important issues associated with underwater acoustic sensor networks, especially when sensor nodes are randomly deployed. Given that it is difficult to deploy beacon nodes at predetermined locations, localization schemes with a mobile beacon on the sea surface or along the planned path are inherently convenient, accurate, and energy-efficient. In this paper, we propose a new range-free Localization with a Mobile Beacon (LoMoB. The mobile beacon periodically broadcasts a beacon message containing its location. Sensor nodes are individually localized by passively receiving the beacon messages without inter-node communications. For location estimation, a set of potential locations are obtained as candidates for a node’s location and then the node’s location is determined through the weighted mean of all the potential locations with the weights computed based on residuals.

  1. Financing Public Service Broadcasting

    DEFF Research Database (Denmark)

    Berg, Christian Edelvold; Lund, Anker Brink

    2012-01-01

    Broadcasting (PSB) financing regimes in Europe, concluding that Denmark, Finland, Iceland, Norway, and Sweden may still be considered conventional, licence fee PSB countries, but with some interesting differences in relation to competitive and market oriented alternatives of resource provision......Recently several European countries have abolished the traditional public service licence fee system, replacing it with direct public funding. But except for Iceland, the Nordic countries have not followed suit. The article discusses this development within a comparative framework of Public Service...

  2. A dynamic analysis of consolidation in the broadcast television industry

    OpenAIRE

    Jessica C. Stahl

    2009-01-01

    This paper estimates a dynamic oligopoly model in order to separately identify the demand-side and cost-side advantages of consolidation in the broadcast television industry. I exploit an exogenous change in regulation that led to significant industry consolidation. Using revenue and ownership data for broadcast stations over the past ten years, I estimate the effect of ownership changes on revenue. I recover costs by examining patterns in ownership changes that are left unexplained by revenu...

  3. Technological, political and economic changes and their implications for the evolution of broadcasting services

    DEFF Research Database (Denmark)

    Tadayoni, Reza

    2000-01-01

    The subject of this Ph.D. thesis is changes in the market for broadcasting services as a result of technological, political, and economic drivers. Broadcasting services can be categorised as a part of the ICT-based information and knowledge intensive services that have gone through radical changes...... and demand sites, scarcity of transmission resources, and the historical aspects that make the development of the broadcasting service market different from other information and knowledge intensive services....

  4. Broadcast Advertising of Medical Products and Services: Its Regulation by Other Nations.

    Science.gov (United States)

    Powell, Jon T.

    1972-01-01

    Restraints imposed on medical advertising through the broadcast media reflect a worldwide concern for public protection in a sensitive area, where problems of ignorance and misrepresentation are enlarged by false hope. The author examines the broadcast codes of seventeen free-world nations, with respect to their provisions on medical advertising.…

  5. Finding Minimum-Power Broadcast Trees for Wireless Networks

    Science.gov (United States)

    Arabshahi, Payman; Gray, Andrew; Das, Arindam; El-Sharkawi, Mohamed; Marks, Robert, II

    2004-01-01

    Some algorithms have been devised for use in a method of constructing tree graphs that represent connections among the nodes of a wireless communication network. These algorithms provide for determining the viability of any given candidate connection tree and for generating an initial set of viable trees that can be used in any of a variety of search algorithms (e.g., a genetic algorithm) to find a tree that enables the network to broadcast from a source node to all other nodes while consuming the minimum amount of total power. The method yields solutions better than those of a prior algorithm known as the broadcast incremental power algorithm, albeit at a slightly greater computational cost.

  6. Delay-dependent asymptotic stability of mobile ad-hoc networks: A descriptor system approach

    International Nuclear Information System (INIS)

    Yang Juan; Yang Dan; Zhang Xiao-Hong; Huang Bin; Luo Jian-Lu

    2014-01-01

    In order to analyze the capacity stability of the time-varying-propagation and delay-dependent of mobile ad-hoc networks (MANETs), in this paper, a novel approach is proposed to explore the capacity asymptotic stability for the delay-dependent of MANETs based on non-cooperative game theory, where the delay-dependent conditions are explicitly taken into consideration. This approach is based on the Lyapunov—Krasovskii stability theory for functional differential equations and the linear matrix inequality (LMI) technique. A corresponding Lyapunov—Krasovskii functional is introduced for the stability analysis of this system with use of the descriptor and “neutral-type” model transformation without producing any additional dynamics. The delay-dependent stability criteria are derived for this system. Conditions are given in terms of linear matrix inequalities, and for the first time referred to neutral systems with the time-varying propagation and delay-dependent stability for capacity analysis of MANETs. The proposed criteria are less conservative since they are based on an equivalent model transformation. Furthermore, we also provide an effective and efficient iterative algorithm to solve the constrained stability control model. Simulation experiments have verified the effectiveness and efficiency of our algorithm. (general)

  7. AUTOMATIC SEGMENTATION OF BROADCAST AUDIO SIGNALS USING AUTO ASSOCIATIVE NEURAL NETWORKS

    Directory of Open Access Journals (Sweden)

    P. Dhanalakshmi

    2010-12-01

    Full Text Available In this paper, we describe automatic segmentation methods for audio broadcast data. Today, digital audio applications are part of our everyday lives. Since there are more and more digital audio databases in place these days, the importance of effective management for audio databases have become prominent. Broadcast audio data is recorded from the Television which comprises of various categories of audio signals. Efficient algorithms for segmenting the audio broadcast data into predefined categories are proposed. Audio features namely Linear prediction coefficients (LPC, Linear prediction cepstral coefficients, and Mel frequency cepstral coefficients (MFCC are extracted to characterize the audio data. Auto Associative Neural Networks are used to segment the audio data into predefined categories using the extracted features. Experimental results indicate that the proposed algorithms can produce satisfactory results.

  8. Detection and Prevention of Denial of Service (DoS Attacks in Mobile Ad Hoc Networks using Reputation-based Incentive Schemes

    Directory of Open Access Journals (Sweden)

    Mieso, K Denko

    2005-08-01

    Full Text Available Mobile ad hoc networks (MANETs are dynamic mobile networks that can be formed in the absence of any pre-existing communication infrastructure. In addition to node mobility, a MANET is characterized by limited resources such as bandwidth, battery power, and storage space. The underlying assumption in MANETs is that the intermediate nodes cooperate in forwarding packets. However, this assumption does not hold in commercial and emerging civilian applications. MANETs are vulnerable to Denial of Service (DoS due to their salient characteristics. There is a need to provide an incentive mechanism that can provide cooperation among nodes in the network and improve overall network performance by reducing DoS attacks. In this paper, we propose a reputation-based incentive mechanism for detecting and preventing DoS attacks. DoS attacks committed by selfish and malicious nodes were investigated. Our scheme motivates nodes to cooperate and excludes them from the network only if they fail to do so. We evaluated the performance of our scheme using the packet delivery ratio, the routing and communication overhead, and misbehaving node detection in a discrete event-simulation environment. The results indicate that a reputation-based incentive mechanism can significantly reduce the effect of DoS attacks and improve performance in MANETs.

  9. Political Broadcast Advertising and Primary Election Voting

    Science.gov (United States)

    Wanat, John

    1974-01-01

    Results of a research project which hypothisized that: Other things being equal, the heavier a candidate's usage of broadcast advertising in a primary election campaign, the greater will be his share of the votes in the election. (Author/HB)

  10. Business of the Spirit. Ghanaian broadcast media and the commercial exploitation of Pentecostalism

    NARCIS (Netherlands)

    de Witte, M.

    2011-01-01

    This article takes a critical look at Ghana's rapidly evolving broadcasting scene and in particular at the expansion and popularity of religious broadcasting. Sketching the developments of the Ghanaian media landscape, it analyses the changing politics of representing religion in this field. The

  11. Data delivery method based on neighbor nodes' information in a mobile ad hoc network.

    Science.gov (United States)

    Kashihara, Shigeru; Hayashi, Takuma; Taenaka, Yuzo; Okuda, Takeshi; Yamaguchi, Suguru

    2014-01-01

    This paper proposes a data delivery method based on neighbor nodes' information to achieve reliable communication in a mobile ad hoc network (MANET). In a MANET, it is difficult to deliver data reliably due to instabilities in network topology and wireless network condition which result from node movement. To overcome such unstable communication, opportunistic routing and network coding schemes have lately attracted considerable attention. Although an existing method that employs such schemes, MAC-independent opportunistic routing and encoding (MORE), Chachulski et al. (2007), improves the efficiency of data delivery in an unstable wireless mesh network, it does not address node movement. To efficiently deliver data in a MANET, the method proposed in this paper thus first employs the same opportunistic routing and network coding used in MORE and also uses the location information and transmission probabilities of neighbor nodes to adapt to changeable network topology and wireless network condition. The simulation experiments showed that the proposed method can achieve efficient data delivery with low network load when the movement speed is relatively slow.

  12. Data Delivery Method Based on Neighbor Nodes’ Information in a Mobile Ad Hoc Network

    Directory of Open Access Journals (Sweden)

    Shigeru Kashihara

    2014-01-01

    Full Text Available This paper proposes a data delivery method based on neighbor nodes’ information to achieve reliable communication in a mobile ad hoc network (MANET. In a MANET, it is difficult to deliver data reliably due to instabilities in network topology and wireless network condition which result from node movement. To overcome such unstable communication, opportunistic routing and network coding schemes have lately attracted considerable attention. Although an existing method that employs such schemes, MAC-independent opportunistic routing and encoding (MORE, Chachulski et al. (2007, improves the efficiency of data delivery in an unstable wireless mesh network, it does not address node movement. To efficiently deliver data in a MANET, the method proposed in this paper thus first employs the same opportunistic routing and network coding used in MORE and also uses the location information and transmission probabilities of neighbor nodes to adapt to changeable network topology and wireless network condition. The simulation experiments showed that the proposed method can achieve efficient data delivery with low network load when the movement speed is relatively slow.

  13. Energy-Efficient Cluster Based Routing Protocol in Mobile Ad Hoc Networks Using Network Coding

    Directory of Open Access Journals (Sweden)

    Srinivas Kanakala

    2014-01-01

    Full Text Available In mobile ad hoc networks, all nodes are energy constrained. In such situations, it is important to reduce energy consumption. In this paper, we consider the issues of energy efficient communication in MANETs using network coding. Network coding is an effective method to improve the performance of wireless networks. COPE protocol implements network coding concept to reduce number of transmissions by mixing the packets at intermediate nodes. We incorporate COPE into cluster based routing protocol to further reduce the energy consumption. The proposed energy-efficient coding-aware cluster based routing protocol (ECCRP scheme applies network coding at cluster heads to reduce number of transmissions. We also modify the queue management procedure of COPE protocol to further improve coding opportunities. We also use an energy efficient scheme while selecting the cluster head. It helps to increase the life time of the network. We evaluate the performance of proposed energy efficient cluster based protocol using simulation. Simulation results show that the proposed ECCRP algorithm reduces energy consumption and increases life time of the network.

  14. [TV, overweight and nutritional surveillance. Ads content, food intake and physical activity].

    Science.gov (United States)

    Spagnoli, T D; Bioletti, L; Bo, C; Formigatti, M

    2003-01-01

    The relationship between television viewing and obesity in children and adults was examined in a large number of cross-sectional epidemiological studies. Some randomised, controlled trials confirmed the evidence that television viewing is a cause of increased body fatness. It seems of utility in nutritional surveillance to esteem time spent by children and adults in television watching and to evaluate ads contents and food preferences suggested by them. This editorial shows a two-years long analysis of food commercials broadcasted by the main Italian TV networks; food ads targeted on children, housewives and sport fans were evaluated; the relationship between television viewing, commercials and food intake or global lifestyle was investigated in a Piedmont's population (from Northern Italy). School projects aimed to reduce television viewing represent a promising strategy for preventing childhood obesity.

  15. Mobility Impact on Centralized Selection of Mobile Relays

    DEFF Research Database (Denmark)

    Nielsen, Jimmy Jessen; Madsen, Tatiana Kozlova; Schwefel, Hans-Peter

    2010-01-01

    parameters on the achieved average BER of data transmissions. The SNR measurement collection is based on periodic hello broadcasts. Results show that increasing node speed can lead to performance that is worse than always transmitting directly. The hello broadcast rate can mitigate this effect, however......, at the cost of an increase in signaling overhead. We find that discarding old measurements can significantly improve the BER performance without increasing the signaling overhead. This result establishes the importance of joint tuning of the hello broadcast rate and the measurement storage time....

  16. Educational Television Broadcasting in Germany: Prevailing Practices, Existing Challenges and Adoptable Policies

    Directory of Open Access Journals (Sweden)

    Pradeep Kumar Misra

    2010-07-01

    Full Text Available Television is widely used for educational purposes but has still not achieved its fullest potential neither in developed nor in developing countries. This worldwide under performance invite experts and academics to join hands to search causes and provide suggestions to make television a better and popular learning tool. Guided by this philosophy, the present paper analyzes the educational television broadcasting in Germany from different perspectives. The focus of analysis includes measures and practices adopted by German institutions/broadcasters to promote educational television. Besides dealing with these issues, the paper discusses existing challenges and suggests best adoptable educational television broadcasting polices from Germany to promote educational television in global perspectives.

  17. MODUS OPERANDI OF SLOVENIAN RADIO BROADCASTERS IN TRANSMISSION OF THEIR PROGRAMME CONTENTS IN THE PERIOD FROM 2004 TO 2014

    Directory of Open Access Journals (Sweden)

    Robi Brglez

    2016-01-01

    Full Text Available Accelerated trends of digitalisation and media convergence contribute to an increasingly important role of radio in modern society. In the last decade, we have seen in the field of radio broadcasting in the Republic of Slovenia an overwhelming expansion of radio broadcasters who acquired the radio broadcasting licences. The topic of this paper are issued radio broadcasting licences and granted statuses of station of special importance within radio broadcasting activity. Based on our own research of secondary data obtained from the documentation of co-regulators in the field of broadcasting for the period from 2004 to 2014, we attempted to identify the modus operandi of radio broadcasters in their everyday practice after acquiring the licences and statuses. Findings of our research indicate that the radio broadcasters over the period considered have often changed programme-related requirements and limitations resulting from their licences and the Mass Media Act, while broadcasting and distributing programming contents. In comparison with the modification of licences, they did not transfer the broadcasting right to another legal entity so frequently. It has been also established that the regulator in ten cases temporarily had revoked the broadcasting licences or decided to withdraw the statuses, because the irregularities were detected during expert supervision. The authors set out proposals for the improvement of the situation in the subject field, based on the obtained results. They consider that it could be a challenge for all broadcasting stakeholders, who however have to tackle the elimination of the multi-annual delay of the harmonisation of the broadcasting sector with the standards of European Union. According to the results of the present study, the stakeholders cannot be satisfied with the situation in Slovenian media landscape and with its development nowadays.

  18. Zero added oxygen for high quality sputtered ITO: A data science investigation of reduced Sn-content and added Zr

    International Nuclear Information System (INIS)

    Peshek, Timothy J.; Burst, James M.; Coutts, Timothy J.; Gessert, Timothy A.

    2016-01-01

    The authors demonstrate mobilities of >45 cm 2 /V s for sputtered tin-doped indium oxide (ITO) films at zero added oxygen. All films were deposited with 5 wt. % SnO 2 , instead of the more conventional 8–10 wt. %, and had varying ZrO 2 content from 0 to 3 wt. %, with a subsequent reduction in In 2 O 3 content. These films were deposited by radio-frequency magnetron sputtering from nominally stoichiometric targets with varying oxygen partial pressure in the sputter ambient. Anomalous behavior was discovered for films with no Zr-added, where a bimodality of high and low mobilities was discovered for nominally similar growth conditions. However, all films showed the lowest resistivity and highest mobilities when the oxygen partial pressure in the sputter ambient was zero. This result is contrasted with several other reports of ITO transport performance having a maximum for small but nonzero oxygen partial pressure. This result is attributed to the reduced concentration of SnO 2 . The addition of ZrO 2 yielded the highest mobilities at >55 cm 2 /V s and the films showed a modest increase in optical transmission with increasing Zr-content

  19. Broadcast Condom Advertising: A Case Study.

    Science.gov (United States)

    Kaplan, Herb; Houlberg, Rick

    1990-01-01

    Examines a San Francisco television station's decision to accept paid condom advertising. Notes that station leaders debated questions of public interest and public tastes in a city hard hit by AIDS. Finds that the station devised careful guidelines and began broadcasting the commercials on a trial basis. Notes that nearly all public and media…

  20. National Workplace Literacy Program. Garment-Related Bilingual (English and Chinese) Broadcast Lessons. Book 1 and 2.

    Science.gov (United States)

    Chan, Ha Yin

    A compilation of transcripts of 100 bilingual English/Chinese broadcast lessons for workers in the garment industry is presented. The lessons are part of the New York Chinatown Manpower Project's Workplace Literacy Program. With the support of the Sino Radio Broadcast Corporation, the lessons are broadcast daily in the morning and again after the…

  1. PrECast: An Efficient Crypto-Free Solution for Broadcast-Based Attacks in IPv4 Networks

    Directory of Open Access Journals (Sweden)

    Dalal Hanna

    2018-05-01

    Full Text Available Broadcasting is one of the essential features in the Internet Protocol Ver 4 (IPv4. Attackers often exploit this feature of the IP protocol to launch several attacks against a network or an individual host. Attackers may either be a part of a Local Area Network (LAN or outside a LAN to launch these attacks. There are numerous papers available in the literature to solve problems resulting from IP broadcasting. However, all these solutions target a specific problem that results from IP broadcasting. Furthermore, these solutions use either a computationally-intensive cryptographic scheme, the a priori relation between the host and the network or a modified protocol stack at every host. In this paper, we provide a seamless and transparent solution to eliminate IP broadcasting and thus eliminate all problems related to IP broadcasting. Our proposed solution is crypto-free and does not need any modification to the protocol stack.

  2. On the secrecy capacity of the broadcast wiretap channel with limited CSI feedback

    KAUST Repository

    Hyadi, Amal

    2016-10-27

    In this paper, we investigate the problem of secure broadcasting over block-fading channels with limited channel knowledge at the transmitter. More particularly, we analyze the effect of having imperfect channel state information (CSI) via a finite rate feedback on the throughput of a broadcast channel where the transmission is intended for multiple legitimate receivers in the presence of an eavesdropper. First, we partially characterize the ergodic secrecy capacity of the system when the source broadcasts the same information to all the receivers, i.e., common message transmission. Then, we look at the independent messages case, where the transmitter broadcasts multiple independent messages to the legitimate receivers. For this case, we present lower and upper bounds on the ergodic secrecy sum-capacity. In both scenarios, we show that the proposed lower and upper bounds coincide asymptotically as the capacity of the feedback links becomes large, hence, fully characterizing the secrecy capacity in this case.

  3. On the secrecy capacity of the broadcast wiretap channel with limited CSI feedback

    KAUST Repository

    Hyadi, Amal; Rezki, Zouheir; Alouini, Mohamed-Slim

    2016-01-01

    In this paper, we investigate the problem of secure broadcasting over block-fading channels with limited channel knowledge at the transmitter. More particularly, we analyze the effect of having imperfect channel state information (CSI) via a finite rate feedback on the throughput of a broadcast channel where the transmission is intended for multiple legitimate receivers in the presence of an eavesdropper. First, we partially characterize the ergodic secrecy capacity of the system when the source broadcasts the same information to all the receivers, i.e., common message transmission. Then, we look at the independent messages case, where the transmitter broadcasts multiple independent messages to the legitimate receivers. For this case, we present lower and upper bounds on the ergodic secrecy sum-capacity. In both scenarios, we show that the proposed lower and upper bounds coincide asymptotically as the capacity of the feedback links becomes large, hence, fully characterizing the secrecy capacity in this case.

  4. 75 FR 30159 - Automatic Dependent Surveillance-Broadcast (ADS-B) Out Performance Requirements To Support Air...

    Science.gov (United States)

    2010-05-28

    ... GNSS--Global Navigation Satellite System GPS--Global Positioning System HAI--Helicopter Association... of the Aircraft's Geometric Altitude L. Ability To Turn Off ADS-B Out Transmissions M. Existing... navigation system, such as the Global Positioning System (GPS), that provides autonomous worldwide geo...

  5. Diabetes and Orientation and Mobility Training: An Added Challenge.

    Science.gov (United States)

    Kozel, B.

    1995-01-01

    Issues related to promoting orientation and mobility training for individuals with visual impairments and diabetes are discussed, including effects of insulin, hypoglycemia and hyperglycemia, the timing of training, complications to the feet, and fluctuations in vision. Major lifestyle changes required by diabetes are stressed. (Author/SW)

  6. Feedback Halves the Dispersion for Some Two-User Broadcast Channels with Common Message

    DEFF Research Database (Denmark)

    Trillingsgaard, Kasper Fløe; Yang, Wei; Durisi, Giuseppe

    2017-01-01

    We investigate the maximum coding rate achievable on a two-user broadcast channel for the case where a common- message is transmitted using fixed-blocklength codes with feed- back. Specifically, we focus on a family of broadcast channels com- posed of two antisymmetric Z-channels. For this setup,...

  7. Technological characteristics of digital video broadcasting: Handheld standard DVB-H

    Directory of Open Access Journals (Sweden)

    Andreja B. Samčović

    2011-07-01

    Full Text Available This paper gives an overview of the Digital Video Broadcasting - Handheld standard DVB-H, as a part of the DVB Project. This standard is based on the previous standard DVB-T, which was developed for the terrestrial digital television. The ways of DVB-H signal transmission are also described. Development of advanced technology enabled the digital video broadcasting over wireless portable terminals. This paper discusses the key technological features of the DVB-H standard, such as: time slicing, forward error correction, 4K mode and in-depth interleavers.

  8. Optimal JPWL Forward Error Correction Rate Allocation for Robust JPEG 2000 Images and Video Streaming over Mobile Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    Benoit Macq

    2008-07-01

    Full Text Available Based on the analysis of real mobile ad hoc network (MANET traces, we derive in this paper an optimal wireless JPEG 2000 compliant forward error correction (FEC rate allocation scheme for a robust streaming of images and videos over MANET. The packet-based proposed scheme has a low complexity and is compliant to JPWL, the 11th part of the JPEG 2000 standard. The effectiveness of the proposed method is evaluated using a wireless Motion JPEG 2000 client/server application; and the ability of the optimal scheme to guarantee quality of service (QoS to wireless clients is demonstrated.

  9. Content dependent selection of image enhancement parameters for mobile displays

    Science.gov (United States)

    Lee, Yoon-Gyoo; Kang, Yoo-Jin; Kim, Han-Eol; Kim, Ka-Hee; Kim, Choon-Woo

    2011-01-01

    Mobile devices such as cellular phones and portable multimedia player with capability of playing terrestrial digital multimedia broadcasting (T-DMB) contents have been introduced into consumer market. In this paper, content dependent image quality enhancement method for sharpness and colorfulness and noise reduction is presented to improve perceived image quality on mobile displays. Human visual experiments are performed to analyze viewers' preference. Relationship between the objective measures and the optimal values of image control parameters are modeled by simple lookup tables based on the results of human visual experiments. Content dependent values of image control parameters are determined based on the calculated measures and predetermined lookup tables. Experimental results indicate that dynamic selection of image control parameters yields better image quality.

  10. Connecting Mobile Game Advertising with Local Stores

    OpenAIRE

    Wen, Yanzhao

    2016-01-01

    With the growth of mobile market, mobile advertising and mobile game advertising are becoming more and more important. On one hand, mobile advertising is able to deliver relevant ads to targeted users based on their locations and behaviors. On the other hand, as the number of mobile game players and free-to-play mobile games are increasing, mobile game advertising forms one important way of monetization. It is important to increase the advertising effectiveness while producing friendly user e...

  11. Mobile Context Toolbox

    DEFF Research Database (Denmark)

    Stopczynski, Arkadiusz; Larsen, Jakob Eg; Skomail, Lukasz

    2010-01-01

    In this paper we describe an open framework utilizing sensors and application data on the Maemo mobile platform enabling rapid prototyping of context-aware mobile applications. The framework has an extensible layered architecture allowing new hardware and software sensors and features to be added...... to the context framework. We present initial results from in-the-wild experiments where contextual data was acquired using the tool. In the experiments 6 participants were using a Nokia N900 mobile phone continuously with a logger application for an average of 33 days. The study has provided valuable insights...

  12. AdDroid: Privilege Separation for Applications and Advertisers in Android

    Science.gov (United States)

    2013-05-14

    consumers . Mobile advertising services such as AdMob [1] and Millennial Media [22] play a key role in this ecosystem by allowing developers to generate...privacy-sensitive permissions just to display advertisements . 1Applications need phone state to obtain the phone’s In- ternational Mobile Equipment Identity...the Android permis- sion system and explain how mobile advertising currently works. We then explain how the current system leads to privacy and

  13. Performance Analysis of a Two-Hop MIMO Mobile-to-Mobile via Stratospheric-Relay Link Employing Hierarchical Modulation

    Directory of Open Access Journals (Sweden)

    Nikolaos Nomikos

    2013-01-01

    Full Text Available Next generation wireless communication networks intend to take advantage of the integration of terrestrial and aerospace infrastructures. Besides, multiple-input multiple-output (MIMO architecture is the key technology, which has brought the wireless gigabit vision closer to reality. In this direction, high-altitude platforms (HAPs could act as relay stations in the stratosphere transferring information from an uplink to a downlink MIMO channel. This paper investigates the performance of a novel transmission scheme for the delivery of mobile-to-mobile (M-to-M services via a stratospheric relay. It is assumed that the source, relay, and destination nodes are equipped with multiple antennas and that amplify-and-forward (AF relaying is adopted. The performance is analyzed through rigorous simulations in terms of the bit-error rate (BER by using a recently proposed 3D geometry-based reference model in spatially correlated flat-fading MIMO channels, employing a hierarchical broadcast technique and minimum mean square error (MMSE receivers.

  14. The Olympic Games broadcasted as Interactive Television - New Media new Games?

    DEFF Research Database (Denmark)

    Bjørner, Thomas

    or delayed video coverage of the Olympic Games. The Torino Olympic Broadcasting was the first to be filmed entirely in High Definition Television. In the future the use of digital video processing, computer vision, 3D-visualisation and animation techniques allow viewers to watch sports events almost......The Olympic Games is the world´s largest media event and television is the engine that has driven the growth of the Olympic Movement. Increases in broadcast revenue over the past two decades have provided the Olympic Movement with a huge financial base. More networks than ever before broadcast...... the Olympic Games to more countries and territories, with a record number of hours, a significant rise in the total viewing hours, and dramatic increases in live and prime-time coverage. Over 300 channels transmitted 35.000 hours of the Athens 2004 Olympic Games. The future of television is digital, which...

  15. Broadcast media and the dissemination of weather information

    Science.gov (United States)

    Byrnes, J.

    1973-01-01

    Although television is the public's most preferred source of weather information, it fails to provide weather reports to those groups who seek the information early in the day and during the day. The result is that many people most often use radio as a source of information, yet preferring the medium of television. The public actively seeks weather information from both radio and TV stations, usually seeking information on current conditions and short range forecasts. forecasts. Nearly all broadcast stations surveyed were eager to air severe weather bulletins quickly and often. Interest in Nowcasting was high among radio and TV broadcasters, with a significant portion indicating a willingness to pay something for the service. However, interest among TV stations in increasing the number of daily reports was small.

  16. Broadcasting collective operation contributions throughout a parallel computer

    Science.gov (United States)

    Faraj, Ahmad [Rochester, MN

    2012-02-21

    Methods, systems, and products are disclosed for broadcasting collective operation contributions throughout a parallel computer. The parallel computer includes a plurality of compute nodes connected together through a data communications network. Each compute node has a plurality of processors for use in collective parallel operations on the parallel computer. Broadcasting collective operation contributions throughout a parallel computer according to embodiments of the present invention includes: transmitting, by each processor on each compute node, that processor's collective operation contribution to the other processors on that compute node using intra-node communications; and transmitting on a designated network link, by each processor on each compute node according to a serial processor transmission sequence, that processor's collective operation contribution to the other processors on the other compute nodes using inter-node communications.

  17. A Survey of the DVB-T Spectrum: Opportunities for Cognitive Mobile Users

    OpenAIRE

    Csurgai-Horváth, László; Rieger, István; Kertész, József

    2016-01-01

    Cognitive radio (CR) systems are designed to utilize the available radio spectrum in an efficient and intelligent manner. Terrestrial Digital Video Broadcasting (DVB-T) frequency bands are one of the future candidates for cognitive radio applications especially because after digital television transition the TV white spaces (TVWS) became available for radio communication. This paper deals with the survey of the DVB-T spectrum; wideband measurements were performed on mobile platform in order t...

  18. Broadcast Journalism Education and the Capstone Experience

    Science.gov (United States)

    Tanner, Andrea; Forde, Kathy Roberts; Besley, John C.; Weir, Tom

    2012-01-01

    This study assesses the current state of the television news capstone experience in accredited journalism and mass communication programs in the United States. Specifically, the authors employed a mixed-methods approach, interviewing 20 television news capstone instructors and conducting an analysis of broadcast journalism curriculum information…

  19. Radio broadcasting for sustainable development in southern ...

    African Journals Online (AJOL)

    Patrick O. Waeber and Yvonne Orengo

    2008-12-01

    Dec 1, 2008 ... ABSTRACT. The Millennium Development Goals have been written into the Madagascar Road Map (2007 - 2012) in order to improve the Malagasy social, economic and environmental situation. The Andrew Lees Trust Radio Broadcasting Project in southern. Madagascar has been set up to alleviate ...

  20. Mobility Model for Self-Organizing and Cooperative MSN and MANET Systems

    Directory of Open Access Journals (Sweden)

    Andrzej Sikora

    2012-03-01

    Full Text Available Self-organization mechanisms are used for building scalable systems consisting of a huge number of subsystems. In computer networks, self-organizing is especially important in ad hoc networking. A self-organizing ad hoc network is a collection of wireless devices that collaborate with each other to form a network system that adapts to achieve a goal or goals. Such network is often built from mobile devices that may spontaneously create a network and dynamically adapted to changes in an unknown environment. Mobility pattern is a critical element that influences the performance characteristics of mobile sensor networks (MSN and mobile ad hoc networks (MANET. In this paper, we survey main directions to mobility modeling. We describe a novel algorithm for calculating mobility patterns for mobile devices that is based on a cluster formation and an artificial potential function. Finally, we present the simulation results of its application to a rescue mission planning.