WorldWideScience

Sample records for broadcast mobile ad

  1. Energy Efficient Probabilistic Broadcasting for Mobile Ad-Hoc Network

    Science.gov (United States)

    Kumar, Sumit; Mehfuz, Shabana

    2017-06-01

    In mobile ad-hoc network (MANETs) flooding method is used for broadcasting route request (RREQ) packet from one node to another node for route discovery. This is the simplest method of broadcasting of RREQ packets but it often results in broadcast storm problem, originating collisions and congestion of packets in the network. A probabilistic broadcasting is one of the widely used broadcasting scheme for route discovery in MANETs and provides solution for broadcasting storm problem. But it does not consider limited energy of the battery of the nodes. In this paper, a new energy efficient probabilistic broadcasting (EEPB) is proposed in which probability of broadcasting RREQs is calculated with respect to remaining energy of nodes. The analysis of simulation results clearly indicate that an EEPB route discovery scheme in ad-hoc on demand distance vector (AODV) can increase the network lifetime with a decrease in the average power consumption and RREQ packet overhead. It also decreases the number of dropped packets in the network, in comparison to other EEPB schemes like energy constraint gossip (ECG), energy aware gossip (EAG), energy based gossip (EBG) and network lifetime through energy efficient broadcast gossip (NEBG).

  2. Intelligent Broadcasting in Mobile Ad Hoc Networks: Three Classes of Adaptive Protocols

    Directory of Open Access Journals (Sweden)

    Michael D. Colagrosso

    2006-11-01

    Full Text Available Because adaptability greatly improves the performance of a broadcast protocol, we identify three ways in which machine learning can be applied to broadcasting in a mobile ad hoc network (MANET. We chose broadcasting because it functions as a foundation of MANET communication. Unicast, multicast, and geocast protocols utilize broadcasting as a building block, providing important control and route establishment functionality. Therefore, any improvements to the process of broadcasting can be immediately realized by higher-level MANET functionality and applications. While efficient broadcast protocols have been proposed, no single broadcasting protocol works well in all possible MANET conditions. Furthermore, protocols tend to fail catastrophically in severe network environments. Our three classes of adaptive protocols are pure machine learning, intra-protocol learning, and inter-protocol learning. In the pure machine learning approach, we exhibit a new approach to the design of a broadcast protocol: the decision of whether to rebroadcast a packet is cast as a classification problem. Each mobile node (MN builds a classifier and trains it on data collected from the network environment. Using intra-protocol learning, each MN consults a simple machine model for the optimal value of one of its free parameters. Lastly, in inter-protocol learning, MNs learn to switch between different broadcasting protocols based on network conditions. For each class of learning method, we create a prototypical protocol and examine its performance in simulation.

  3. Intelligent Broadcasting in Mobile Ad Hoc Networks: Three Classes of Adaptive Protocols

    Directory of Open Access Journals (Sweden)

    Colagrosso Michael D

    2007-01-01

    Full Text Available Because adaptability greatly improves the performance of a broadcast protocol, we identify three ways in which machine learning can be applied to broadcasting in a mobile ad hoc network (MANET. We chose broadcasting because it functions as a foundation of MANET communication. Unicast, multicast, and geocast protocols utilize broadcasting as a building block, providing important control and route establishment functionality. Therefore, any improvements to the process of broadcasting can be immediately realized by higher-level MANET functionality and applications. While efficient broadcast protocols have been proposed, no single broadcasting protocol works well in all possible MANET conditions. Furthermore, protocols tend to fail catastrophically in severe network environments. Our three classes of adaptive protocols are pure machine learning, intra-protocol learning, and inter-protocol learning. In the pure machine learning approach, we exhibit a new approach to the design of a broadcast protocol: the decision of whether to rebroadcast a packet is cast as a classification problem. Each mobile node (MN builds a classifier and trains it on data collected from the network environment. Using intra-protocol learning, each MN consults a simple machine model for the optimal value of one of its free parameters. Lastly, in inter-protocol learning, MNs learn to switch between different broadcasting protocols based on network conditions. For each class of learning method, we create a prototypical protocol and examine its performance in simulation.

  4. Broadcast Expenses Controlling Techniques in Mobile Ad-hoc Networks: A Survey

    Directory of Open Access Journals (Sweden)

    Naeem Ahmad

    2016-07-01

    Full Text Available The blind flooding of query packets in route discovery more often characterizes the broadcast storm problem, exponentially increases energy consumption of intermediate nodes and congests the entire network. In such a congested network, the task of establishing the path between resources may become very complex and unwieldy. An extensive research work has been done in this area to improve the route discovery phase of routing protocols by reducing broadcast expenses. The purpose of this study is to provide a comparative analysis of existing broadcasting techniques for the route discovery phase, in order to bring about an efficient broadcasting technique for determining the route with minimum conveying nodes in ad-hoc networks. The study is designed to highlight the collective merits and demerits of such broadcasting techniques along with certain conclusions that would contribute to the choice of broadcasting techniques.

  5. Clustering of Mobile Ad Hoc Networks: An Adaptive Broadcast Period Approach

    OpenAIRE

    Gavalas, Damianos; Pantziou, Grammati; Konstantopoulos, Charalampos; Mamalis, Basilis

    2011-01-01

    Organization, scalability and routing have been identified as key problems hindering viability and commercial success of mobile ad hoc networks. Clustering of mobile nodes among separate domains has been proposed as an efficient approach to address those issues. In this work, we introduce an efficient distributed clustering algorithm that uses both location and energy metrics for cluster formation. Our proposed solution mainly addresses cluster stability, manageability and energy efficiency i...

  6. Broadcast scheduling for mobile advertising

    OpenAIRE

    De Reyck, B.; Degraeve, Z.

    2003-01-01

    We describe a broadcast scheduling system developed for a precision marketing firm specialized in location-sensitive permission-based mobile advertising using SMS (Short Message Service) text messaging. Text messages containing advertisements were sent to registered customers when they were shopping in one of two shopping centers in the vicinity of London. The ads typically contained a limited-time promotional offer. The company's problem was deciding which ads to send out to which customers ...

  7. Broadcast design in cognitive radio ad hoc networks

    CERN Document Server

    Song, Yi

    2014-01-01

    This SpringerBrief investigates the special challenges of broadcast design in cognitive radio (CR) ad hoc networks. It introduces two broadcast protocols in CR ad hoc networks: a quality-of-service based broadcast protocol under blind information and a fully-distributed broadcast protocol with collision avoidance. A novel unified analytical model is also presented to analyze the performance of the broadcast protocols. This is the first book dedicated to the unique broadcast design challenges in CR ad hoc networks. The authors also discuss the recent research on the performance analysis of broa

  8. Selective epidemic broadcast algorithm to suppress broadcast storm in vehicular ad hoc networks

    Directory of Open Access Journals (Sweden)

    M. Chitra

    2018-03-01

    Full Text Available Broadcasting in Vehicular Ad Hoc Networks is the best way to spread emergency messages all over the network. With the dynamic nature of vehicular ad hoc networks, simple broadcast or flooding faces the problem called as Broadcast Storm Problem (BSP. The issue of the BSP will degrade the performance of a message broadcasting process like increased overhead, collision and dissemination delay. The paper is motivated to solve the problems in the existing Broadcast Strom Suppression Algorithms (BSSAs like p-Persistence, TLO, VSPB, G-SAB and SIR. This paper proposes to suppress the Broadcast Storm Problem and to improve the Emergency Safety message dissemination rate through a new BSSA based on Selective Epidemic Broadcast Algorithm (SEB. The simulation results clearly show that the SEB outperforms the existing algorithms in terms of ESM Delivery Ratio, Message Overhead, Collision Ratio, Broadcast Storm Ratio and Redundant Rebroadcast Ratio with decreased Dissemination Delay.

  9. Hierarchical Broadcasting in the Future Mobile Internet

    NARCIS (Netherlands)

    Hesselman, C.E.W.; Eertink, E.H.; Fernandez, Milagros; Crnkovic, Ivica; Fohler, Gerhard; Griwodz, Carsten; Plagemann, Thomas; Gruenbacher, Paul

    2002-01-01

    We describe an architecture for the hierarchical distribution of multimedia broadcasts in the future mobile Internet. The architecture supports network as well as application-layer mobility solutions, and uses stream control functions that are influenced by available network resources, user-defined

  10. Seamless Mobile Multimedia Broadcasting Using Adaptive Error Recovery

    Directory of Open Access Journals (Sweden)

    Carlos M. Lentisco

    2017-01-01

    Full Text Available Multimedia services over mobile networks present several challenges, such as ensuring a reliable delivery of multimedia content, avoiding undesired service disruptions, or reducing service latency. HTTP adaptive streaming addresses these problems for multimedia unicast services, but it is not efficient from the point of view of radio resource consumption. In Long-Term Evolution (LTE networks, multimedia broadcast services are provided over a common radio channel using a combination of forward error correction and unicast error recovery techniques at the application level. This paper discusses how to avoid service disruptions and reduce service latency for LTE multimedia broadcast services by adding dynamic adaptation capabilities to the unicast error recovery process. The proposed solution provides a seamless mobile multimedia broadcasting without compromising the quality of the service perceived by the users.

  11. Minimizing Broadcast Expenses in Clustered Ad-hoc Networks

    Directory of Open Access Journals (Sweden)

    S. Zeeshan Hussain

    2018-01-01

    Full Text Available One way to minimize the broadcast expenses of routing protocols is to cluster the network. In clustered ad-hoc networks, all resources can be managed easily by resolving scalability issues. However, blind query broadcast is a major issue that leads to the broadcast storm problem in clustered ad-hoc networks. This query broadcast is done to carry out the route-search task that leads to the unnecessary propagation of route-query even after route has been found. Hence, this query propagation poses the problem of congestion in the network. In particular this motivates us to propose a query-control technique in such networks which works based on broadcast repealing. A huge amount of work has been devoted to propose the query control broadcasting techniques. However, such techniques used in traditional broadcasting mechanisms need to be properly extended for use in the cluster based routing architecture. In this paper, query-control technique is proposed for cluster based routing technique to reduce the broadcast expenses. Finally, we report some experiments which compare the proposed technique to other commonly used techniques including standard one-class AODV that follows TTL-sequence based broadcasting technique.

  12. Mobile ad hoc networking

    CERN Document Server

    John Wiley & Sons

    2004-01-01

    "Assimilating the most up-to-date information on research and development activities in this rapidly growing area, Mobile Ad Hoc Networking covers physical, data link, network, and transport layers, as well as application, security, simulation, and power management issues in sensor, local area, personal, and mobile ad hoc networks. Each of the book's sixteen chapters has been written by a top expert and discusses in-depth the most important topics in the field. Mobile Ad Hoc Networking is an excellent reference and guide for professionals seeking an in-depth examination of topics that also provides a comprehensive overview of the current state-of-the-art."--Jacket.

  13. Adaptive Probabilistic Broadcasting over Dense Wireless Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    Victor Gau

    2010-01-01

    Full Text Available We propose an idle probability-based broadcasting method, iPro, which employs an adaptive probabilistic mechanism to improve performance of data broadcasting over dense wireless ad hoc networks. In multisource one-hop broadcast scenarios, the modeling and simulation results of the proposed iPro are shown to significantly outperform the standard IEEE 802.11 under saturated condition. Moreover, the results also show that without estimating the number of competing nodes and changing the contention window size, the performance of the proposed iPro can still approach the theoretical bound. We further apply iPro to multihop broadcasting scenarios, and the experiment results show that within the same elapsed time after the broadcasting, the proposed iPro has significantly higher Packet-Delivery Ratios (PDR than traditional methods.

  14. ADS-B- Automatic Dependent Surveillance- Broadcast

    Directory of Open Access Journals (Sweden)

    Borivoj Galović

    2002-01-01

    Full Text Available The CU/Tent system of air traffic is facing many drawbacksand problems that restrict its further development and makes itdifficult to follow the trends of increase in the traffic volume.By means of their technology, the systems such as ADS-8create rhe basis for further building, upgrading, improving anddeveloping of a completely new concept of the air traffic system.Through their functions they fully fit into and support the basicfunctions of communication, navigation and swveillancewhich form the basis of the new concept that needs to be implementedas soon as possible.

  15. System optimization for peer-to-peer multi hop video broadcasting in wireless ad hoc networks

    NARCIS (Netherlands)

    Dedeoglu, V.; Atici, C.; Salman, F.S.; Sunay, M.O.

    2008-01-01

    We consider peer-to-peer video broadcasting using cooperation among peers in an ad hoc wireless network. As opposed to the traditional single hop broadcasting, multiple hops cause an increase in broadcast video quality while creating interference and increasing transmission delay. We develop

  16. EBAA: An efficient broadcast authentication scheme for ADS-B communication based on IBS-MR

    Directory of Open Access Journals (Sweden)

    Yang Haomiao

    2014-06-01

    Full Text Available Automatic dependent surveillance-broadcast (ADS-B systems can broadcast satellite-based aircraft position, identification, etc., periodically, and are now on track to replace radar to become the backbone of next-generation air traffic management (ATM systems. However, ADS-B systems suffer severe cyber-security problems due to the broadcast-type data link and the lack of designed-in security measures. Especially, since ADS-B messages are unauthenticated, it is easy to insert fake aircraft into a system via spoofing or insertion of false messages. Unfortunately, the authentication for ADS-B messages has not yet been well studied. In this paper, based on identity-based signature with message recovery (IBS-MR, an efficient broadcast authentication scheme for ADS-B messages is proposed. The security analysis demonstrates that the scheme can achieve authenticity and integrity of ADS-B broadcast messages, as well as adaptive evolution of broadcasters’ private keys. The performance evaluation shows that the scheme is computationally efficient for typical avionics devices with limited resources. Furthermore, the scheme achieves low communication overhead since broadcast messages can be recovered from signatures, and thus it is suitable for low-bandwidth ADS-B data link.

  17. Energy-Aware Broadcasting and Multicasting in Wireless Ad Hoc Networks: A Cross-Layering Approach

    National Research Council Canada - National Science Library

    Wieselthier, Jeffrey E; Nguyen, Gam D; Ephremides, Anthony

    2004-01-01

    ...) problems, especially when energy-aware operation is required. To address the specific problem of energy-aware tree construction in wireless ad hoc networks, we have developed the Broadcast Incremental Power (BIP...

  18. Radiofrequency exposure amongst employees of mobile network operators and broadcasters

    International Nuclear Information System (INIS)

    Litchfield, Ian; Sorahan, Tom; Tongeren, Martie van

    2017-01-01

    Little is known about personal exposure to radiofrequency (RF) fields amongst employees in the telecommunications industry responsible for installing and maintaining transmitters. IARC classified RF exposure as a possible carcinogen, although evidence from occupational studies was judged to be inadequate. Hence, there is a need for improved evidence of any potentially adverse health effects amongst the workforce occupationally exposed to RF radiation. In this study, results are presented from an exposure survey using data from personal monitors used by employees in the broadcasting and telecommunication industries of the UK. These data were supplemented by spot measurements using broadband survey metres and information on daily work activities provided by employee questionnaires. The sets of real-time personal data were categorised by four types of site determined by the highest powered antenna present (high, medium or low power and ground-level sites). For measurements gathered at each type of site, the root mean square and a series of box plots were produced. Results from the daily activities diaries suggested that riggers working for radio and television broadcasters were exposed to much longer periods as compared to colleagues working for mobile operators. Combining the results from the measurements and daily activity diaries clearly demonstrate that exposures were highest for riggers working for broadcasting sites. This study demonstrates that it is feasible to carry out exposure surveys within these populations that will provide reliable estimates of exposure that can be used for epidemiological studies of occupational groups exposed to RF fields. (authors)

  19. Queueing Models for Mobile Ad Hoc Networks

    NARCIS (Netherlands)

    de Haan, Roland

    2009-01-01

    This thesis presents models for the performance analysis of a recent communication paradigm: \\emph{mobile ad hoc networking}. The objective of mobile ad hoc networking is to provide wireless connectivity between stations in a highly dynamic environment. These dynamics are driven by the mobility of

  20. Radiofrequency Exposure Amongst Employees of Mobile Network Operators and Broadcasters.

    Science.gov (United States)

    Litchfield, Ian; van Tongeren, Martie; Sorahan, Tom

    2017-06-15

    Little is known about personal exposure to radiofrequency (RF) fields amongst employees in the telecommunications industry responsible for installing and maintaining transmitters. IARC classified RF exposure as a possible carcinogen, although evidence from occupational studies was judged to be inadequate. Hence, there is a need for improved evidence of any potentially adverse health effects amongst the workforce occupationally exposed to RF radiation. In this study, results are presented from an exposure survey using data from personal monitors used by employees in the broadcasting and telecommunication industries of the UK. These data were supplemented by spot measurements using broadband survey metres and information on daily work activities provided by employee questionnaires. The sets of real-time personal data were categorised by four types of site determined by the highest powered antenna present (high, medium or low power and ground-level sites). For measurements gathered at each type of site, the root mean square and a series of box plots were produced. Results from the daily activities diaries suggested that riggers working for radio and television broadcasters were exposed to much longer periods as compared to colleagues working for mobile operators. Combining the results from the measurements and daily activity diaries clearly demonstrate that exposures were highest for riggers working for broadcasting sites. This study demonstrates that it is feasible to carry out exposure surveys within these populations that will provide reliable estimates of exposure that can be used for epidemiological studies of occupational groups exposed to RF fields. © The Author 2016. Published by Oxford University Press.

  1. Security and Hyper-accurate Positioning Monitoring with Automatic Dependent Surveillance-Broadcast (ADS-B), Phase II

    Data.gov (United States)

    National Aeronautics and Space Administration — Lightning Ridge Technologies, LLC, working in collaboration with The Innovation Laboratory, Inc., extend Automatic Dependent Surveillance -- Broadcast (ADS-B) into a...

  2. Security and Hyper-accurate Positioning Monitoring with Automatic Dependent Surveillance-Broadcast (ADS-B), Phase I

    Data.gov (United States)

    National Aeronautics and Space Administration — Lightning Ridge Technologies, working in collaboration with The Innovation Laboratory, Inc., extend Automatic Dependent Surveillance Broadcast (ADS-B) into a safe,...

  3. 76 FR 71430 - Automatic Dependent Surveillance Broadcast (ADS-B)

    Science.gov (United States)

    2011-11-17

    ... Committee (ARC) to provide a forum for the U.S. and international aviation community to define a strategy for incorporating ADS-B In technologies into the National Airspace System. The ARC specifically was.../portfolio/trans_support_progs/adsb/ Issued in Washington, DC on November 9, 2011. James Eck, Director, Air...

  4. DVB-H vs. DVB-NGH: A survey and comparison for the evolution of mobile TV broadcasting

    CSIR Research Space (South Africa)

    Bembe, M

    2015-07-01

    Full Text Available DVB-NGH (Digital Video Broadcasting-Next Generation Handheld) is the next generation technology for mobile TV broadcasting. It integrates both satellite and terrestrial techniques, which is vital in supporting rich media content for mobile handheld...

  5. Model checking mobile ad hoc networks

    NARCIS (Netherlands)

    Ghassemi, Fatemeh; Fokkink, Wan

    2016-01-01

    Modeling arbitrary connectivity changes within mobile ad hoc networks (MANETs) makes application of automated formal verification challenging. We use constrained labeled transition systems as a semantic model to represent mobility. To model check MANET protocols with respect to the underlying

  6. Energy-efficient algorithm for broadcasting in ad hoc wireless sensor networks.

    Science.gov (United States)

    Xiong, Naixue; Huang, Xingbo; Cheng, Hongju; Wan, Zheng

    2013-04-12

    Broadcasting is a common and basic operation used to support various network protocols in wireless networks. To achieve energy-efficient broadcasting is especially important for ad hoc wireless sensor networks because sensors are generally powered by batteries with limited lifetimes. Energy consumption for broadcast operations can be reduced by minimizing the number of relay nodes based on the observation that data transmission processes consume more energy than data reception processes in the sensor nodes, and how to improve the network lifetime is always an interesting issue in sensor network research. The minimum-energy broadcast problem is then equivalent to the problem of finding the minimum Connected Dominating Set (CDS) for a connected graph that is proved NP-complete. In this paper, we introduce an Efficient Minimum CDS algorithm (EMCDS) with help of a proposed ordered sequence list. EMCDS does not concern itself with node energy and broadcast operations might fail if relay nodes are out of energy. Next we have proposed a Minimum Energy-consumption Broadcast Scheme (MEBS) with a modified version of EMCDS, and aimed at providing an efficient scheduling scheme with maximized network lifetime. The simulation results show that the proposed EMCDS algorithm can find smaller CDS compared with related works, and the MEBS can help to increase the network lifetime by efficiently balancing energy among nodes in the networks.

  7. On the analysis of human mobility model for content broadcasting in 5G networks

    KAUST Repository

    Lau, Chun Pong

    2018-02-15

    Today\\'s mobile service providers aim at ensuring end-to-end performance guarantees. Hence, ensuring an efficient content delivery to end users is highly required. Currently, transmitting popular contents in modern mobile networks rely on unicast transmission. This result into a huge underutilization of the wireless bandwidth. The urban scale mobility of users is beneficial for mobile networks to allocate radio resources spatially and temporally for broadcasting contents. In this paper, we conduct a comprehensive analysis on a human activity/mobility model and the content broadcasting system in 5G mobile networks. The objective of this work is to describe how human daily activities could improve the content broadcasting efficiency. We achieve the objective by analyzing the transition probabilities of a user traveling over several places according to the change of states of daily human activities. Using a reallife simulation, we demonstrate the relationship between the human mobility and the optimization objective of the content broadcasting system.

  8. Broadcast Abstraction in a Stochastic Calculus for Mobile Networks

    DEFF Research Database (Denmark)

    Song, Lei; Godskesen, Jens Christian

    2012-01-01

    topology constraint. We allow continuous time stochastic behavior of processes running at network nodes, e.g. in order to be able to model randomized protocols. The introduction of group broadcast and an operator to help avoid flooding allows us to define a novel notion of broadcast abstraction. Finally......, we define a weak bisimulation congruence and apply our theory on an example of a leader election protocol....

  9. Evolutionary algorithms for mobile ad hoc networks

    CERN Document Server

    Dorronsoro, Bernabé; Danoy, Grégoire; Pigné, Yoann; Bouvry, Pascal

    2014-01-01

    Describes how evolutionary algorithms (EAs) can be used to identify, model, and minimize day-to-day problems that arise for researchers in optimization and mobile networking. Mobile ad hoc networks (MANETs), vehicular networks (VANETs), sensor networks (SNs), and hybrid networks—each of these require a designer’s keen sense and knowledge of evolutionary algorithms in order to help with the common issues that plague professionals involved in optimization and mobile networking. This book introduces readers to both mobile ad hoc networks and evolutionary algorithms, presenting basic concepts as well as detailed descriptions of each. It demonstrates how metaheuristics and evolutionary algorithms (EAs) can be used to help provide low-cost operations in the optimization process—allowing designers to put some “intelligence” or sophistication into the design. It also offers efficient and accurate information on dissemination algorithms topology management, and mobility models to address challenges in the ...

  10. Broadcast Scheduling Strategy Based on the Priority of Real.Time Data in a Mobile Environment

    Institute of Scientific and Technical Information of China (English)

    YangJin-cait; LiuYun-sheng

    2003-01-01

    Data broadcast is an important data dissemination approach in mobile environment. On broadcast channel,scalability and efficiency of data transmission are satisfied. In a mobile environment, there exists a kind of real-time database application in which both the transactions and data can have their timing constraints and priorities of different levels.In order to meet the requirement of real-time data disseminaring and retrieving, a broadcast scheduling strategy HPF-ED F (Highest Priority First with Earlier Deadline and Frequency) is proposed under the BoD (Broadcast on Demand) model. Using the strategy, data items are scheduled according to their priority the transaction imposed on them or system set for them. The strategy also considers other characteristics of data items such as deadline and popularity of data. The extensive simulation experiments have been conducted to evaluate the performance of the proposed algorithm. Results show that it can achieve excellent performance compared with existing strategies.

  11. Restricted broadcast process theory

    NARCIS (Netherlands)

    F. Ghassemi; W.J. Fokkink (Wan); A. Movaghar; A. Cerone; S. Gruner

    2008-01-01

    htmlabstractWe present a process algebra for modeling and reasoning about Mobile Ad hoc Networks (MANETs) and their protocols. In our algebra we model the essential modeling concepts of ad hoc networks, i.e. local broadcast, connectivity of nodes and connectivity changes. Connectivity and

  12. Bluetooth broadcasting

    OpenAIRE

    Ho, Johan

    2006-01-01

    Background: The wireless technology Bluetooth has rapidly become more commonly supported by electronic devices like mobile phones and PDAs. Several companies are currently developing Bluetooth broadcasting systems to use for marketing. This report is a result of researching the use of Bluetooth broadcasting for delivering information for more general purposes, how well Bluetooth actually works for broadcasting, and also on the topic of user privacy. Results: Broadcasting with Bluetooth did w...

  13. A Mobility-aware Broadcasting Infrastructure for a Wireless Internet with Hotspots

    NARCIS (Netherlands)

    Hesselman, C.E.W.; Eertink, Henk; Eertink, E.H.; Widya, I.A.; Huizer, E.; Kermani, P.

    In this paper, we consider the problem of adaptively delivering live multimedia broadcasts (e.g., for applications such as TV, radio, or e-cinema) to a potentially large number of mobile hosts that roam about in a wireless internet with hotspots. We take a user-oriented approach based on an

  14. Modelling Mobility in Mobile AD-HOC Network Environments ...

    African Journals Online (AJOL)

    In the simulation of mobile ad-hoc networks (MANETs), the probability distribution governing the movement of nodes typically varies over time and converges to a steady state distribution, known as the stationary distribution. This paper presents and evaluates the stationary distribution for location, speed and pause time of a ...

  15. BROSMAP: A Novel Broadcast Based Secure Mobile Agent Protocol for Distributed Service Applications

    Directory of Open Access Journals (Sweden)

    Dina Shehada

    2017-01-01

    Full Text Available Mobile agents are smart programs that migrate from one platform to another to perform the user task. Mobile agents offer flexibility and performance enhancements to systems and service real-time applications. However, security in mobile agent systems is a great concern. In this paper, we propose a novel Broadcast based Secure Mobile Agent Protocol (BROSMAP for distributed service applications that provides mutual authentication, authorization, accountability, nonrepudiation, integrity, and confidentiality. The proposed system also provides protection from man in the middle, replay, repudiation, and modification attacks. We proved the efficiency of the proposed protocol through formal verification with Scyther verification tool.

  16. Cell broadcast trials in The Netherlands: Using mobile phone technology for citizens' alarming

    International Nuclear Information System (INIS)

    Jagtman, H.M.

    2010-01-01

    In emergency situations authorities need to warn the public. The conventionally used method for warning citizens in The Netherlands is the use of a siren. Modern telecommunication technologies, especially the use of text-based features of mobile phones, have great potential for warning the public. In the years 2005-2007 cell broadcast was tested during several large-scale field trials with citizens in The Netherlands. One of the questions was to determine the penetration of cell broadcast for citizens' alarming. This article argues that the definition of penetration in the light of warning citizens in case of emergencies should include the citizens' responses to warning messages. In addition, the approach to determining the penetration, the data and validity issues regarding these data is discussed. The trials have shown cell broadcast has potential to become an effective citizens' alarming technology. This however requires the entire technological and organisational chain of the warning system to function correctly. Attention is required to network management, handset improvements and correct communication to the public about the conditions under which a cell broadcast message can be received. The latter includes managing realistic expectations including circumstances in which cell broadcast will not reach a citizen.

  17. An algorithm for generating data accessibility recommendations for flight deck Automatic Dependent Surveillance-Broadcast (ADS-B) applications

    Science.gov (United States)

    2014-09-09

    Automatic Dependent Surveillance-Broadcast (ADS-B) In technology supports the display of traffic data on Cockpit Displays of Traffic Information (CDTIs). The data are used by flightcrews to perform defined self-separation procedures, such as the in-t...

  18. Broadcast Scheduling Strategy Based on the Priority of Real- Time Data in a Mobile Environment

    Institute of Scientific and Technical Information of China (English)

    Yang Jin-cai; Liu Yun-sheng

    2003-01-01

    Data broadcast is an important data dissemina-tion approach in mobile environment. On broadcast channel,scalability and efficiency of data transmission are satisfied. In a mobile environment, there exists a kind of real-time data-base application in which both the transactions and data can have their timing constraints and priorities of different levels.In order to meet the requirement of real-time data dissemina-ting and retrieving, a broadcast scheduling strategy HPF-ED F(Highest Priority First with Earlier Deadline and Frequen-cy) is proposed under the BoD (Broadcast on Demand) mod-el. Using the strategy, data items are scheduled according to their priority the transaction imposed on them or system set for them. The strategy also considers other characteristics ofdata items such as deadline and popularity of data. The exten-sive simulation experiments have been conducted to evaluate the performance of the proposed algorithm. Results show that it can achieve excellent performance compared with existing strategies.

  19. Spontaneous ad hoc mobile cloud computing network.

    Science.gov (United States)

    Lacuesta, Raquel; Lloret, Jaime; Sendra, Sandra; Peñalver, Lourdes

    2014-01-01

    Cloud computing helps users and companies to share computing resources instead of having local servers or personal devices to handle the applications. Smart devices are becoming one of the main information processing devices. Their computing features are reaching levels that let them create a mobile cloud computing network. But sometimes they are not able to create it and collaborate actively in the cloud because it is difficult for them to build easily a spontaneous network and configure its parameters. For this reason, in this paper, we are going to present the design and deployment of a spontaneous ad hoc mobile cloud computing network. In order to perform it, we have developed a trusted algorithm that is able to manage the activity of the nodes when they join and leave the network. The paper shows the network procedures and classes that have been designed. Our simulation results using Castalia show that our proposal presents a good efficiency and network performance even by using high number of nodes.

  20. Secrecy in Mobile Ad-hoc Networks

    DEFF Research Database (Denmark)

    Hüttel, Hans; Rafnsson, Willard

    2008-01-01

    We propose a framework for automated verification of secrecy properties of MANET protocols, consisting of a formal language and a proven sound verifi- cation technique which can be automated. We start off by presenting the dis- tributed applied pi calculus with broadcast (DAπβ ), whereafter we summ...

  1. An efficient and reliable multi-hop geographical broadcast protocol in vehicular ad-hoc networks

    NARCIS (Netherlands)

    Rajendran, R.; Jongh, J. de

    2013-01-01

    In Intelligent Transportation Systems (ITS), disseminating warning messages in a timely and efficient way through wireless short-range communications can save many lives and reduce traffic congestion. A geographical broadcast protocol provides data delivery to specified geographical areas, using

  2. Dynamic Mobile IP routers in ad hoc networks

    NARCIS (Netherlands)

    Kock, B.A.; Schmidt, J.R.

    2005-01-01

    This paper describes a concept combining mobile IP and ad hoc routing to create a robust mobile network. In this network all nodes are mobile and globally and locally reachable under the same IP address. Essential for implementing this network are the dynamic mobile IP routers. They act as gateways

  3. Internet-Based Mobile Ad Hoc Networking (Preprint)

    National Research Council Canada - National Science Library

    Corson, M. S; Macker, Joseph P; Cirincione, Gregory H

    1999-01-01

    Internet-based Mobile Ad Hoc Networking is an emerging technology that supports self-organizing, mobile networking infrastructures, and is one which appears well-suited for use in future commercial...

  4. Ad hoc mobile wireless networks principles, protocols, and applications

    CERN Document Server

    Sarkar, Subir Kumar

    2013-01-01

    The military, the research community, emergency services, and industrial environments all rely on ad hoc mobile wireless networks because of their simple infrastructure and minimal central administration. Now in its second edition, Ad Hoc Mobile Wireless Networks: Principles, Protocols, and Applications explains the concepts, mechanism, design, and performance of these highly valued systems. Following an overview of wireless network fundamentals, the book explores MAC layer, routing, multicast, and transport layer protocols for ad hoc mobile wireless networks. Next, it examines quality of serv

  5. Capacity of wireless ad-hoc broadcast networks under realistic channel models

    NARCIS (Netherlands)

    Atici, C.; Sunay, M.O.

    2009-01-01

    In a wireless broadcasting scenario, some of the nodes can help the source node by forwarding the received information. Due to the interference from multiple transmissions, selection of these nodes directly affects the performance of the system under a given total power and hop constraint. In this

  6. Ad hoc mobile wireless networks principles, protocols and applications

    CERN Document Server

    Sarkar, Subir Kumar; Puttamadappa, C

    2007-01-01

    Ad hoc mobile wireless networks have seen increased adaptation in a variety of disciplines because they can be deployed with simple infrastructures and virtually no central administration. In particular, the development of ad hoc wireless and sensor networks provides tremendous opportunities in areas including disaster recovery, defense, health care, and industrial environments. Ad Hoc Mobile Wireless Networks: Principles, Protocols and Applications explains the concepts, mechanisms, design, and performance of these systems. It presents in-depth explanations of the latest wireless technologies

  7. Building Realistic Mobility Models for Mobile Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    Adrian Pullin

    2018-04-01

    Full Text Available A mobile ad hoc network (MANET is a self-configuring wireless network in which each node could act as a router, as well as a data source or sink. Its application areas include battlefields and vehicular and disaster areas. Many techniques applied to infrastructure-based networks are less effective in MANETs, with routing being a particular challenge. This paper presents a rigorous study into simulation techniques for evaluating routing solutions for MANETs with the aim of producing more realistic simulation models and thereby, more accurate protocol evaluations. MANET simulations require models that reflect the world in which the MANET is to operate. Much of the published research uses movement models, such as the random waypoint (RWP model, with arbitrary world sizes and node counts. This paper presents a technique for developing more realistic simulation models to test and evaluate MANET protocols. The technique is animation, which is applied to a realistic scenario to produce a model that accurately reflects the size and shape of the world, node count, movement patterns, and time period over which the MANET may operate. The animation technique has been used to develop a battlefield model based on established military tactics. Trace data has been used to build a model of maritime movements in the Irish Sea. Similar world models have been built using the random waypoint movement model for comparison. All models have been built using the ns-2 simulator. These models have been used to compare the performance of three routing protocols: dynamic source routing (DSR, destination-sequenced distance-vector routing (DSDV, and ad hoc n-demand distance vector routing (AODV. The findings reveal that protocol performance is dependent on the model used. In particular, it is shown that RWP models do not reflect the performance of these protocols under realistic circumstances, and protocol selection is subject to the scenario to which it is applied. To

  8. Source Authentication for Multicast in Mobile Ad Hoc Networks

    National Research Council Canada - National Science Library

    Ramachandran, Prabha

    2003-01-01

    Recent emergence and popularity of mobile ad hoc networks in a host of current-day applications has instigated a suite of research challenges, primarily in routing and security issues for such networks...

  9. Value Added Services and Adoption of Mobile Payments

    DEFF Research Database (Denmark)

    Augsburg, Christel; Hedman, Jonas

    2014-01-01

    In this paper, we investigate the role of Value Added Services (VAS) in consumers’ adoption of mobile payments. VAS are supplementary digital services offered in connection with mobile payments; in this study exemplified by receipts, loyalty cards, and coupons. A research model is derived from...... that intention to adopt mobile payments increases as VAS are introduced and that this increase comes from a positive change in Perceived Usefulness, compatibility, and Convenience....

  10. Small Delay and High Performance AD/DA Converters of Lease Circuit System for AM&FM Broadcast

    Science.gov (United States)

    Takato, Kenji; Suzuki, Dai; Ishii, Takashi; Kobayashi, Masato; Yamada, Hirokazu; Amano, Shigeru

    Many AM&FM broadcasting stations in Japan are connected by the leased circuit system of NTT. Small delay and high performance AD/DA converter was developed for the system. The system was designed based on ITU-T J.41 Recommendation (384kbps), the transmission signal is 11bit-32 kHz where the Gain-frequency characteristics between 40Hz to 15kHz have to be quite flat. The ΔΣAD/DA converter LSIs for audio application in the market today realize very high performance. However the performance is not enough for the leased circuit system. We found that it is not possible to meet the delay and Gain-frequency requirements only by using ΔΣAD/DA converter LSI in normal operation, because 15kHz the highest frequency and 16kHz Nyquist frequency are too close, therefore there are aliasing around Nyquist frequency. In this paper, we designed AD/DA architecture having small delay (1msec) and sharp cut off LPF (100dB attenuation at 16kHz, and 1500dB/Oct from 15kHz to 16kHz) by operating ΔΣAD/DA converter LSIs over-sampling rate such as 128kHz and by adding custom LPF designed Infinite Impulse Response (IIR) filter. The IIR filter is a 16th order elliptic type and it is consist of eight biquad filters in series. We described how to evaluate the stability of IIR filter theoretically by calculating frequency response, Pole and Zero Layout and impulse response of each biquad filter, and experimentally by adding overflow detection circuit on each filters and input overlord signal.

  11. Mobile agents affect worm spreading in wireless ad hoc networks

    International Nuclear Information System (INIS)

    Huang, Zi-Gang; Sun, Jin-Tu; Wang, Ying-Hai; Wang, Sheng-Jun; Xu, Xin-Jian

    2009-01-01

    Considering the dynamic nature of portable computing devices with wireless communication capability, an extended model is introduced for worm spreading in the wireless ad hoc network, with a population of mobile agents in a planar distribution, starting from an initial infected seed. The effect of agents' mobility on worm spreading is investigated via extensive Monte Carlo simulations. The threshold behavior and the dynamics of worm epidemics in the wireless networks are greatly affected by both agents' mobility and spatial and temporal correlations. The medium access control mechanism for the wireless communication promotes the sensitivity of the spreading dynamics to agents' mobility

  12. Faraday rotation of Automatic Dependent Surveillance Broadcast (ADS-B) signals as a method of ionospheric characterization

    Science.gov (United States)

    Cushley, A. C.; Kabin, K.; Noel, J. M. A.

    2017-12-01

    Radio waves propagating through plasma in the Earth's ambient magnetic field experience Faraday rotation; the plane of the electric field of a linearly polarized wave changes as a function of the distance travelled through a plasma. Linearly polarized radio waves at 1090 MHz frequency are emitted by Automatic Dependent Surveillance Broadcast (ADS-B) devices which are installed on most commercial aircraft. These radio waves can be detected by satellites in low earth orbits, and the change of the polarization angle caused by propagation through the terrestrial ionosphere can be measured. In this work we discuss how these measurements can be used to characterize the ionospheric conditions. In the present study, we compute the amount of Faraday rotation from a prescribed total electron content value and two of the profile parameters of the NeQuick model.

  13. Faraday Rotation of Automatic Dependent Surveillance-Broadcast (ADS-B) Signals as a Method of Ionospheric Characterization

    Science.gov (United States)

    Cushley, A. C.; Kabin, K.; Noël, J.-M.

    2017-10-01

    Radio waves propagating through plasma in the Earth's ambient magnetic field experience Faraday rotation; the plane of the electric field of a linearly polarized wave changes as a function of the distance travelled through a plasma. Linearly polarized radio waves at 1090 MHz frequency are emitted by Automatic Dependent Surveillance Broadcast (ADS-B) devices that are installed on most commercial aircraft. These radio waves can be detected by satellites in low Earth orbits, and the change of the polarization angle caused by propagation through the terrestrial ionosphere can be measured. In this manuscript we discuss how these measurements can be used to characterize the ionospheric conditions. In the present study, we compute the amount of Faraday rotation from a prescribed total electron content value and two of the profile parameters of the NeQuick ionospheric model.

  14. A Clustering Routing Protocol for Mobile Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    Jinke Huang

    2016-01-01

    Full Text Available The dynamic topology of a mobile ad hoc network poses a real challenge in the design of hierarchical routing protocol, which combines proactive with reactive routing protocols and takes advantages of both. And as an essential technique of hierarchical routing protocol, clustering of nodes provides an efficient method of establishing a hierarchical structure in mobile ad hoc networks. In this paper, we designed a novel clustering algorithm and a corresponding hierarchical routing protocol for large-scale mobile ad hoc networks. Each cluster is composed of a cluster head, several cluster gateway nodes, several cluster guest nodes, and other cluster members. The proposed routing protocol uses proactive protocol between nodes within individual clusters and reactive protocol between clusters. Simulation results show that the proposed clustering algorithm and hierarchical routing protocol provide superior performance with several advantages over existing clustering algorithm and routing protocol, respectively.

  15. Auto-configuration protocols in mobile ad hoc networks.

    Science.gov (United States)

    Villalba, Luis Javier García; Matesanz, Julián García; Orozco, Ana Lucila Sandoval; Díaz, José Duván Márquez

    2011-01-01

    The TCP/IP protocol allows the different nodes in a network to communicate by associating a different IP address to each node. In wired or wireless networks with infrastructure, we have a server or node acting as such which correctly assigns IP addresses, but in mobile ad hoc networks there is no such centralized entity capable of carrying out this function. Therefore, a protocol is needed to perform the network configuration automatically and in a dynamic way, which will use all nodes in the network (or part thereof) as if they were servers that manage IP addresses. This article reviews the major proposed auto-configuration protocols for mobile ad hoc networks, with particular emphasis on one of the most recent: D2HCP. This work also includes a comparison of auto-configuration protocols for mobile ad hoc networks by specifying the most relevant metrics, such as a guarantee of uniqueness, overhead, latency, dependency on the routing protocol and uniformity.

  16. Information Sharing Modalities for Mobile Ad-Hoc Networks

    Science.gov (United States)

    de Spindler, Alexandre; Grossniklaus, Michael; Lins, Christoph; Norrie, Moira C.

    Current mobile phone technologies have fostered the emergence of a new generation of mobile applications. Such applications allow users to interact and share information opportunistically when their mobile devices are in physical proximity or close to fixed installations. It has been shown how mobile applications such as collaborative filtering and location-based services can take advantage of ad-hoc connectivity to use physical proximity as a filter mechanism inherent to the application logic. We discuss the different modes of information sharing that arise in such settings based on the models of persistence and synchronisation. We present a platform that supports the development of applications that can exploit these modes of ad-hoc information sharing and, by means of an example, show how such an application can be realised based on the supported event model.

  17. Integrated data lookup and replication scheme in mobile ad hoc networks

    Science.gov (United States)

    Chen, Kai; Nahrstedt, Klara

    2001-11-01

    Accessing remote data is a challenging task in mobile ad hoc networks. Two problems have to be solved: (1) how to learn about available data in the network; and (2) how to access desired data even when the original copy of the data is unreachable. In this paper, we develop an integrated data lookup and replication scheme to solve these problems. In our scheme, a group of mobile nodes collectively host a set of data to improve data accessibility for all members of the group. They exchange data availability information by broadcasting advertising (ad) messages to the group using an adaptive sending rate policy. The ad messages are used by other nodes to derive a local data lookup table, and to reduce data redundancy within a connected group. Our data replication scheme predicts group partitioning based on each node's current location and movement patterns, and replicates data to other partitions before partitioning occurs. Our simulations show that data availability information can quickly propagate throughout the network, and that the successful data access ratio of each node is significantly improved.

  18. Probabilistic Modelling of Information Propagation in Wireless Mobile Ad-Hoc Network

    DEFF Research Database (Denmark)

    Schiøler, Henrik; Hansen, Martin Bøgsted; Schwefel, Hans-Peter

    2005-01-01

    In this paper the dynamics of broadcasting wireless ad-hoc networks is studied through probabilistic modelling. A randomized transmission discipline is assumed in accordance with existing MAC definitions such as WLAN with Decentralized Coordination or IEEE-802.15.4. Message reception is assumed...... to be governed by node power-down policies and is equivalently assumed to be randomized. Altogether randomization facilitates a probabilistic model in the shape of an integro-differential equation governing the propagation of information, where brownian node mobility may be accounted for by including an extra...... diffusion term. The established model is analyzed for transient behaviour and a travelling wave solution facilitates expressions for propagation speed as well as parametrized analysis of network reliability and node power consumption. Applications of the developed models for node localization and network...

  19. The Viability of Mobile Services (SMS and Cell Broadcast in Emergency Management Solutions: An Exploratory Study

    Directory of Open Access Journals (Sweden)

    Mahmoud Al-dalahmeh

    2018-01-01

    Full Text Available In this paper the path forward in location-based mobile phone warning systems is given against a concise backdrop of their deployment worldwide. Of relevance here is (i how the systems are implemented using legislation, contractual service level agreement instruments or a hybrid approach, (ii whether or not governments who deploy these systems will carry the cost of the deployment during an emergency or disaster, and (iii whether or not carrier participation is mandated. Of particular importance are also the underlying technologies of this kind of emergency systems. To date, the short message service and cell broadcast service have been the main technologies to be utilised by governments in the application of location-based services in modern emergency management solutions. However, these technologies will most certainly be superseded by newer, more powerful capabilities. A comprehensive list of requirements for the future location-based emergency systems is presented also in this paper. In essence, these are recommendations to be adhered to if robust solutions using new technologies are to be deployed in a nation state.

  20. Verification of mobile ad hoc networks : an algebraic approach

    NARCIS (Netherlands)

    Ghassemi, F.; Fokkink, W.J.; Movaghar, A.

    2011-01-01

    We introduced Computed Network Process Theory to reason about protocols for mobile ad hoc networks (MANETs). Here we explore the applicability of our framework in two regards: model checking and equational reasoning. The operational semantics of our framework is based on constrained labeled

  1. ON SECURE FULL DUPLEX COMMUNICATION IN MOBILE AD HOC NETWORK

    OpenAIRE

    S. C. Dutta; Sudha Singh; D. K. Singh

    2013-01-01

    This paper is to establish Ad Hoc network in mobile phones and start fully secured full duplex communication in any situation. This type of communication will be cost effective and it will be fastest way of communication in case of any server failure or server error.

  2. Collaboration Layer for Robots in Mobile Ad-hoc Networks

    DEFF Research Database (Denmark)

    Borch, Ole; Madsen, Per Printz; Broberg, Jacob Honor´e

    2009-01-01

    In many applications multiple robots in Mobile Ad-hoc Networks are required to collaborate in order to solve a task. This paper shows by proof of concept that a Collaboration Layer can be modelled and designed to handle the collaborative communication, which enables robots in small to medium size...

  3. Capacity, delay and mobility in wireless ad-hoc networks

    NARCIS (Netherlands)

    Bansal, N.; Liu, Z.

    2003-01-01

    Network throughput and packet delay are two important parameters in the design and the evaluation of routing protocols for ad-hoc networks. While mobility has been shown to increase the capacity of a network, it is not clear whether the delay can be kept low without trading off the throughput. We

  4. On the Performance of Counter-Based Broadcast Scheme for Mobile ...

    African Journals Online (AJOL)

    Despite its simplicity, it can result in high redundant retransmission, contention and collision, a phenomenon collectively referred to as the broadcast storm problem. Counter-based broadcast scheme has been proposed to mitigate this inherent problem and it relies on counter threshold value for rebroadcast decision. Thus ...

  5. What Makes Consumers Recall Banner Ads in Mobile Applications

    Directory of Open Access Journals (Sweden)

    Mesut Çiçek

    2017-09-01

    Full Text Available The uses of mobile advertisements are increasing their popularity across the world. Companies can gather information about the mobile users based on their locations, lifestyle, and preferences via GPS, cookies and browsing history and embed highly personalized banner ads in mobile applications. However, in the literature there is hardly any work on the effectiveness of these highly personalized in-app banner ads. The aim of the study is to reveal which factors affect the effectiveness of in-app banner ads. An experimental study was designed and 209 subjects participated. The results of Ordinal Logistic Regression indicated that prior brand attitude and attitude towards application have a positive effect, while brand engagement with self-concept has a negative effect on the recall of in-app banner ads. Moreover, in-app banner ads are recalled more when they are located in landscape applications and positioned at the top part of the screen. This research provides some implications for future studies and practitioners.

  6. Innovative research of AD HOC network mobility model

    Science.gov (United States)

    Chen, Xin

    2017-08-01

    It is difficult for researchers of AD HOC network to conduct actual deployment during experimental stage as the network topology is changeable and location of nodes is unfixed. Thus simulation still remains the main research method of the network. Mobility model is an important component of AD HOC network simulation. It is used to describe the movement pattern of nodes in AD HOC network (including location and velocity, etc.) and decides the movement trail of nodes, playing as the abstraction of the movement modes of nodes. Therefore, mobility model which simulates node movement is an important foundation for simulation research. In AD HOC network research, mobility model shall reflect the movement law of nodes as truly as possible. In this paper, node generally refers to the wireless equipment people carry. The main research contents include how nodes avoid obstacles during movement process and the impacts of obstacles on the mutual relation among nodes, based on which a Node Self Avoiding Obstacle, i.e. NASO model is established in AD HOC network.

  7. Routing Protocol for Mobile Ad-hoc Wireless Networks

    Directory of Open Access Journals (Sweden)

    I. M. B. Nogales

    2007-09-01

    Full Text Available Bluetooth is a cutting-edge technology used for implementing wireless ad hoc networks. In order to provide an overall scheme for mobile ad hoc networks, this paper deals with scatternet topology formation and routing algorithm to form larger ad hoc wireless Networks. Scatternet topology starts by forming a robust network, which is less susceptible to the problems posed by node mobility. Mobile topology relies on the presence of free nodes that create multiple connections with the network and on their subsequently rejoining the network. Our routing protocol is a proactive routing protocol, which is tailor made for the Bluetooth ad hoc network. The connection establishment connects nodes in a structure that simplifies packet routing and scheduling. The design allows nodes to arrive and leave arbitrarily, incrementally building the topology and healing partitions when they occur. We present simulation results that show that the algorithm presents low formation latency and also generates an efficient topology for forwarding packets along ad-hoc wireless networks.

  8. Scenarios and business models for mobile network operators utilizing the hybrid use concept of the UHF broadcasting spectrum

    Directory of Open Access Journals (Sweden)

    S. Yrjölä

    2016-09-01

    Full Text Available This paper explores and presents scenarios and business models for mobile network operators (MNOs in the novel hybrid use spectrum sharing concept of the Ultra High Frequency broadcasting spectrum (470-790 MHz used for Digital Terrestrial TV (DTT and Mobile Broadband (MBB. More flexible use of the band could lead to higher efficiency in delivering fast growing and converging MBB, media and TV content to meet changing consumer needs. On one hand, this could be beneficial for broadcasters (BC, e.g., by preserving the spectrum, by providing additional revenues, or by lowering cost of the spectrum and, on the other hand, for MNOs to gain faster access to new potentially lower cost, licensed, below 1GHz spectrum to cope with booming data traffic. As a collaborative benefit, the concept opens up new business opportunities for delivering TV and media content using MBB network with means to introduce this flexibly. This paper highlights the importance of developing sound business models for the new spectrum use concept, as they need to provide clear benefits to the key stakeholders to be adopted in real life. The paper applies a future and action oriented approach to the MBB using the concept to derive scenarios and business models for MNOs for accessing hybrid UHF bands. In order to address the convergence and transformation coming with the concept, business models are first developed for the current situation with separate exclusive spectrum bands. Novel business scenarios are then developed for the introduction of the new flexible hybrid UHF spectrum concept. The created business model indicates that the MNOs could benefit significantly from the new UHF bands, which would enable them to cope with increasing data traffic asymmetry, and to offer differentiation through personalized broadcasting and new media services. Moreover, it could significantly re-shape the business ecosystem around both the broadcasting and the mobile broadband by introducing

  9. Securing DSR with mobile agents in wireless ad hoc networks

    Directory of Open Access Journals (Sweden)

    Ahmed Abosamra

    2011-03-01

    Full Text Available Ad hoc wireless network consists of a set of wireless nodes communicating with each other without a pre-defined infrastructure. They communicate by forwarding packets which can reach wireless nodes that do not exist in the range of the direct radio transmission. Designing ad hoc network routing protocols is a challenging task because of its decentralized infrastructure which makes securing ad hoc networks more and more challenging. Dynamic Source Routing (DSR protocol is a popular routing protocol designed for use in wireless ad hoc networks. Mobile agent is a promising technology used in diverse fields of network applications. In this paper, we try to implement DSR using mobile agents for securing this type of wireless network. Hybrid encryption technique (symmetric key encryption/public key encryption is used to improve performance; where symmetric keys are used to encrypt routing data to authenticate and authorize node sending data, while, public keys are used for the exchange of symmetric keys between nodes. We found that DSR may be secured using mobile agents with competitive performance.

  10. Analysis of Pervasive Mobile Ad Hoc Routing Protocols

    Science.gov (United States)

    Qadri, Nadia N.; Liotta, Antonio

    Mobile ad hoc networks (MANETs) are a fundamental element of pervasive networks and therefore, of pervasive systems that truly support pervasive computing, where user can communicate anywhere, anytime and on-the-fly. In fact, future advances in pervasive computing rely on advancements in mobile communication, which includes both infrastructure-based wireless networks and non-infrastructure-based MANETs. MANETs introduce a new communication paradigm, which does not require a fixed infrastructure - they rely on wireless terminals for routing and transport services. Due to highly dynamic topology, absence of established infrastructure for centralized administration, bandwidth constrained wireless links, and limited resources in MANETs, it is challenging to design an efficient and reliable routing protocol. This chapter reviews the key studies carried out so far on the performance of mobile ad hoc routing protocols. We discuss performance issues and metrics required for the evaluation of ad hoc routing protocols. This leads to a survey of existing work, which captures the performance of ad hoc routing algorithms and their behaviour from different perspectives and highlights avenues for future research.

  11. Enhancing On-Demand Multicast Routing Protocols using Mobility Prediction in Mobile Ad-hoc Network

    Directory of Open Access Journals (Sweden)

    Nermin Makhlouf

    2014-08-01

    Full Text Available A Mobile Ad hoc Network (MANET is a self-organizing wireless communication network in which mobile devices are based on no infrastructure like base stations or access points. Minimal configuration and quick deployment make ad hoc networks suitable for emergency situations like disaster recovery or military conflict. Since node mobility may cause links to be broken frequently, a very important issue for routing in MANETs is how to set reliable paths which can last as long as possible. To solve this problem, non-random behaviors for the mobility patterns that mobile users exhibit are exploited. This paper introduces a scheme to improve On-Demand Multicast Routing Protocol (ODMRP performances by using mobility prediction. 

  12. Status of women in Nigerian broadcasting media: a case for representation and upward mobility.

    Science.gov (United States)

    Pate, U A

    1994-06-01

    Questionnaires completed by 45 female employees from 8 broadcast stations in Nigeria revealed that, despite some growth in female employment in areas such as programming, the status of women in this sector reproduces women's subordinate status in the broader society. For every 1 woman employed in the state radio stations and state and federal television stations represented in the survey, there were 7 male employees. Although the 3 states covered have an aggregate population of 4.3 million women, only 231 represent them in broadcasting. Moreover, female journalists are concentrated in the lowest status positions and tend to be relegated to coverage of women's and social issues rather than news and current affairs. Respondents cited the following factors as responsible for the low representation of women in broadcasting: cultural factors (20 respondents), a late start (15), male chauvinism (5), and a lack of dedication (5). At the same time, 40 of the 45 respondents indicated they believed women have equal opportunities to men in the broadcast media, given ability and perseverance, and 35 ranked the prospects for the next generation of female journalists as wide open. Greater visibility of female broadcasters in the higher ranks of the industry and in news-oriented reporting positions is essential to undercut stereotypes of women as wives and mothers only. Urged is a conscious effort on the part of the Nigerian broadcasting industry to attract more women to the field and provide them with the training needed to career advancement.

  13. A framework for reactive optimization in mobile ad hoc networks

    DEFF Research Database (Denmark)

    McClary, Dan; Syrotiuk, Violet; Kulahci, Murat

    2008-01-01

    We present a framework to optimize the performance of a mobile ad hoc network over a wide range of operating conditions. It includes screening experiments to quantify the parameters and interactions among parameters influential to throughput. Profile-driven regression is applied to obtain a model....... The predictive accuracy of the model is monitored and used to update the model dynamically. The results indicate the framework may be useful for the optimization of dynamic systems of high dimension....

  14. Power control algorithms for mobile ad hoc networks

    Directory of Open Access Journals (Sweden)

    Nuraj L. Pradhan

    2011-07-01

    We will also focus on an adaptive distributed power management (DISPOW algorithm as an example of the multi-parameter optimization approach which manages the transmit power of nodes in a wireless ad hoc network to preserve network connectivity and cooperatively reduce interference. We will show that the algorithm in a distributed manner builds a unique stable network topology tailored to its surrounding node density and propagation environment over random topologies in a dynamic mobile wireless channel.

  15. A Survey on Trust Management for Mobile Ad Hoc Networks

    Science.gov (United States)

    2011-11-01

    expects, trust is dangerous implying the possible betrayal of trust. In his comments on Lagerspetz’s book titled Trust: The Tacit Demand, Lahno [24...AODV Zouridaki et al. (2005 ) [79] (2006) [80] Secure routing Direct observation [79][80] Reputation by secondhand information [80] Packet dropping...areas of signal processing, wireless communications, sensor and mobile ad hoc networks. He is co-editor of the book Wireless Sensor Networks: Signal

  16. Auto-Configuration Protocols in Mobile Ad Hoc Networks

    Science.gov (United States)

    Villalba, Luis Javier García; Matesanz, Julián García; Orozco, Ana Lucila Sandoval; Díaz, José Duván Márquez

    2011-01-01

    The TCP/IP protocol allows the different nodes in a network to communicate by associating a different IP address to each node. In wired or wireless networks with infrastructure, we have a server or node acting as such which correctly assigns IP addresses, but in mobile ad hoc networks there is no such centralized entity capable of carrying out this function. Therefore, a protocol is needed to perform the network configuration automatically and in a dynamic way, which will use all nodes in the network (or part thereof) as if they were servers that manage IP addresses. This article reviews the major proposed auto-configuration protocols for mobile ad hoc networks, with particular emphasis on one of the most recent: D2HCP. This work also includes a comparison of auto-configuration protocols for mobile ad hoc networks by specifying the most relevant metrics, such as a guarantee of uniqueness, overhead, latency, dependency on the routing protocol and uniformity. PMID:22163814

  17. Classification and Evaluation of Mobility Metrics for Mobility Model Movement Patterns in Mobile Ad-Hoc Networks

    OpenAIRE

    Santosh Kumar S C Sharma Bhupendra Suman

    2011-01-01

    A mobile ad hoc network is collection of self configuring and adaption of wireless link between communicating devices (mobile devices) to form an arbitrary topology and multihop wireless connectivity without the use of existing infrastructure. It requires efficient dynamic routing protocol to determine the routes subsequent to a set of rules that enables two or more devices to communicate with each others. This paper basically classifies and evaluates the mobility metrics into two categories-...

  18. Power-Aware Intrusion Detection in Mobile Ad Hoc Networks

    Science.gov (United States)

    Şen, Sevil; Clark, John A.; Tapiador, Juan E.

    Mobile ad hoc networks (MANETs) are a highly promising new form of networking. However they are more vulnerable to attacks than wired networks. In addition, conventional intrusion detection systems (IDS) are ineffective and inefficient for highly dynamic and resource-constrained environments. Achieving an effective operational MANET requires tradeoffs to be made between functional and non-functional criteria. In this paper we show how Genetic Programming (GP) together with a Multi-Objective Evolutionary Algorithm (MOEA) can be used to synthesise intrusion detection programs that make optimal tradeoffs between security criteria and the power they consume.

  19. Receiver-Based Ad Hoc On Demand Multipath Routing Protocol for Mobile Ad Hoc Networks.

    Science.gov (United States)

    Al-Nahari, Abdulaziz; Mohamad, Mohd Murtadha

    2016-01-01

    Decreasing the route rediscovery time process in reactive routing protocols is challenging in mobile ad hoc networks. Links between nodes are continuously established and broken because of the characteristics of the network. Finding multiple routes to increase the reliability is also important but requires a fast update, especially in high traffic load and high mobility where paths can be broken as well. The sender node keeps re-establishing path discovery to find new paths, which makes for long time delay. In this paper we propose an improved multipath routing protocol, called Receiver-based ad hoc on demand multipath routing protocol (RB-AOMDV), which takes advantage of the reliability of the state of the art ad hoc on demand multipath distance vector (AOMDV) protocol with less re-established discovery time. The receiver node assumes the role of discovering paths when finding data packets that have not been received after a period of time. Simulation results show the delay and delivery ratio performances are improved compared with AOMDV.

  20. Autonomous Power Control MAC Protocol for Mobile Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    2006-01-01

    Full Text Available Battery energy limitation has become a performance bottleneck for mobile ad hoc networks. IEEE 802.11 has been adopted as the current standard MAC protocol for ad hoc networks. However, it was developed without considering energy efficiency. To solve this problem, many modifications on IEEE 802.11 to incorporate power control have been proposed in the literature. The main idea of these power control schemes is to use a maximum possible power level for transmitting RTS/CTS and the lowest acceptable power for sending DATA/ACK. However, these schemes may degrade network throughput and reduce the overall energy efficiency of the network. This paper proposes autonomous power control MAC protocol (APCMP, which allows mobile nodes dynamically adjusting power level for transmitting DATA/ACK according to the distances between the transmitter and its neighbors. In addition, the power level for transmitting RTS/CTS is also adjustable according to the power level for DATA/ACK packets. In this paper, the performance of APCMP protocol is evaluated by simulation and is compared with that of other protocols.

  1. 76 FR 22160 - Fifty-Fourth Meeting: RTCA Special Committee 186: Automatic Dependent Surveillance-Broadcast (ADS-B)

    Science.gov (United States)

    2011-04-20

    ... Rooms, 1828 L Street, NW., Suite 805, Washington, DC 20036. FOR FURTHER INFORMATION CONTACT: RTCA Secretariat, 1828 L Street, NW., Suite 805, Washington, DC, 20036, (202) 833-9339; fax (202) 833-9434; Web.... 035-11/SC186-307 FAA Surveillance and Broadcast Services (SBS) Program Status Traffic Situation...

  2. Digital broadcasting

    International Nuclear Information System (INIS)

    Park, Ji Hyeong

    1999-06-01

    This book contains twelve chapters, which deals with digitization of broadcast signal such as digital open, digitization of video signal and sound signal digitization of broadcasting equipment like DTPP and digital VTR, digitization of equipment to transmit such as digital STL, digital FPU and digital SNG, digitization of transmit about digital TV transmit and radio transmit, digital broadcasting system on necessity and advantage, digital broadcasting system abroad and Korea, digital broadcasting of outline, advantage of digital TV, ripple effect of digital broadcasting and consideration of digital broadcasting, ground wave digital broadcasting of DVB-T in Europe DTV in U.S.A and ISDB-T in Japan, HDTV broadcasting, satellite broadcasting, digital TV broadcasting in Korea, digital radio broadcasting and new broadcasting service.

  3. A Family of ACO Routing Protocols for Mobile Ad Hoc Networks

    Science.gov (United States)

    Rupérez Cañas, Delfín; Sandoval Orozco, Ana Lucila; García Villalba, Luis Javier; Kim, Tai-hoon

    2017-01-01

    In this work, an ACO routing protocol for mobile ad hoc networks based on AntHocNet is specified. As its predecessor, this new protocol, called AntOR, is hybrid in the sense that it contains elements from both reactive and proactive routing. Specifically, it combines a reactive route setup process with a proactive route maintenance and improvement process. Key aspects of the AntOR protocol are the disjoint-link and disjoint-node routes, separation between the regular pheromone and the virtual pheromone in the diffusion process and the exploration of routes, taking into consideration the number of hops in the best routes. In this work, a family of ACO routing protocols based on AntOR is also specified. These protocols are based on protocol successive refinements. In this work, we also present a parallelized version of AntOR that we call PAntOR. Using programming multiprocessor architectures based on the shared memory protocol, PAntOR allows running tasks in parallel using threads. This parallelization is applicable in the route setup phase, route local repair process and link failure notification. In addition, a variant of PAntOR that consists of having more than one interface, which we call PAntOR-MI (PAntOR-Multiple Interface), is specified. This approach parallelizes the sending of broadcast messages by interface through threads. PMID:28531159

  4. A Family of ACO Routing Protocols for Mobile Ad Hoc Networks.

    Science.gov (United States)

    Rupérez Cañas, Delfín; Sandoval Orozco, Ana Lucila; García Villalba, Luis Javier; Kim, Tai-Hoon

    2017-05-22

    In this work, an ACO routing protocol for mobile ad hoc networks based on AntHocNet is specified. As its predecessor, this new protocol, called AntOR, is hybrid in the sense that it contains elements from both reactive and proactive routing. Specifically, it combines a reactive route setup process with a proactive route maintenance and improvement process. Key aspects of the AntOR protocol are the disjoint-link and disjoint-node routes, separation between the regular pheromone and the virtual pheromone in the diffusion process and the exploration of routes, taking into consideration the number of hops in the best routes. In this work, a family of ACO routing protocols based on AntOR is also specified. These protocols are based on protocol successive refinements. In this work, we also present a parallelized version of AntOR that we call PAntOR. Using programming multiprocessor architectures based on the shared memory protocol, PAntOR allows running tasks in parallel using threads. This parallelization is applicable in the route setup phase, route local repair process and link failure notification. In addition, a variant of PAntOR that consists of having more than one interface, which we call PAntOR-MI (PAntOR-Multiple Interface), is specified. This approach parallelizes the sending of broadcast messages by interface through threads.

  5. Navigating the Path of Totality - Results and Lessons Learned from the 2017 Eclipse Broadcast, Webcast, Mobile App and Online Production

    Science.gov (United States)

    Semper, R.; Higdon, R.

    2017-12-01

    The 2017 total solar eclipse provided unique opportunity to provide public outreach about astronomy, heliophysics, and scientific discovery. The Navigating the Path of Totality project was designed to produce eclipse related educational resources including live video feeds and distribute them to museums, schools, libraries and the public through online and broadcast media. Using special telescope video camera setups, five feeds were produced including a live one hour English program and in parallel a live one hour Spanish program from Casper, WY with a cutaway to Madras, OR, complete (C1-C4) telescope only feeds from both Madras, OR and Casper, Wy, and a complete (C1-C4) telescope only feed with live musical sonification and accompaniment by the Kronos Quartet. Images from the live feeds were made available on the NASA Website, NASA TV, Exploratorium website, Exploratorium Solar Eclipse mobile app, local television and in museums, libraries and schools worldwide. Associated educational video material including images from the 2016 total eclipse from Micronesia was produced and disseminated. In this talk we will discuss the evaluation results including an examination of the effectiveness of the digital strategy of many mobile channels and mobile apps using different analytics including IBM Watson social media analytics services. We will also present the lessons learned from the project.

  6. Over the top mobile TV : A field trial by public and commercial broadcasters

    NARCIS (Netherlands)

    Bouwman, W.A.G.A.; De Reuver, G.A.; Stalman, S.

    2014-01-01

    Mobile TV has been on the research agenda and promoted by Telecom operators as the killer app for their services for a long time. However with the emergence of Over The Top providers (OTT’s) mobile Internet offers the opportunity to fulfil this unmet promise. In this paper we discuss the results of

  7. On-Demand Routing in Multi-hop Wireless Mobile Ad Hoc Networks

    National Research Council Canada - National Science Library

    Maltz, David A

    2001-01-01

    .... Routing protocols used in ad hoc networks must automatically adjust to environments that can vary between the extremes of high mobility with low bandwidth, and low mobility with high bandwidth...

  8. Les Protocoles de routage dans les réseaux mobiles Ad Hoc ...

    African Journals Online (AJOL)

    Dans cet article nous présentons un état de l'art sur les protocoles de routage dans les réseaux mobiles Ad hoc. Mots clés : Réseaux mobiles ad hoc/, Protocoles de routage. Routing protocols in wireless mobile ad hoc networks. Abstract:The communication between users with handheld computers interconnected through ...

  9. A Dynamic Reputation Management System for Mobile Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    Eric Chiejina

    2015-04-01

    Full Text Available Nodes in mobile ad hoc networks (MANETs are mandated to utilize their limited energy resources in forwarding routing control and data packets for other nodes. Since a MANET lacks a centralized administration and control, a node may decide to act selfishly, either by refusing to respond to route requests from other nodes or deceitfully by responding to some route requests, but dropping the corresponding data packets that are presented for forwarding. A significant increase in the presence of these misbehaving nodes in a MANET can subsequently degrade network performance. In this paper, we propose a dynamic reputation management system for detecting and isolating misbehaving nodes in MANETs. Our model employs a novel direct monitoring technique to evaluate the reputation of a node in the network, which ensures that nodes that expend their energy in transmitting data and routing control packets for others are allowed to carry out their network activities while the misbehaving nodes are detected and isolated from the network. Simulation results show that our model is effective at curbing and mitigating the effects of misbehaving nodes in the network.

  10. Data management issues in mobile ad hoc networks.

    Science.gov (United States)

    Hara, Takahiro

    2017-01-01

    Research on mobile ad hoc networks (MANETs) has become a hot research topic since the middle 1990's. Over the first decade, most research focused on networking techniques, ignoring data management issues. We, however, realized early the importance of data management in MANETs, and have been conducting studies in this area for 15 years. In this review, we summarize some key technical issues related to data management in MANETs, and the studies we have done in addressing these issues, which include placement of data replicas, update management, and query processing with security management. The techniques proposed in our studies have been designed with deep considerations of MANET features including network partitioning, node participation/disappearance, limited network bandwidth, and energy efficiency. Our studies published in early 2000's have developed a new research field as data management in MANETs. Also, our recent studies are expected to be significant guidelines of new research directions. We conclude the review by discussing some future directions for research.

  11. On the analysis of human mobility model for content broadcasting in 5G networks

    KAUST Repository

    Lau, Chun Pong; Alabbasi, Abdulrahman; Shihada, Basem

    2018-01-01

    by analyzing the transition probabilities of a user traveling over several places according to the change of states of daily human activities. Using a reallife simulation, we demonstrate the relationship between the human mobility and the optimization objective

  12. IDMA: improving the defense against malicious attack for mobile ad hoc networks based on ARIP protocol

    Science.gov (United States)

    Peng, Chaorong; Chen, Chang Wen

    2008-04-01

    Malicious nodes are mounting increasingly sophisticated attacking operations on the Mobile Ad Hoc Networks (MANETs). This is mainly because the IP-based MANETs are vulnerable to attacks by various malicious nodes. However, the defense against malicious attack can be improved when a new layer of network architecture can be developed to separate true IP address from disclosing to the malicious nodes. In this paper, we propose a new algorithm to improve the defense against malicious attack (IDMA) that is based on a recently developed Assignment Router Identify Protocol (ARIP) for the clustering-based MANET management. In the ARIP protocol, we design the ARIP architecture based on the new Identity instead of the vulnerable IP addresses to provide the required security that is embedded seamlessly into the overall network architecture. We make full use of ARIP's special property to monitor gateway forward packets by Reply Request Route Packets (RREP) without additional intrusion detection layer. We name this new algorithm IDMA because of its inherent capability to improve the defense against malicious attacks. Through IDMA, a watching algorithm can be established so as to counterattack the malicious node in the routing path when it unusually drops up packets. We provide analysis examples for IDMA for the defense against a malicious node that disrupts the route discovery by impersonating the destination, or by responding with state of corrupted routing information, or by disseminating forged control traffic. The IDMA algorithm is able to counterattack the malicious node in the cases when the node lunch DoS attack by broadcast a large number of route requests, or make Target traffic congestion by delivering huge mount of data; or spoof the IP addresses and send forge packets with a fake ID to the same Target causing traffic congestion at that destination. We have implemented IDMA algorism using the GloMoSim simulator and have demonstrated its performance under a variety of

  13. From Broadcast to Podcast

    DEFF Research Database (Denmark)

    Fibiger, Bo

    2007-01-01

    This paper will present the development from broadcasted educational television up to the actual use of streaming video and mobile units in eLearning. The paper will discuss the following topics: what can we learn from history? – and what are the new challenges and possibilities in mobile...

  14. A MODIFIED ROUTE DISCOVERY APPROACH FOR DYNAMIC SOURCE ROUTING (DSR PROTOCOL IN MOBILE AD-HOC NETWORKS

    Directory of Open Access Journals (Sweden)

    Alaa Azmi Allahham

    2017-02-01

    Full Text Available Mobile Ad-hoc networks (MANETs involved in many applications, whether commercial or military because of their characteristics that do not depend on the infrastructure as well as the freedom movement of their elements, but in return has caused this random mobility of the nodes many of the challenges, where the routing is considered one of these challenges. There are many types of routing protocols that operate within MANET networks, which responsible for finding paths between the source and destination nodes with the modernization of these paths which are constantly changing due to the dynamic topology of the network stemming from the constant random movement of the nodes. The DSR (Dynamic Source Routing routing protocol algorithm is one of these routing protocols which consist of two main stages; route discovery and maintenance, where the route discovery algorithm operates based on blind flooding of request messages. blind flooding is considered as the most well known broadcasting mechanism, it is inefficient in terms of communication and resource utilization, which causing increasing the probability of collisions, repeating send several copies of the same message, as well as increasing the delay. Hence, a new mechanism in route discovery stage and in caching the routes in DSR algorithm according to the node's location in the network and the direction of the broadcast is proposed for better performance especially in terms of delay as well as redundant packets rate. The implementation of proposed algorithms showed positive results in terms of delay, overhead, and improve the performance of MANETs in general.

  15. Sensor Sharing in Mobile Ad-Hoc Networks

    Science.gov (United States)

    Mitra, Pramita

    2013-01-01

    Today's modern mobile devices (such as smartphones and tablets) present great potential for growth of many novel, powerful, but also highly demanding applications. However, most mobile devices/users operate in isolation from one another, i.e., they are not aware of the presence of other devices in their proximity. There are numerous situations…

  16. Collaboration Layer for Robots in Mobile Ad-hoc Networks

    DEFF Research Database (Denmark)

    Borch, Ole; Madsen, Per Printz; Broberg, Jacob Honor´e

    2009-01-01

    networks to solve tasks collaboratively. In this proposal the Collaboration Layer is modelled to handle service and position discovery, group management, and synchronisation among robots, but the layer is also designed to be extendable. Based on this model of the Collaboration Layer, generic services...... are provided to the application running on the robot. The services are generic because they can be used by many different applications, independent of the task to be solved. Likewise, specific services are requested from the underlying Virtual Machine, such as broadcast, multicast, and reliable unicast....... A prototype of the Collaboration Layer has been developed to run in a simulated environment and tested in an evaluation scenario. In the scenario five robots solve the tasks of vacuum cleaning and entrance guarding, which involves the ability to discover potential co-workers, form groups, shift from one group...

  17. Effects of Data Replication on Data Exfiltration in Mobile Ad Hoc Networks Utilizing Reactive Protocols

    Science.gov (United States)

    2015-03-01

    aerial vehicle VANET vehicular ad hoc network VoIP Voice over Internet Protocol VRR Virtual Ring Routing xiii EFFECTS OF DATA REPLICATION ON DATA...ad hoc networks in mobile ad hoc networks (MANETs), vehicular ad hoc networks (VANETs), and flying ad hoc net- works (FANETs). Much of the research...metric, such as capacity, congestion , power, or combinations thereof. Caro refers to two different types of ants, FANTs and BANTs which are analogous to

  18. FHWA White Paper on Mobile Ad Hoc Networks

    Science.gov (United States)

    2018-01-01

    Advanced next generation communications technologies offer the potential to greatly improve safety, system efficiency, and mobility across our Nations roadways. These new technologies and processes can address both traditionally difficult as well ...

  19. Simplified Multicast Forwarding in Mobile Ad Hoc Networks

    National Research Council Canada - National Science Library

    Macker, Joseph P; Dean, Justin; Chao, William

    2004-01-01

    ...) based upon flooding mechanisms. We present the design of a working experimental prototype and some initial performance results using the NRL mobile network emulation system and various optional flooding approaches within the design framework...

  20. 75 FR 30159 - Automatic Dependent Surveillance-Broadcast (ADS-B) Out Performance Requirements To Support Air...

    Science.gov (United States)

    2010-05-28

    ... GNSS--Global Navigation Satellite System GPS--Global Positioning System HAI--Helicopter Association... of the Aircraft's Geometric Altitude L. Ability To Turn Off ADS-B Out Transmissions M. Existing... navigation system, such as the Global Positioning System (GPS), that provides autonomous worldwide geo...

  1. Diabetes and Orientation and Mobility Training: An Added Challenge.

    Science.gov (United States)

    Kozel, B.

    1995-01-01

    Issues related to promoting orientation and mobility training for individuals with visual impairments and diabetes are discussed, including effects of insulin, hypoglycemia and hyperglycemia, the timing of training, complications to the feet, and fluctuations in vision. Major lifestyle changes required by diabetes are stressed. (Author/SW)

  2. Information Sharing Mechanism among Mobile Agents In Ad-hoc Network Environment and Its Applications

    Directory of Open Access Journals (Sweden)

    Kunio Umetsuji

    2004-12-01

    Full Text Available Mobile agents are programs that can move from one site to another in a network with their data and states. Mobile agents are expected to be an essential tool in pervasive computing. In multi platform environment, it is important to communicate with mobile agents only using their universal or logical name not using their physical locations. More, in an ad-hoc network environment, an agent can migrate autonomously and communicate with other agents on demand. It is difficult that mobile agent grasps the position information on other agents correctly each other, because mobile agent processes a task while moving a network successively. In order to realize on-demand mutual communication among mobile agents without any centralized servers, we propose a new information sharing mechanism within mobile agents. In this paper, we present a new information sharing mechanism within mobile agents. The method is a complete peer based and requires no agent servers to manage mobile agent locations. Therefore, a mobile agent can get another mobile agent, communicate with it and shares information stored in the agent without any knowledge of the location of the target mobile agent. The basic idea of the mechanism is an introduction of Agent Ring, Agent Chain and Shadow Agent. With this mechanism, each agent can communicate with other agents in a server-less environment, which is suitable for ad-hoc agent network and an agent system can manage agents search and communications efficiently.

  3. A Tool for Visualizing Mobile Ad-Hoc Network Topology Definitions Files

    National Research Council Canada - National Science Library

    Nguyen, Binh Q

    2006-01-01

    This report documents a research and development effort that the U.S. Army Research Laboratory conducted in FY05 in support of the building of an emulated tactical mobile ad hoc network (MANET) research test bed...

  4. Performance Analysis of Reuse Distance in Cooperative Broadcasting

    Directory of Open Access Journals (Sweden)

    Jimmi Grönkvist

    2016-01-01

    Full Text Available Cooperative broadcasting is a promising technique for robust broadcast with low overhead and delay in mobile ad hoc networks. The technique is attractive for mission-oriented mobile communication, where a majority of the traffic is of broadcast nature. In cooperative broadcasting, all nodes simultaneously retransmit packets. The receiver utilizes cooperative diversity in the simultaneously received signals. The retransmissions continue until all nodes are reached. After the packet has traveled a specific number of hops out from the source, denoted as reuse distance, the source node transmits a new broadcast packet in the time slot used for the previous broadcast packet. If the reuse distance is too small, interference causes packet loss in intermediate nodes. In the literature, a reuse distance of three is common. With an analysis based on a realistic interference model and real terrain data, we show that a reuse distance of at least four is necessary to avoid packet loss in sparsely connected networks, especially for high spectral efficiencies. For frequency hopping, widely used in military systems, we propose a novel method. This method almost eliminates interference for a reuse distance of three, increasing the throughput by 33% compared to systems with a reuse distance of four.

  5. Mobility Models for Next Generation Wireless Networks Ad Hoc, Vehicular and Mesh Networks

    CERN Document Server

    Santi, Paolo

    2012-01-01

    Mobility Models for Next Generation Wireless Networks: Ad Hoc, Vehicular and Mesh Networks provides the reader with an overview of mobility modelling, encompassing both theoretical and practical aspects related to the challenging mobility modelling task. It also: Provides up-to-date coverage of mobility models for next generation wireless networksOffers an in-depth discussion of the most representative mobility models for major next generation wireless network application scenarios, including WLAN/mesh networks, vehicular networks, wireless sensor networks, and

  6. Analysis and Enhancements of Leader Elections algorithms in Mobile Ad Hoc Networks

    OpenAIRE

    Shayeji, Mohammad H. Al; Al-Azmi, AbdulRahman R.; Al-Azmi, AbdulAziz R.; Samrajesh, M. D.

    2012-01-01

    Mobile Ad Hoc networks (MANET), distinct from traditional distributed systems, are dynamic and self-organizing networks. MANET requires a leader to coordinate and organize tasks. The challenge is to have the right election algorithm that chooses the right leader based on various factors in MANET. In this paper, we analyze four leader election algorithms used in mobile Ad Hoc Networks. Factors considered in our analysis are time complexity, message complexity, assumptions considered, fault tol...

  7. User-centred and context-aware identity management in mobile ad-hoc networks

    CERN Document Server

    Arabo, Abdullahi

    2013-01-01

    The emergent notion of ubiquitous computing makes it possible for mobile devices to communicate and provide services via networks connected in an ad-hoc manner. These have resulted in the proliferation of wireless technologies such as Mobile Ad-hoc Networks (MANets), which offer attractive solutions for services that need flexible setup as well as dynamic and low cost wireless connectivity. However, the growing trend outlined above also raises serious concerns over Identity Management (IM) du...

  8. Impact of mobility on the performance of relaying in ad hoc networks (Extended version)

    NARCIS (Netherlands)

    Al Hanbali, A.; Kherani, A.A.; Groenevelt, R.; Nain, P.; Altman, E.

    2007-01-01

    We consider a mobile ad hoc network consisting of three types of nodes: source, destination, and relay nodes. All the nodes are moving over a bounded region with possibly different mobility patterns. We introduce and study the notion of relay throughput, i.e. the maximum rate at which a node can

  9. Impact of Mobility on the Performance of Relaying in Ad Hoc Networks

    NARCIS (Netherlands)

    Al Hanbali, Ahmad; Kherani, A.A.; Groenevelt, R.; Nain, P.; Altman, E

    2006-01-01

    We consider a mobile ad hoc network consisting of three types of nodes: source, destination, and relay nodes. All the nodes are moving over a bounded region with possibly different mobility patterns. We introduce and study the notion of relay throughput, i.e. the maximum rate at which a node can

  10. Impact of mobility on the performance7 of relaying in ad hoc networks – Extended version

    NARCIS (Netherlands)

    Al Hanbali, Ahmad; Kherani, A.A.; Groenevelt, R.; Nain, P.; Altman, E

    2007-01-01

    We consider a mobile ad hoc network consisting of three types of nodes: source, destination, and relay nodes. All the nodes are moving over a bounded region with possibly different mobility patterns. We introduce and study the notion of relay throughput, i.e. the maximum rate at which a node can

  11. Ad-me: Intelligent Context-Sensitive Advertising within a Mobile Tourist Guide.

    OpenAIRE

    Hristova, Nataliya; O'Hare, G. M. P. (Greg M. P.)

    2001-01-01

    The mobile commerce sector is set to witness phenomenal growth. In particular context sensitive advertising will represent a high yield revenue stream. This paper introduces the Ad-me (Advertising for the mobile e-commerce user) system which proactively delivers advertisements to users. Within the context of a mobile tourist guide advertisements are presented relative to user location and perceived needs. It uses Global Positioning System (GPS) and embraces agent-oriented design p...

  12. Broadcasting house

    DEFF Research Database (Denmark)

    Sattrup, Peter Andreas

    2008-01-01

    Regarding the transformation of the Danish Broadcasting Hq. (1934-1945) in Frederiksberg by Vilhelm Lauritzen into the Royal Danish Academy of Music. Analysis, principles, flexibility and change.......Regarding the transformation of the Danish Broadcasting Hq. (1934-1945) in Frederiksberg by Vilhelm Lauritzen into the Royal Danish Academy of Music. Analysis, principles, flexibility and change....

  13. Mobile ad hoc networking the cutting edge directions

    CERN Document Server

    Basagni, Stefano; Giordano, Silvia; Stojmenovic, Ivan

    2013-01-01

    ""An excellent book for those who are interested in learning the current status of research and development . . . [and] who want to get a comprehensive overview of the current state-of-the-art.""-E-Streams This book provides up-to-date information on research and development in the rapidly growing area of networks based on the multihop ad hoc networking paradigm. It reviews all classes of networks that have successfully adopted this paradigm, pointing out how they penetrated the mass market and sparked breakthrough research. Covering both physical issues and applica

  14. Mobile home automation-merging mobile value added services and home automation technologies

    OpenAIRE

    Rosendahl, Andreas; Hampe, Felix J.; Botterweck, Goetz

    2007-01-01

    non-peer-reviewed In this paper we study mobile home automation, a field that emerges from an integration of mobile application platforms and home automation technologies. In a conceptual introduction we first illustrate the need for such applications by introducing a two-dimensional conceptual model of mobility. Subsequently we suggest an architecture and discuss different options of how a user might access a mobile home automation service and the controlled devices. As another contrib...

  15. A Hybrid Energy Efficient Protocol for Mobile Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    Niranjan Kumar Ray

    2016-01-01

    Full Text Available We proposed an energy conservation technique called Location Based Topology Control with Sleep Scheduling for ad hoc networks. It uses the feature of both topology control approach and power management approach. Like the topology control approach, it attempts to reduce the transmission power of a node, which is determined from its neighborhood location information. A node goes to sleep state based on the traffic condition as that of power management approach. In the proposed scheme, a node goes to sleep state only when its absence does not create local partition in its neighborhood. We preformed extensive simulation to compare the proposed scheme with existing ones. Simulation results show that the energy consumption is lower with increase in the network lifetime and higher throughput in the proposed scheme.

  16. A Mobility-Aware Link Enhancement Mechanism for Vehicular Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    Kai-Wen Hu

    2008-04-01

    Full Text Available With the growth up of internet in mobile commerce, researchers have reproduced various mobile applications that vary from entertainment and commercial services to diagnostic and safety tools. Mobility management has widely been recognized as one of the most challenging problems for seamless access to wireless networks. In this paper, a novel link enhancement mechanism is proposed to deal with mobility management problem in vehicular ad hoc networks. Two machine learning techniques, namely, particle swarm optimization and fuzzy logic systems, are incorporated into the proposed schemes to enhance the accuracy of prediction of link break and congestion occurrence. The experimental results verify the effectiveness and feasibility of the proposed schemes.

  17. A Mobility-Aware Link Enhancement Mechanism for Vehicular Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    Huang Chenn-Jung

    2008-01-01

    Full Text Available Abstract With the growth up of internet in mobile commerce, researchers have reproduced various mobile applications that vary from entertainment and commercial services to diagnostic and safety tools. Mobility management has widely been recognized as one of the most challenging problems for seamless access to wireless networks. In this paper, a novel link enhancement mechanism is proposed to deal with mobility management problem in vehicular ad hoc networks. Two machine learning techniques, namely, particle swarm optimization and fuzzy logic systems, are incorporated into the proposed schemes to enhance the accuracy of prediction of link break and congestion occurrence. The experimental results verify the effectiveness and feasibility of the proposed schemes.

  18. MUSIC algorithm DoA estimation for cooperative node location in mobile ad hoc networks

    Science.gov (United States)

    Warty, Chirag; Yu, Richard Wai; ElMahgoub, Khaled; Spinsante, Susanna

    In recent years the technological development has encouraged several applications based on distributed communications network without any fixed infrastructure. The problem of providing a collaborative early warning system for multiple mobile nodes against a fast moving object. The solution is provided subject to system level constraints: motion of nodes, antenna sensitivity and Doppler effect at 2.4 GHz and 5.8 GHz. This approach consists of three stages. The first phase consists of detecting the incoming object using a highly directive two element antenna at 5.0 GHz band. The second phase consists of broadcasting the warning message using a low directivity broad antenna beam using 2× 2 antenna array which then in third phase will be detected by receiving nodes by using direction of arrival (DOA) estimation technique. The DOA estimation technique is used to estimate the range and bearing of the incoming nodes. The position of fast arriving object can be estimated using the MUSIC algorithm for warning beam DOA estimation. This paper is mainly intended to demonstrate the feasibility of early detection and warning system using a collaborative node to node communication links. The simulation is performed to show the behavior of detecting and broadcasting antennas as well as performance of the detection algorithm. The idea can be further expanded to implement commercial grade detection and warning system

  19. A Reinforcement Learning Model Equipped with Sensors for Generating Perception Patterns: Implementation of a Simulated Air Navigation System Using ADS-B (Automatic Dependent Surveillance-Broadcast) Technology.

    Science.gov (United States)

    Álvarez de Toledo, Santiago; Anguera, Aurea; Barreiro, José M; Lara, Juan A; Lizcano, David

    2017-01-19

    Over the last few decades, a number of reinforcement learning techniques have emerged, and different reinforcement learning-based applications have proliferated. However, such techniques tend to specialize in a particular field. This is an obstacle to their generalization and extrapolation to other areas. Besides, neither the reward-punishment (r-p) learning process nor the convergence of results is fast and efficient enough. To address these obstacles, this research proposes a general reinforcement learning model. This model is independent of input and output types and based on general bioinspired principles that help to speed up the learning process. The model is composed of a perception module based on sensors whose specific perceptions are mapped as perception patterns. In this manner, similar perceptions (even if perceived at different positions in the environment) are accounted for by the same perception pattern. Additionally, the model includes a procedure that statistically associates perception-action pattern pairs depending on the positive or negative results output by executing the respective action in response to a particular perception during the learning process. To do this, the model is fitted with a mechanism that reacts positively or negatively to particular sensory stimuli in order to rate results. The model is supplemented by an action module that can be configured depending on the maneuverability of each specific agent. The model has been applied in the air navigation domain, a field with strong safety restrictions, which led us to implement a simulated system equipped with the proposed model. Accordingly, the perception sensors were based on Automatic Dependent Surveillance-Broadcast (ADS-B) technology, which is described in this paper. The results were quite satisfactory, and it outperformed traditional methods existing in the literature with respect to learning reliability and efficiency.

  20. Performance Analysis of Hierarchical Group Key Management Integrated with Adaptive Intrusion Detection in Mobile ad hoc Networks

    Science.gov (United States)

    2016-04-05

    applications in wireless networks such as military battlefields, emergency response, mobile commerce , online gaming, and collaborative work are based on the...www.elsevier.com/locate/peva Performance analysis of hierarchical group key management integrated with adaptive intrusion detection in mobile ad hoc...Accepted 19 September 2010 Available online 26 September 2010 Keywords: Mobile ad hoc networks Intrusion detection Group communication systems Group

  1. ARSENAL: A Cross Layer Architecture for Secure Resilient Tactical Mobile AdHoc Networks

    Science.gov (United States)

    2016-01-21

    stations separated by 0.5 to 1 km can be coherently measured to a single mobile subscriber using LTE signaling. These are the first measurements of...undertake three parallel but inter-coupled tasks geared towards a) performing measurements via real deployments and enhancing our understanding of layer...dependencies and vulnerabilities in mobile ad hoc networks; these measurements will be on existing testbeds at The views, opinions and/or findings

  2. Evolution of broadcast content distribution

    CERN Document Server

    Beutler, Roland

    2017-01-01

    This book discusses opportunities for broadcasters that arise with the advent of broadband networks, both fixed and mobile. It discusses how the traditional way of distributing audio-visual content over broadcasting networks has been complemented by the usage of broadband networks. The author shows how this also gives the possibility to offer new types of interactive or so-called nonlinear services. The book illustrates how change in distribution technology is accelerating the need for broadcasters around the world to adapt their content distribution strategy and how it will impact the portfolios of content they offer. Outlines the shift in broadcast content distribution paradigms and related strategic issues Provides an overview of the new broadcasting ecosystem encompassing new types of content, user habits, expectations, and devices Discusses complementary usage of different distribution technologies and platforms.

  3. Peer-to-peer over mobile ad hoc networks (Chapter 11)

    NARCIS (Netherlands)

    Qadri, N.N.; Liotta, A.; Pierre, S.

    2010-01-01

    In this chapter we review various approaches for the convergence of Peer-to-Peer (P2P) and Mobile Ad hoc Networks (MANETs), identifying strengths and weaknesses, and putting things in perspective. P2P and MANETs are among the most active research topics in pervasive computing. The convergence of P2P

  4. Specification and Validation of an Edge Router Discovery Protocol for Mobile Ad Hoc Networks

    DEFF Research Database (Denmark)

    Kristensen, Lars Michael; Jensen, Kurt

    2004-01-01

    We present an industrial project at Ericsson Telebit A/S where Coloured Petri Nets (CP-nets or CPNs) have been used for the design and specification of an edge router discovery protocol for mobile ad-hoc networks. The Edge Router Discovery Protocol (ERDP) supports an edge router in a stationary...

  5. Model-based prototyping of an interoperability protocol for mobile ad-hoc networks

    NARCIS (Netherlands)

    Kristensen, L.M.; Westergaard, M.; Norgaard, P.C.; Romijn, J.; Smith, G.; Pol, van de J.

    2005-01-01

    We present an industrial project conducted at Ericsson Danmark A/S, Telebit where formal methods in the form of Coloured Petri Nets (CP-nets or CPNs) have been used for the specification of an interoperability protocol for routing packets between fixed core networks and mobile ad-hoc networks. The

  6. BLESSED with Opportunistic Beacons: A Lightweight Data Dissemination Model for Smart Mobile Ad-Hoc Networks

    NARCIS (Netherlands)

    Türkes, Okan; Scholten, Johan; Havinga, Paul J.M.

    2015-01-01

    This paper introduces BLESSED, a universal opportunistic ad hoc networking model intended for smart mobile devices. It enables fast and lightweight data dissemination in wireless community networks through the complementary utilization of the IEEE 802.11 and Bluetooth Low Energy standards. As a

  7. Integrated Social and Quality of Service Trust Management of Mobile Groups in Ad Hoc Networks

    Science.gov (United States)

    2013-01-01

    high resiliency to malicious attacks and misbehaving nodes. Keywords—trust management; mobile ad hoc networks; QoS trust; social trust; trust...paper we address an importance issue of trust management protocol design for MANETs: trust bias minimization despite misbehaving nodes performing

  8. PNNI routing support for ad hoc mobile networking: The multilevel case

    Energy Technology Data Exchange (ETDEWEB)

    Martinez, L.; Sholander, P.; Tolendino, L.

    1998-01-01

    This contribution extends the Outside Nodal Hierarchy List (ONHL) procedures described in ATM Forum Contributions 97-0766 and 97-0933. These extensions allow multiple mobile networks to form either an ad hoc network or an extension of a fixed PNNI infrastructure. A previous contribution (97-1073) covered the simplest case where the top-most Logical Group Nodes (LGNs), in those mobile networks, all resided at the same level in a PNNI hierarchy. This contribution covers the more general case wherein those top-most LGNs may reside at different PNNI hierarchy levels. Both of the SNL contributions consider flat ad hoc network architectures in the sense that each mobile network always participates in the PNNI hierarchy at the pre-configured level of its top-most LGN.

  9. Mobility Based Key Management Technique for Multicast Security in Mobile Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    B. Madhusudhanan

    2015-01-01

    Full Text Available In MANET multicasting, forward and backward secrecy result in increased packet drop rate owing to mobility. Frequent rekeying causes large message overhead which increases energy consumption and end-to-end delay. Particularly, the prevailing group key management techniques cause frequent mobility and disconnections. So there is a need to design a multicast key management technique to overcome these problems. In this paper, we propose the mobility based key management technique for multicast security in MANET. Initially, the nodes are categorized according to their stability index which is estimated based on the link availability and mobility. A multicast tree is constructed such that for every weak node, there is a strong parent node. A session key-based encryption technique is utilized to transmit a multicast data. The rekeying process is performed periodically by the initiator node. The rekeying interval is fixed depending on the node category so that this technique greatly minimizes the rekeying overhead. By simulation results, we show that our proposed approach reduces the packet drop rate and improves the data confidentiality.

  10. An Effective Approach for Mobile ad hoc Network via I-Watchdog Protocol

    Directory of Open Access Journals (Sweden)

    Nidhi Lal

    2014-12-01

    Full Text Available Mobile ad hoc network (MANET is now days become very famous due to their fixed infrastructure-less quality and dynamic nature. They contain a large number of nodes which are connected and communicated to each other in wireless nature. Mobile ad hoc network is a wireless technology that contains high mobility of nodes and does not depend on the background administrator for central authority, because they do not contain any infrastructure. Nodes of the MANET use radio wave for communication and having limited resources and limited computational power. The Topology of this network is changing very frequently because they are distributed in nature and self-configurable. Due to its wireless nature and lack of any central authority in the background, Mobile ad hoc networks are always vulnerable to some security issues and performance issues. The security imposes a huge impact on the performance of any network. Some of the security issues are black hole attack, flooding, wormhole attack etc. In this paper, we will discuss issues regarding low performance of Watchdog protocol used in the MANET and proposed an improved Watchdog mechanism, which is called by I-Watchdog protocol that overcomes the limitations of Watchdog protocol and gives high performance in terms of throughput, delay.

  11. Exploiting Mobile Ad Hoc Networking and Knowledge Generation to Achieve Ambient Intelligence

    Directory of Open Access Journals (Sweden)

    Anna Lekova

    2012-01-01

    Full Text Available Ambient Intelligence (AmI joins together the fields of ubiquitous computing and communications, context awareness, and intelligent user interfaces. Energy, fault-tolerance, and mobility are newly added dimensions of AmI. Within the context of AmI the concept of mobile ad hoc networks (MANETs for “anytime and anywhere” is likely to play larger roles in the future in which people are surrounded and supported by small context-aware, cooperative, and nonobtrusive devices that will aid our everyday life. The connection between knowledge generation and communication ad hoc networking is symbiotic—knowledge generation utilizes ad hoc networking to perform their communication needs, and MANETs will utilize the knowledge generation to enhance their network services. The contribution of the present study is a distributed evolving fuzzy modeling framework (EFMF to observe and categorize relationships and activities in the user and application level and based on that social context to take intelligent decisions about MANETs service management. EFMF employs unsupervised online one-pass fuzzy clustering method to recognize nodes' mobility context from social scenario traces and ubiquitously learn “friends” and “strangers” indirectly and anonymously.

  12. Improvement over the OLSR Routing Protocol in Mobile Ad Hoc Networks by Eliminating the Unnecessary Loops

    OpenAIRE

    Shahram Behzad; Reza Fotohi; Shahram Jamali

    2013-01-01

    Mobile ad hoc networks are type of wireless networks in which any kind of infrastructure is not used, i.e. there are no infrastructures such as routers or switches or anything else on the network that can be used to support the network structure and the nodes has mobility. The purpose of this paper is to provide a better quality of the package delivery rate and the throughput, that is in need of powerful routing protocol standards, which can guarantee delivering of the packages to destination...

  13. Deny-by-Default Distributed Security Policy Enforcement in Mobile Ad Hoc Networks

    Science.gov (United States)

    Alicherry, Mansoor; Keromytis, Angelos D.; Stavrou, Angelos

    Mobile Ad-hoc Networks (MANETs) are increasingly employed in tactical military and civil rapid-deployment networks, including emergency rescue operations and ad hoc disaster-relief networks. However, this flexibility of MANETs comes at a price, when compared to wired and base station-based wireless networks: MANETs are susceptible to both insider and outsider attacks. This is mainly because of the lack of a well-defined defense perimeter preventing the effective use of wired defenses including firewalls and intrusion detection systems.

  14. Cross-Layer Design Approach for Power Control in Mobile Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    A. Sarfaraz Ahmed

    2015-03-01

    Full Text Available In mobile ad hoc networks, communication among mobile nodes occurs through wireless medium The design of ad hoc network protocol, generally based on a traditional “layered approach”, has been found ineffective to deal with receiving signal strength (RSS-related problems, affecting the physical layer, the network layer and transport layer. This paper proposes a design approach, deviating from the traditional network design, toward enhancing the cross-layer interaction among different layers, namely physical, MAC and network. The Cross-Layer design approach for Power control (CLPC would help to enhance the transmission power by averaging the RSS values and to find an effective route between the source and the destination. This cross-layer design approach was tested by simulation (NS2 simulator and its performance over AODV was found to be better.

  15. PERFORMANCE ANALYSIS OF DSR ROUTING PROTOCOL UNDER ENERGY BASED SELFISH ATTACK IN MOBILE AD HOC NETWORKS

    Directory of Open Access Journals (Sweden)

    T.V.P.Sundararajan

    2010-06-01

    Full Text Available Mobile Ad hoc Networks (MANETs rely on the cooperation of all participating nodes to provide the fundamental operations such as routing and data forwarding. However, due to the open structure and scarcely available battery-based energy, node misbehaviors may exist.[1]. One such routing misbehavior is that some selfish nodes will participate in the route discovery and maintenance processes but refuse to forward data packets. This paper pointed out Energy based selfish nodes (EBSN where these selfish nodes tend to use the network but do not cooperate, saving battery life for their own communications [2],[3]. We present a simulation study of the effects of Energy based selfish nodes (EBSN on DSR routing protocol and its impact over network performance in terms of throughput and delay of a mobile ad hoc network where a defined percentage of nodes were misbehaving.

  16. Effect of grain mobility on ionic conductivity of Ceria added YSZ electrolyte

    International Nuclear Information System (INIS)

    Gupta, Alka; Omar, Shobit; Balani, Kantesh

    2012-01-01

    In an effort to develop novel electrolyte materials, the present work explores the effect of grain boundary mobility on ionic conductivity of CeO 2 -YSZ electrolyte. For cubic zirconia in general, the higher the grain boundary mobility, the lower the activation energy for oxide ion migration and judicious doping can be an effective method for mobility control. The two main directions for fabricating 8 mol. % YSZs (8YSZ) with 0,5 and 10 wt % CeO 2 are being followed: (i) co doping by conventional sintering (CS, 1400 ℃, 4h holding, ∼98 % theoretical density), and (ii) nano composite approach by spark plasma sintering (SPS, 1200 ℃, 5 min holding, ∼96 % theoretical density). Phase analysis by XRD, indicates that CeO 2 forms the complete solid solution with YSZ when synthesized by CS and both solid solution and composite formation (seen as isolated ceria rich zones in YSZ matrix by EDS analysis via TEM) by SPS. The grain boundary mobility for CS samples of pure and 10%CeO 2 added YSZ are 6.69 x 10 -18 to 10.35 X 10 -18 m 3 /N/s respectively. While for SPS sintered samples of pure and 10% CeO 2 added YSZ the grain boundary mobility comes out to be ∼0.032 X 10 -18 to 0.039 X 10 18 m 3 /N/s respectively. Grain mobility does not show any marginal change with increasing ceria content, elicit that the defect concentration is nearly constant in 8YSZ and is insensitive to ceria content. Remarkable increase of grain mobility in the SPS samples is attributed to rapid grain coarsening in the nano-grains limited to shorter sintering times. As expected, grain mobility for longer-times average out the transient phase and lower the net grain mobility such as in CS samples. The enhanced mobility in CeO 2 -YSZ SPS sintered electrolytes must be due to lower cation migration energy (activation energy for oxide ion migration), promoting enhanced ionic conductivity. (author)

  17. Secure and Usable Out-Of-Band Channels for Ad Hoc Mobile Device Interactions

    OpenAIRE

    Kainda , Ronald; Flechais , Ivan; Roscoe , A. W.

    2010-01-01

    International audience; Protocols for bootstrapping security in ad hoc mobile device interactions rely on users' ability to perform specific tasks such as transferring or comparing fingerprints of information between devices. The size of fingerprints depends on the level of technical security required by a given application but, at the same time, is limited by users' inability to deal with large amounts of data with high levels of accuracy. Large fingerprints provide high technical security b...

  18. Revenue-sharing analysis in the mobile value-added services

    Institute of Scientific and Technical Information of China (English)

    LIU Bing; TANG Shou-lian

    2006-01-01

    This article provides a framework e within which the revenue-sharing in mobile value-added services can be analyzed.It shows that the revenue-sharing ratio between a network operator and a content provider (CP) has no significant effect on prices, market shares or social welfare in the case of nonstandardization. This implies that the revenue-sharing ratio cannot be used as a policy variable.

  19. Energy-Efficient Cluster Based Routing Protocol in Mobile Ad Hoc Networks Using Network Coding

    OpenAIRE

    Srinivas Kanakala; Venugopal Reddy Ananthula; Prashanthi Vempaty

    2014-01-01

    In mobile ad hoc networks, all nodes are energy constrained. In such situations, it is important to reduce energy consumption. In this paper, we consider the issues of energy efficient communication in MANETs using network coding. Network coding is an effective method to improve the performance of wireless networks. COPE protocol implements network coding concept to reduce number of transmissions by mixing the packets at intermediate nodes. We incorporate COPE into cluster based routing proto...

  20. Context dependent off loading for cloudlet in mobile ad-hoc network

    Science.gov (United States)

    Bhatt, N.; Nadesh, R. K.; ArivuSelvan, K.

    2017-11-01

    Cloud Computing in Mobile Ad-hoc network is emerging part of research consideration as the demand and competency of mobile devices increased in last few years. To follow out operation within the remote cloud builds the postponement and influences the administration standard. To keep away from this trouble cloudlet is presented. Cloudlet gives identical support of the devices as cloud at low inactivity however at high transfer speed. Be that as it may, choice of a cloudlet for offloading calculation with flat energy is a noteworthy test if multiple cloud let is accessible adjacent. Here I proposed energy and bandwidth (Traffic overload for communication with cloud) aware cloudlet selection strategy based on the context dependency of the device location. It works on the basis of mobile device location and bandwidth availability of cloudlet. The cloudlet offloading and selection process using given solution is simulated in Cloud ~ Simulator.

  1. Distributed generation of shared RSA keys in mobile ad hoc networks

    Science.gov (United States)

    Liu, Yi-Liang; Huang, Qin; Shen, Ying

    2005-12-01

    Mobile Ad Hoc Networks is a totally new concept in which mobile nodes are able to communicate together over wireless links in an independent manner, independent of fixed physical infrastructure and centralized administrative infrastructure. However, the nature of Ad Hoc Networks makes them very vulnerable to security threats. Generation and distribution of shared keys for CA (Certification Authority) is challenging for security solution based on distributed PKI(Public-Key Infrastructure)/CA. The solutions that have been proposed in the literature and some related issues are discussed in this paper. The solution of a distributed generation of shared threshold RSA keys for CA is proposed in the present paper. During the process of creating an RSA private key share, every CA node only has its own private security. Distributed arithmetic is used to create the CA's private share locally, and that the requirement of centralized management institution is eliminated. Based on fully considering the Mobile Ad Hoc network's characteristic of self-organization, it avoids the security hidden trouble that comes by holding an all private security share of CA, with which the security and robustness of system is enhanced.

  2. A COMPREHENSIVE SURVEY ON DETECTING BLACK HOLE ATTACK IN MOBILE AD-HOC NETWORK (MANET

    Directory of Open Access Journals (Sweden)

    Pascal Maniriho

    2018-01-01

    Full Text Available The infrastructure-less nature and mobility of nodes in mobile ad-hoc network (MANET make it to be very susceptible to various attacks. Besides, owing to its flexibility and simplicity, there is no predefined time or permission set for nodes to leave or join the network and each node can act as a client or server.  Nevertheless, securing communication between nodes has become a challenging problem than in other types of network. Attacks in MANET range into different categories. Black hole attack is one of the attacks that has been addressed by many researchers in the recent years. It does occur when a harmful mobile node called black hole becomes a part of the network and tries to use its malicious behaviors by sending fake route reply packets (RREP for any received route request packets (RREQ. When these faked packets arrive to the source node, it does reply to them by sending data packet via the established route. Once the packets are received by the black hole, it drops them before reaching the destination.  Hence, preventing the source node from reaching the intended destination. In this paper, we present an overview of a wide range of techniques suggested in the literature for detecting and preventing black hole attacks in mobile ad hoc network. Additionally, the effect of each approach on the network performance is also presented.

  3. Cross-Layer Service Discovery Mechanism for OLSRv2 Mobile Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    M. Isabel Vara

    2015-07-01

    Full Text Available Service discovery plays an important role in mobile ad hoc networks (MANETs. The lack of central infrastructure, limited resources and high mobility make service discovery a challenging issue for this kind of network. This article proposes a new service discovery mechanism for discovering and advertising services integrated into the Optimized Link State Routing Protocol Version 2 (OLSRv2. In previous studies, we demonstrated the validity of a similar service discovery mechanism integrated into the previous version of OLSR (OLSRv1. In order to advertise services, we have added a new type-length-value structure (TLV to the OLSRv2 protocol, called service discovery message (SDM, according to the Generalized MANET Packet/Message Format defined in Request For Comments (RFC 5444. Each node in the ad hoc network only advertises its own services. The advertisement frequency is a user-configurable parameter, so that it can be modified depending on the user requirements. Each node maintains two service tables, one to store information about its own services and another one to store information about the services it discovers in the network. We present simulation results, that compare our service discovery integrated into OLSRv2 with the one defined for OLSRv1 and with the integration of service discovery in Ad hoc On-demand Distance Vector (AODV protocol, in terms of service discovery ratio, service latency and network overhead.

  4. Cross-Layer Service Discovery Mechanism for OLSRv2 Mobile Ad Hoc Networks.

    Science.gov (United States)

    Vara, M Isabel; Campo, Celeste

    2015-07-20

    Service discovery plays an important role in mobile ad hoc networks (MANETs). The lack of central infrastructure, limited resources and high mobility make service discovery a challenging issue for this kind of network. This article proposes a new service discovery mechanism for discovering and advertising services integrated into the Optimized Link State Routing Protocol Version 2 (OLSRv2). In previous studies, we demonstrated the validity of a similar service discovery mechanism integrated into the previous version of OLSR (OLSRv1). In order to advertise services, we have added a new type-length-value structure (TLV) to the OLSRv2 protocol, called service discovery message (SDM), according to the Generalized MANET Packet/Message Format defined in Request For Comments (RFC) 5444. Each node in the ad hoc network only advertises its own services. The advertisement frequency is a user-configurable parameter, so that it can be modified depending on the user requirements. Each node maintains two service tables, one to store information about its own services and another one to store information about the services it discovers in the network. We present simulation results, that compare our service discovery integrated into OLSRv2 with the one defined for OLSRv1 and with the integration of service discovery in Ad hoc On-demand Distance Vector (AODV) protocol, in terms of service discovery ratio, service latency and network overhead.

  5. A communication theoretical analysis of FRET-based mobile ad hoc molecular nanonetworks.

    Science.gov (United States)

    Kuscu, Murat; Akan, Ozgur B

    2014-09-01

    Nanonetworks refer to a group of nanosized machines with very basic operational capabilities communicating to each other in order to accomplish more complex tasks such as in-body drug delivery, or chemical defense. Realizing reliable and high-rate communication between these nanomachines is a fundamental problem for the practicality of these nanonetworks. Recently, we have proposed a molecular communication method based on Förster Resonance Energy Transfer (FRET) which is a nonradiative excited state energy transfer phenomenon observed among fluorescent molecules, i.e., fluorophores. We have modeled the FRET-based communication channel considering the fluorophores as single-molecular immobile nanomachines, and shown its reliability at high rates, and practicality at the current stage of nanotechnology. In this study, for the first time in the literature, we investigate the network of mobile nanomachines communicating through FRET. We introduce two novel mobile molecular nanonetworks: FRET-based mobile molecular sensor/actor nanonetwork (FRET-MSAN) which is a distributed system of mobile fluorophores acting as sensor or actor node; and FRET-based mobile ad hoc molecular nanonetwork (FRET-MAMNET) which consists of fluorophore-based nanotransmitter, nanoreceivers and nanorelays. We model the single message propagation based on birth-death processes with continuous time Markov chains. We evaluate the performance of FRET-MSAN and FRET-MAMNET in terms of successful transmission probability and mean extinction time of the messages, system throughput, channel capacity and achievable communication rates.

  6. Two-terminal reliability analyses for a mobile ad hoc wireless network

    International Nuclear Information System (INIS)

    Cook, Jason L.; Ramirez-Marquez, Jose Emmanuel

    2007-01-01

    Reliability is one of the most important performance measures for emerging technologies. For these systems, shortcomings are often overlooked in early releases as the cutting edge technology overshadows a fragile design. Currently, the proliferation of the mobile ad hoc wireless networks (MAWN) is moving from cutting edge to commodity and thus, reliable performance will be expected. Generally, ad hoc networking is applied for the flexibility and mobility it provides. As a result, military and first responders employ this network scheme and the reliability of the network becomes paramount. To ensure reliability is achieved, one must first be able to analyze and calculate the reliability of the MAWN. This work describes the unique attributes of the MAWN and how the classical analysis of network reliability, where the network configuration is known a priori, can be adjusted to model and analyze this type of network. The methods developed acknowledge the dynamic and scalable nature of the MAWN along with its absence of infrastructure. Thus, the methods rely on a modeling approach that considers the probabilistic formation of different network configurations in a MAWN. Hence, this paper proposes reliability analysis methods that consider the effect of node mobility and the continuous changes in the network's connectivity

  7. Improving VANETs Connectivity with a Totally Ad Hoc Living Mobile Backbone

    Directory of Open Access Journals (Sweden)

    Joilson Alves Junior

    2015-01-01

    Full Text Available The vehicular ad hoc network (VANET for intelligent transportation systems is an emerging concept to improve transportation security, reliability, and management. The network behavior can be totally different in topological aspects because of the mobility of vehicular nodes. The topology can be fully connected when the flow of vehicles is high and may have low connectivity or be invalid when the flow of vehicles is low or unbalanced. In big cities, the metropolitan buses that travel on exclusive lanes may be used to set up a metropolitan vehicular data network (backbone, raising the connectivity among the vehicles. Therefore, this paper proposes the implementation of a living mobile backbone, totally ad hoc (MOB-NET, which will provide infrastructure and raise the network connectivity. In order to show the viability of MOB-NET, statistical analyses were made with real data of express buses that travel through exclusive lanes, besides evaluations through simulations and analytic models. The statistic, analytic, and simulation results prove that the buses that travel through exclusive lanes can be used to build a communication network totally ad hoc and provide connectivity in more than 99% of the time, besides raising the delivery rate up to 95%.

  8. Rollback recovery with low overhead for fault tolerance in mobile ad hoc networks

    Directory of Open Access Journals (Sweden)

    Parmeet Kaur Jaggi

    2015-10-01

    Full Text Available Mobile ad hoc networks (MANETs have significantly enhanced the wireless networks by eliminating the need for any fixed infrastructure. Hence, these are increasingly being used for expanding the computing capacity of existing networks or for implementation of autonomous mobile computing Grids. However, the fragile nature of MANETs makes the constituent nodes susceptible to failures and the computing potential of these networks can be utilized only if they are fault tolerant. The technique of checkpointing based rollback recovery has been used effectively for fault tolerance in static and cellular mobile systems; yet, the implementation of existing protocols for MANETs is not straightforward. The paper presents a novel rollback recovery protocol for handling the failures of mobile nodes in a MANET using checkpointing and sender based message logging. The proposed protocol utilizes the routing protocol existing in the network for implementing a low overhead recovery mechanism. The presented recovery procedure at a node is completely domino-free and asynchronous. The protocol is resilient to the dynamic characteristics of the MANET; allowing a distributed application to be executed independently without access to any wired Grid or cellular network access points. We also present an algorithm to record a consistent global snapshot of the MANET.

  9. A DNA-Inspired Encryption Methodology for Secure, Mobile Ad Hoc Networks

    Science.gov (United States)

    Shaw, Harry

    2012-01-01

    Users are pushing for greater physical mobility with their network and Internet access. Mobile ad hoc networks (MANET) can provide an efficient mobile network architecture, but security is a key concern. A figure summarizes differences in the state of network security for MANET and fixed networks. MANETs require the ability to distinguish trusted peers, and tolerate the ingress/egress of nodes on an unscheduled basis. Because the networks by their very nature are mobile and self-organizing, use of a Public Key Infra structure (PKI), X.509 certificates, RSA, and nonce ex changes becomes problematic if the ideal of MANET is to be achieved. Molecular biology models such as DNA evolution can provide a basis for a proprietary security architecture that achieves high degrees of diffusion and confusion, and resistance to cryptanalysis. A proprietary encryption mechanism was developed that uses the principles of DNA replication and steganography (hidden word cryptography) for confidentiality and authentication. The foundation of the approach includes organization of coded words and messages using base pairs organized into genes, an expandable genome consisting of DNA-based chromosome keys, and a DNA-based message encoding, replication, and evolution and fitness. In evolutionary computing, a fitness algorithm determines whether candidate solutions, in this case encrypted messages, are sufficiently encrypted to be transmitted. The technology provides a mechanism for confidential electronic traffic over a MANET without a PKI for authenticating users.

  10. 移动Ad Hoc网络路由协议综述%A Survey of Routing Protocols for Mobile Ad Hoc Networks

    Institute of Scientific and Technical Information of China (English)

    张顺亮; 叶澄清; 李方敏

    2003-01-01

    A review of current research about routing protocols for mobile Ad Hoc networks is made. Based on classifying of them, the characteristic, the strength and the weakness of these protocols are evaluated respectively. Then some crucial strategies to improve the existing routing protocols are proposed. Besides, a frame of new routing protocol for Ad Hoc networks is put forward. Finally, open issues that still need investigation are listed.

  11. An enhanced performance through agent-based secure approach for mobile ad hoc networks

    Science.gov (United States)

    Bisen, Dhananjay; Sharma, Sanjeev

    2018-01-01

    This paper proposes an agent-based secure enhanced performance approach (AB-SEP) for mobile ad hoc network. In this approach, agent nodes are selected through optimal node reliability as a factor. This factor is calculated on the basis of node performance features such as degree difference, normalised distance value, energy level, mobility and optimal hello interval of node. After selection of agent nodes, a procedure of malicious behaviour detection is performed using fuzzy-based secure architecture (FBSA). To evaluate the performance of the proposed approach, comparative analysis is done with conventional schemes using performance parameters such as packet delivery ratio, throughput, total packet forwarding, network overhead, end-to-end delay and percentage of malicious detection.

  12. Secure neighborhood discovery: A fundamental element for mobile ad hoc networking

    DEFF Research Database (Denmark)

    Papadimitratos, P.; Poturalski, M.; Schaller, P.

    2008-01-01

    Pervasive computing systems will likely be deployed in the near future, with the proliferation of wireless devices and the emergence of ad hoc networking as key enablers. Coping with mobility and the volatility of wireless communications in such systems is critical. Neighborhood discovery (ND......) - the discovery of devices directly reachable for communication or in physical proximity - becomes a fundamental requirement and building block for various applications. However, the very nature of wireless mobile networks makes it easy to abuse ND and thereby compromise the overlying protocols and applications....... Thus, providing methods to mitigate this vulnerability and secure ND is crucial. In this article we focus on this problem and provide definitions of neighborhood types and ND protocol properties, as well as a broad classification of attacks. Our ND literature survey reveals that securing ND is indeed...

  13. PSO-Optimized Hopfield Neural Network-Based Multipath Routing for Mobile Ad-hoc Networks

    Directory of Open Access Journals (Sweden)

    Mansour Sheikhan

    2012-06-01

    Full Text Available Mobile ad-hoc network (MANET is a dynamic collection of mobile computers without the need for any existing infrastructure. Nodes in a MANET act as hosts and routers. Designing of robust routing algorithms for MANETs is a challenging task. Disjoint multipath routing protocols address this problem and increase the reliability, security and lifetime of network. However, selecting an optimal multipath is an NP-complete problem. In this paper, Hopfield neural network (HNN which its parameters are optimized by particle swarm optimization (PSO algorithm is proposed as multipath routing algorithm. Link expiration time (LET between each two nodes is used as the link reliability estimation metric. This approach can find either node-disjoint or link-disjoint paths in singlephase route discovery. Simulation results confirm that PSO-HNN routing algorithm has better performance as compared to backup path set selection algorithm (BPSA in terms of the path set reliability and number of paths in the set.

  14. An Opportunistic Routing for Data Forwarding Based on Vehicle Mobility Association in Vehicular Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    Leilei Wang

    2017-11-01

    Full Text Available Vehicular ad hoc networks (VANETs have emerged as a new powerful technology for data transmission between vehicles. Efficient data transmission accompanied with low data delay plays an important role in selecting the ideal data forwarding path in VANETs. This paper proposes a new opportunity routing protocol for data forwarding based on vehicle mobility association (OVMA. With assistance from the vehicle mobility association, data can be forwarded without passing through many extra intermediate nodes. Besides, each vehicle carries the only replica information to record its associated vehicle information, so the routing decision can adapt to the vehicle densities. Simulation results show that the OVMA protocol can extend the network lifetime, improve the performance of data delivery ratio, and reduce the data delay and routing overhead when compared to the other well-known routing protocols.

  15. Modelling and Initial Validation of the DYMO Routing Protocol for Mobile Ad-Hoc Networks

    DEFF Research Database (Denmark)

    Espensen, Kristian Asbjørn Leth; Kjeldsen, Mads Keblov; Kristensen, Lars Michael

    2008-01-01

    A mobile ad-hoc network (MANET) is an infrastructureless network established by a set of mobile devices using wireless communication. The Dynamic MANET On-demand (DYMO) protocol is a routing protocol for multi-hop communication in MANETs currently under development by the Internet Engineering Task...... Force (IETF). This paper presents a Coloured Petri Net (CPN) model of the mandatory parts of the DYMO protocol, and shows how scenario-based state space exploration has been used to validate key properties of the protocol. Our CPN modelling and verification work has spanned two revisions of the DYMO...... protocol specification and have had direct impact on the most recent version of the protocol specification....

  16. Link reliability based hybrid routing for tactical mobile ad hoc network

    Institute of Scientific and Technical Information of China (English)

    Xie Xiaochuan; Wei Gang; Wu Keping; Wang Gang; Jia Shilou

    2008-01-01

    Tactical mobile ad hoc network (MANET) is a collection of mobile nodes forming a temporary network,without the aid of pre-established network infrastructure. The routing protocol has a crucial impact on the networkperformance in battlefields. Link reliability based hybrid routing (LRHR) is proposed, which is a novel hybrid routing protocol, for tactical MANET. Contrary to the traditional single path routing strategy, multiple paths are established between a pair of source-destination nodes. In the hybrid routing strategy, the rate of topological change provides a natural mechanism for switching dynamically between table-driven and on-demand routing. The simulation results indicate that the performances of the protocol in packet delivery ratio, routing overhead, and average end-to-end delay are better than the conventional routing protocol.

  17. Reputation-Based Internet Protocol Security: A Multilayer Security Framework for Mobile Ad Hoc Networks

    Science.gov (United States)

    2010-09-01

    motivated research in behavior grading systems [56]. Peer-to-peer eCommerce appli- cations such as eBay, Amazon, uBid, and Yahoo have performed research that...Security in Mobile Ad Hoc Networks”. IEEE Security & Privacy , 72–75, 2008. 15. Chakeres, ID and EM Belding-Royer. “AODV Routing Protocol Implementa...Detection System”. Proceedings of IEEE Computer Society Symposium on Research in Security and Privacy , 240–250. 1992. 21. Devore, J.L. and N.R. Farnum

  18. Performance Analysis of Mobile Ad Hoc Unmanned Aerial Vehicle Communication Networks with Directional Antennas

    Directory of Open Access Journals (Sweden)

    Abdel Ilah Alshbatat

    2010-01-01

    Full Text Available Unmanned aerial vehicles (UAVs have the potential of creating an ad hoc communication network in the air. Most UAVs used in communication networks are equipped with wireless transceivers using omnidirectional antennas. In this paper, we consider a collection of UAVs that communicate through wireless links as a mobile ad-hoc network using directional antennas. The network design goal is to maximize the throughput and minimize the end-to-end delay. In this respect, we propose a new medium access control protocol for a network of UAVs with directional antennas. We analyze the communication channel between the UAVs and the effect of aircraft attitude on the network performance. Using the optimized network engineering tool (OPNET, we compare our protocol with the IEEE 802.11 protocol for omnidirectional antennas. The simulation results show performance improvement in end-to-end delay as well as throughput.

  19. A LOOP-BASED APPROACH IN CLUSTERING AND ROUTING IN MOBILE AD HOC NETWORKS

    Institute of Scientific and Technical Information of China (English)

    Li Yanping; Wang Xin; Xue Xiangyang; C.K. Toh

    2006-01-01

    Although clustering is a convenient framework to enable traffic control and service support in Mobile Ad hoc NETworks (MANETs), it is seldom adopted in practice due to the additional traffic overhead it leads to for the resource limited ad hoc network. In order to address this problem, we proposed a loop-based approach to combine clustering and routing. By employing loop topologies, topology information is disseminated with a loop instead of a single node, which provides better robustness, and the nature of a loop that there are two paths between each pair of nodes within a loop suggests smart route recovery strategy. Our approach is composed of setup procedure, regular procedure and recovery procedure to achieve clustering, routing and emergent route recovering.

  20. Enhanced Secure Trusted AODV (ESTA Protocol to Mitigate Blackhole Attack in Mobile Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    Dilraj Singh

    2015-09-01

    Full Text Available The self-organizing nature of the Mobile Ad hoc Networks (MANETs provide a communication channel anywhere, anytime without any pre-existing network infrastructure. However, it is exposed to various vulnerabilities that may be exploited by the malicious nodes. One such malicious behavior is introduced by blackhole nodes, which can be easily introduced in the network and, in turn, such nodes try to crumble the working of the network by dropping the maximum data under transmission. In this paper, a new protocol is proposed which is based on the widely used Ad hoc On-Demand Distance Vector (AODV protocol, Enhanced Secure Trusted AODV (ESTA, which makes use of multiple paths along with use of trust and asymmetric cryptography to ensure data security. The results, based on NS-3 simulation, reveal that the proposed protocol is effectively able to counter the blackhole nodes in three different scenarios.

  1. Formal reconstruction of attack scenarios in mobile ad hoc and sensor networks

    Directory of Open Access Journals (Sweden)

    Rekhis Slim

    2011-01-01

    Full Text Available Abstract Several techniques of theoretical digital investigation are presented in the literature but most of them are unsuitable to cope with attacks in wireless networks, especially in Mobile Ad hoc and Sensor Networks (MASNets. In this article, we propose a formal approach for digital investigation of security attacks in wireless networks. We provide a model for describing attack scenarios in a wireless environment, and system and network evidence generated consequently. The use of formal approaches is motivated by the need to avoid ad hoc generation of results that impedes the accuracy of analysis and integrity of investigation. We develop an inference system that integrates the two types of evidence, handles incompleteness and duplication of information in them, and allows possible and provable actions and attack scenarios to be generated. To illustrate the proposal, we consider a case study dealing with the investigation of a remote buffer overflow attack.

  2. Illustration, detection and prevention of sleep deprivation anomaly in mobile ad hoc networks

    International Nuclear Information System (INIS)

    Nadeem, A.; Ahsan, K.; Sarim, M.

    2017-01-01

    MANETs (Mobile Ad Hoc Networks) have applications in various walks of life from rescue operations to battle field operations, personal and commercial. However, routing operations in MANETs are still vulnerable to anomalies and DoS (Denial of Service) attacks such as sleep deprivation. In SD (Sleep Deprivation) attack malicious node exploits the vulnerability in the route discovery function of the reactive routing protocol for example AODV (Ad Hoc On-Demand Distance Vector). In this paper, we first illustrate the SD anomaly in MANETs and then propose a SD detection and prevention algorithm which efficiently deals with this attack. We assess the performance of our proposed approach through simulation, evaluating its successfulness using different network scenarios. (author)

  3. An Automated Tool for the Creation of Desired Emulated Topologies of a Mobile Ad-Hoc Network

    National Research Council Canada - National Science Library

    Nguyen, Binh Q

    2006-01-01

    This report documents a research effort that the U.S. Army Research Laboratory conducted in FY 2005 in support of the development of advanced technologies for tactical mobile ad hoc networks (MANET...

  4. The added value of a gaming context and intelligent adaptation for a mobile application for vocabulary learning

    NARCIS (Netherlands)

    Sandberg, J.; Maris, M.; Hoogendoorn, P.

    2014-01-01

    Two groups participated in a study on the added value of a gaming context and intelligent adaptation for a mobile learning application. The control group worked at home for a fortnight with the original Mobile English Learning application (MEL-original) developed in a previous project. The

  5. An Agent-Based Approach To Nodes Misbehaviour Detection In Mobile Ad-Hoc Networks

    Directory of Open Access Journals (Sweden)

    Otor Samera U.

    2017-02-01

    Full Text Available Existing Misbehaviour Detection Systems in Mobile Ad-hoc Networks MANETs are challenged with routing overhead and high latency resulting from complexity and failure to isolate and block misbehaving nodes for the reason that it is difficult to detect them as they participate fully in route finding. In this work a Mobile Agent-Based Acknowledgement scheme MAACK was formulated to address this problem using an object oriented algorithm deployed to report misbehaving nodes to the source and destination by registering the Internet Protocol IP address of misbehaving nodes in their header. The scheme was simulated using Network Simulator-3 NS-3 and results benchmarked with an existing scheme the Enhanced Adaptive Acknowledgment EAACK using packet delivery ratio routing overhead and latency as performance metrics in the two scenarios. The results showed that the MAACK paradigm guaranteed a higher packet delivery ratio lower latency and routing overhead than the EAACK scheme. The model can be adapted by Ad-Hoc network protocol developers.

  6. Energy-Aware Multipath Routing Scheme Based on Particle Swarm Optimization in Mobile Ad Hoc Networks.

    Science.gov (United States)

    Robinson, Y Harold; Rajaram, M

    2015-01-01

    Mobile ad hoc network (MANET) is a collection of autonomous mobile nodes forming an ad hoc network without fixed infrastructure. Dynamic topology property of MANET may degrade the performance of the network. However, multipath selection is a great challenging task to improve the network lifetime. We proposed an energy-aware multipath routing scheme based on particle swarm optimization (EMPSO) that uses continuous time recurrent neural network (CTRNN) to solve optimization problems. CTRNN finds the optimal loop-free paths to solve link disjoint paths in a MANET. The CTRNN is used as an optimum path selection technique that produces a set of optimal paths between source and destination. In CTRNN, particle swarm optimization (PSO) method is primly used for training the RNN. The proposed scheme uses the reliability measures such as transmission cost, energy factor, and the optimal traffic ratio between source and destination to increase routing performance. In this scheme, optimal loop-free paths can be found using PSO to seek better link quality nodes in route discovery phase. PSO optimizes a problem by iteratively trying to get a better solution with regard to a measure of quality. The proposed scheme discovers multiple loop-free paths by using PSO technique.

  7. Evaluation of mobile ad hoc network reliability using propagation-based link reliability model

    International Nuclear Information System (INIS)

    Padmavathy, N.; Chaturvedi, Sanjay K.

    2013-01-01

    A wireless mobile ad hoc network (MANET) is a collection of solely independent nodes (that can move randomly around the area of deployment) making the topology highly dynamic; nodes communicate with each other by forming a single hop/multi-hop network and maintain connectivity in decentralized manner. MANET is modelled using geometric random graphs rather than random graphs because the link existence in MANET is a function of the geometric distance between the nodes and the transmission range of the nodes. Among many factors that contribute to the MANET reliability, the reliability of these networks also depends on the robustness of the link between the mobile nodes of the network. Recently, the reliability of such networks has been evaluated for imperfect nodes (transceivers) with binary model of communication links based on the transmission range of the mobile nodes and the distance between them. However, in reality, the probability of successful communication decreases as the signal strength deteriorates due to noise, fading or interference effects even up to the nodes' transmission range. Hence, in this paper, using a propagation-based link reliability model rather than a binary-model with nodes following a known failure distribution to evaluate the network reliability (2TR m , ATR m and AoTR m ) of MANET through Monte Carlo Simulation is proposed. The method is illustrated with an application and some imperative results are also presented

  8. Approaches to Addressing Service Selection Ties in Ad Hoc Mobile Cloud Computing

    Directory of Open Access Journals (Sweden)

    Ayotuyi Tosin Akinola

    2018-01-01

    Full Text Available The ad hoc mobile cloud (AMC allows mobile devices to connect together through a wireless connection or any other means and send a request for web services from one to another within the mobile cloud. However, one of the major challenges in the AMC is the occurrence of dissatisfaction experienced by the users. This is because there are many services with similar functionalities but varying nonfunctional properties. Moreover, another resultant cause of user dissatisfaction being coupled with runtime redundancy is the attainment of similar quality computations during service selection, often referred to as “service selection ties.” In an attempt to address this challenge, service selection mechanisms for the AMC were developed in this work. This includes the use of selected quality of service properties coupled with user feedback data to determine the most suitable service. These mechanisms were evaluated using the experimental method. The evaluation of the mechanisms mainly focused on the metrics that evaluate the satisfaction of users' interest via the quantitative evaluation. The experiments affirmed that the use of the shortest distance can help to break selection ties between potential servicing nodes. Also, a continuous use of updated and unlimited range of users' assessments enhances an optimal service selection.

  9. Securing mobile ad hoc networks using danger theory-based artificial immune algorithm.

    Science.gov (United States)

    Abdelhaq, Maha; Alsaqour, Raed; Abdelhaq, Shawkat

    2015-01-01

    A mobile ad hoc network (MANET) is a set of mobile, decentralized, and self-organizing nodes that are used in special cases, such as in the military. MANET properties render the environment of this network vulnerable to different types of attacks, including black hole, wormhole and flooding-based attacks. Flooding-based attacks are one of the most dangerous attacks that aim to consume all network resources and thus paralyze the functionality of the whole network. Therefore, the objective of this paper is to investigate the capability of a danger theory-based artificial immune algorithm called the mobile dendritic cell algorithm (MDCA) to detect flooding-based attacks in MANETs. The MDCA applies the dendritic cell algorithm (DCA) to secure the MANET with additional improvements. The MDCA is tested and validated using Qualnet v7.1 simulation tool. This work also introduces a new simulation module for a flooding attack called the resource consumption attack (RCA) using Qualnet v7.1. The results highlight the high efficiency of the MDCA in detecting RCAs in MANETs.

  10. Analysis of DDoS Attack Effect and Protection Scheme in Wireless Mobile Ad-hoc Network

    OpenAIRE

    Ramratan Ahirwal; Leeladhar Mahour

    2012-01-01

    In Wireless mobile Ad Hoc Networks (MANET) every node functions as transmitter, router and data sink is network without infrastructure. Detecting malicious nodes in an open ad-hoc network in whichparticipating nodes have no previous security associations presents a number of challenges not faced by traditional wired networks. Traffic monitoring in wired networks is usually performed at switches,routers and gateways, but an ad-hoc network does not have these types of network elements where the...

  11. A Performance Evaluation Model for Mobile Ad Hoc Networks and Sensor Networks

    Directory of Open Access Journals (Sweden)

    Heng LUO

    2014-03-01

    Full Text Available Potential applications in areas such as military sites and disaster relief fields that are characterized by absence of prefixed infrastructure justify the development of mobile ad hoc networks (MANETs and wireless sensor networks (WSNs. However, unfavorable wireless links and dynamic topology are still challenging, leading to the proposal of a collection of routing protocols for MANETs and WSNs. Nevertheless the performance of algorithms may vary with deployment scenario due to the application dependent philosophy behind algorithms. In this paper, the performance evaluation problem for MANETs and WSNs is investigated and a novel performance ranking model, termed AHP-SAW, is proposed. For simplicity but without loss of generality, the performance of two routing protocols DSDV and DSR are studies based on which ranking results are provided. Extensive simulations show that an overall 37.2 %, at most, gain may be achieved based on the AHP-SAW model.

  12. A Protocol for Content-Based Communication in Disconnected Mobile Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    Julien Haillot

    2010-01-01

    Full Text Available In content-based communication, information flows towards interested hosts rather than towards specifically set destinations. This new style of communication perfectly fits the needs of applications dedicated to information sharing, news distribution, service advertisement and discovery, etc. In this paper we address the problem of supporting content-based communication in partially or intermittently connected mobile ad hoc networks (MANETs. The protocol we designed leverages on the concepts of opportunistic networking and delay-tolerant networking in order to account for the absence of end-to-end connectivity in disconnected MANETs. The paper provides an overview of the protocol, as well as simulation results that show how this protocol can perform in realistic conditions.

  13. Construction of Pipelined Strategic Connected Dominating Set for Mobile Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    Ceronmani Sharmila

    2016-06-01

    Full Text Available Efficient routing between nodes is the most important challenge in a Mobile Ad Hoc Network (MANET. A Connected Dominating Set (CDS acts as a virtual backbone for routing in a MANET. Hence, the construction of CDS based on the need and its application plays a vital role in the applications of MANET. The PipeLined Strategic CDS (PLS-CDS is constructed based on strategy, dynamic diameter and transmission range. The strategy used for selecting the starting node is, any source node in the network, which has its entire destination within a virtual pipelined coverage, instead of the node with maximum connectivity. The other nodes are then selected based on density and velocity. The proposed CDS also utilizes the energy of the nodes in the network in an optimized manner. Simulation results showed that the proposed algorithm is better in terms of size of the CDS and average hop per path length.

  14. A survey and taxonomy of distributed certificate authorities in mobile ad hoc networks

    Directory of Open Access Journals (Sweden)

    Jabbehdari Sam

    2011-01-01

    Full Text Available Abstract Certificate authorities (CAs are the main components of PKI that enable us for providing basic security services in wired networks and Internet. But, we cannot use centralized CAs, in mobile ad hoc networks (MANETs. So, many efforts have been made to adapt CA to the special characteristics of MANETs and new concepts such as distributed CAs (DCAs have been proposed that distribute the functionality of CA between MANET nodes. In this article, we study various proposed DCA schemes for MANET and then classify these schemes according to their internal structures and techniques. Finally, we propose the characteristics of an ideal DCA system that can be used to verify the completeness of any DCA scheme. This classification and taxonomy identify the weakness and constraints of each scheme, and are very important for designing more secure, scalable, and high performance DCA systems for MANETs and other networks.

  15. AUTHENTICATION ARCHITECTURE USING THRESHOLD CRYPTOGRAPHY IN KERBEROS FOR MOBILE AD HOC NETWORKS

    Directory of Open Access Journals (Sweden)

    Hadj Gharib

    2014-06-01

    Full Text Available The use of wireless technologies is gradually increasing and risks related to the use of these technologies are considerable. Due to their dynamically changing topology and open environment without a centralized policy control of a traditional network, a mobile ad hoc network (MANET is vulnerable to the presence of malicious nodes and attacks. The ideal solution to overcome a myriad of security concerns in MANET’s is the use of reliable authentication architecture. In this paper we propose a new key management scheme based on threshold cryptography in kerberos for MANET’s, the proposed scheme uses the elliptic curve cryptography method that consumes fewer resources well adapted to the wireless environment. Our approach shows a strength and effectiveness against attacks.

  16. Improved AODV route recovery in mobile ad-hoc networks using a genetic algorithm

    Directory of Open Access Journals (Sweden)

    Ahmad Maleki

    2014-09-01

    Full Text Available An important issue in ad-hoc on-demand distance vector (AODV routing protocols is route failure caused by node mobility in the MANETs. The AODV requires a new route discovery procedure whenever a route breaks and these frequent route discoveries increase transmission delays and routing overhead. The present study proposes a new method for AODVs using a genetic algorithm to improve the route recovery mechanism. When failure occurs in a route, the proposed method (GAAODV makes decisions regarding the QOS parameter to select source or local repair. The task of the genetic algorithm is to find an appropriate combination of weights to optimize end-to-end delay. This paper evaluates the metrics of routing overhead, average end-to-end delay, and packet delivery ratio. Comparison of the new algorithm and AODV (RFC 3561 using a NS-2 simulator shows that GAAODV obtains better results for the QOS parameters.

  17. Mobile Ad Hoc Networks in Bandwidth-Demanding Mission-Critical Applications: Practical Implementation Insights

    KAUST Repository

    Bader, Ahmed

    2016-09-28

    There has been recently a growing trend of using live video feeds in mission-critical applications. Real-time video streaming from front-end personnel or mobile agents is believed to substantially improve situational awareness in mission-critical operations such as disaster relief, law enforcement, and emergency response. Mobile Ad Hoc Networks (MANET) is a natural contender in such contexts. However, classical MANET routing schemes fall short in terms of scalability, bandwidth and latency; all three metrics being quite essential for mission-critical applications. As such, autonomous cooperative routing (ACR) has gained traction as the most viable MANET proposition. Nonetheless, ACR is also associated with a few implementation challenges. If they go unaddressed, will deem ACR practically useless. In this paper, efficient and low-complexity remedies to those issues are presented, analyzed, and validated. The validation is based on field experiments carried out using software-defined radio (SDR) platforms. Compared to classical MANET routing schemes, ACR was shown to offer up to 2X better throughput, more than 4X reduction in end-to-end latency, while observing a given target of transport rate normalized to energy consumption.

  18. Mobile Ad Hoc Network Energy Cost Algorithm Based on Artificial Bee Colony

    Directory of Open Access Journals (Sweden)

    Mustafa Tareq

    2017-01-01

    Full Text Available A mobile ad hoc network (MANET is a collection of mobile nodes that dynamically form a temporary network without using any existing network infrastructure. MANET selects a path with minimal number of intermediate nodes to reach the destination node. As the distance between each node increases, the quantity of transmission power increases. The power level of nodes affects the simplicity with which a route is constituted between a couple of nodes. This study utilizes the swarm intelligence technique through the artificial bee colony (ABC algorithm to optimize the energy consumption in a dynamic source routing (DSR protocol in MANET. The proposed algorithm is called bee DSR (BEEDSR. The ABC algorithm is used to identify the optimal path from the source to the destination to overcome energy problems. The performance of the BEEDSR algorithm is compared with DSR and bee-inspired protocols (BeeIP. The comparison was conducted based on average energy consumption, average throughput, average end-to-end delay, routing overhead, and packet delivery ratio performance metrics, varying the node speed and packet size. The BEEDSR algorithm is superior in performance than other protocols in terms of energy conservation and delay degradation relating to node speed and packet size.

  19. Quality-of-Service Routing Using Path and Power Aware Techniques in Mobile Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    R. Asokan

    2008-01-01

    Full Text Available Mobile ad hoc network (MANET is a collection of wireless mobile hosts dynamically forming a temporary network without the aid of any existing established infrastructure. Quality of service (QoS is a set of service requirements that needs to be met by the network while transporting a packet stream from a source to its destination. QoS support MANETs is a challenging task due to the dynamic topology and limited resources. The main objective of this paper is to enhance the QoS routing for MANET using temporally ordered routing algorithm (TORA with self-healing and optimized routing techniques (SHORT. SHORT improves routing optimality by monitoring routing paths continuously and redirecting the path whenever a shortcut path is available. In this paper, the performance comparison of TORA and TORA with SHORT has been analyzed using network simulator for various parameters. TORA with SHORT enhances performance of TORA in terms of throughput, packet loss, end-to-end delay, and energy.

  20. Cooperative Caching in Mobile Ad Hoc Networks Based on Data Utility

    Directory of Open Access Journals (Sweden)

    Narottam Chand

    2007-01-01

    Full Text Available Cooperative caching, which allows sharing and coordination of cached data among clients, is a potential technique to improve the data access performance and availability in mobile ad hoc networks. However, variable data sizes, frequent data updates, limited client resources, insufficient wireless bandwidth and client's mobility make cache management a challenge. In this paper, we propose a utility based cache replacement policy, least utility value (LUV, to improve the data availability and reduce the local cache miss ratio. LUV considers several factors that affect cache performance, namely access probability, distance between the requester and data source/cache, coherency and data size. A cooperative cache management strategy, Zone Cooperative (ZC, is developed that employs LUV as replacement policy. In ZC one-hop neighbors of a client form a cooperation zone since the cost for communication with them is low both in terms of energy consumption and message exchange. Simulation experiments have been conducted to evaluate the performance of LUV based ZC caching strategy. The simulation results show that, LUV replacement policy substantially outperforms the LRU policy.

  1. Secure and Fair Cluster Head Selection Protocol for Enhancing Security in Mobile Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    B. Paramasivan

    2014-01-01

    Full Text Available Mobile ad hoc networks (MANETs are wireless networks consisting of number of autonomous mobile devices temporarily interconnected into a network by wireless media. MANETs become one of the most prevalent areas of research in the recent years. Resource limitations, energy efficiency, scalability, and security are the great challenging issues in MANETs. Due to its deployment nature, MANETs are more vulnerable to malicious attack. The secure routing protocols perform very basic security related functions which are not sufficient to protect the network. In this paper, a secure and fair cluster head selection protocol (SFCP is proposed which integrates security factors into the clustering approach for achieving attacker identification and classification. Byzantine agreement based cooperative technique is used for attacker identification and classification to make the network more attack resistant. SFCP used to solve this issue by making the nodes that are totally surrounded by malicious neighbors adjust dynamically their belief and disbelief thresholds. The proposed protocol selects the secure and energy efficient cluster head which acts as a local detector without imposing overhead to the clustering performance. SFCP is simulated in network simulator 2 and compared with two protocols including AODV and CBRP.

  2. Secure and fair cluster head selection protocol for enhancing security in mobile ad hoc networks.

    Science.gov (United States)

    Paramasivan, B; Kaliappan, M

    2014-01-01

    Mobile ad hoc networks (MANETs) are wireless networks consisting of number of autonomous mobile devices temporarily interconnected into a network by wireless media. MANETs become one of the most prevalent areas of research in the recent years. Resource limitations, energy efficiency, scalability, and security are the great challenging issues in MANETs. Due to its deployment nature, MANETs are more vulnerable to malicious attack. The secure routing protocols perform very basic security related functions which are not sufficient to protect the network. In this paper, a secure and fair cluster head selection protocol (SFCP) is proposed which integrates security factors into the clustering approach for achieving attacker identification and classification. Byzantine agreement based cooperative technique is used for attacker identification and classification to make the network more attack resistant. SFCP used to solve this issue by making the nodes that are totally surrounded by malicious neighbors adjust dynamically their belief and disbelief thresholds. The proposed protocol selects the secure and energy efficient cluster head which acts as a local detector without imposing overhead to the clustering performance. SFCP is simulated in network simulator 2 and compared with two protocols including AODV and CBRP.

  3. FRCA: A Fuzzy Relevance-Based Cluster Head Selection Algorithm for Wireless Mobile Ad-Hoc Sensor Networks

    Directory of Open Access Journals (Sweden)

    Taegwon Jeong

    2011-05-01

    Full Text Available Clustering is an important mechanism that efficiently provides information for mobile nodes and improves the processing capacity of routing, bandwidth allocation, and resource management and sharing. Clustering algorithms can be based on such criteria as the battery power of nodes, mobility, network size, distance, speed and direction. Above all, in order to achieve good clustering performance, overhead should be minimized, allowing mobile nodes to join and leave without perturbing the membership of the cluster while preserving current cluster structure as much as possible. This paper proposes a Fuzzy Relevance-based Cluster head selection Algorithm (FRCA to solve problems found in existing wireless mobile ad hoc sensor networks, such as the node distribution found in dynamic properties due to mobility and flat structures and disturbance of the cluster formation. The proposed mechanism uses fuzzy relevance to select the cluster head for clustering in wireless mobile ad hoc sensor networks. In the simulation implemented on the NS-2 simulator, the proposed FRCA is compared with algorithms such as the Cluster-based Routing Protocol (CBRP, the Weighted-based Adaptive Clustering Algorithm (WACA, and the Scenario-based Clustering Algorithm for Mobile ad hoc networks (SCAM. The simulation results showed that the proposed FRCA achieves better performance than that of the other existing mechanisms.

  4. FRCA: a fuzzy relevance-based cluster head selection algorithm for wireless mobile ad-hoc sensor networks.

    Science.gov (United States)

    Lee, Chongdeuk; Jeong, Taegwon

    2011-01-01

    Clustering is an important mechanism that efficiently provides information for mobile nodes and improves the processing capacity of routing, bandwidth allocation, and resource management and sharing. Clustering algorithms can be based on such criteria as the battery power of nodes, mobility, network size, distance, speed and direction. Above all, in order to achieve good clustering performance, overhead should be minimized, allowing mobile nodes to join and leave without perturbing the membership of the cluster while preserving current cluster structure as much as possible. This paper proposes a Fuzzy Relevance-based Cluster head selection Algorithm (FRCA) to solve problems found in existing wireless mobile ad hoc sensor networks, such as the node distribution found in dynamic properties due to mobility and flat structures and disturbance of the cluster formation. The proposed mechanism uses fuzzy relevance to select the cluster head for clustering in wireless mobile ad hoc sensor networks. In the simulation implemented on the NS-2 simulator, the proposed FRCA is compared with algorithms such as the Cluster-based Routing Protocol (CBRP), the Weighted-based Adaptive Clustering Algorithm (WACA), and the Scenario-based Clustering Algorithm for Mobile ad hoc networks (SCAM). The simulation results showed that the proposed FRCA achieves better performance than that of the other existing mechanisms.

  5. A Dynamic Probabilistic Based Broadcasting Scheme for MANETs

    Science.gov (United States)

    Shanmugam, Kannan; Subburathinam, Karthik; Velayuthampalayam Palanisamy, Arunachalam

    2016-01-01

    MANET is commonly known as Mobile Ad Hoc Network in which cluster of mobile nodes can communicate with each other without having any basic infrastructure. The basic characteristic of MANET is dynamic topology. Due to the dynamic behavior nature, the topology of the network changes very frequently, and this will lead to the failure of the valid route repeatedly. Thus, the process of finding the valid route leads to notable drop in the throughput of the network. To identify a new valid path to the targeted mobile node, available proactive routing protocols use simple broadcasting method known as simple flooding. The simple flooding method broadcasts the RREQ packet from the source to the rest of the nodes in mobile network. But the problem with this method is disproportionate repetitive retransmission of RREQ packet which could result in high contention on the available channel and packet collision due to extreme traffic in the network. A reasonable number of routing algorithms have been suggested for reducing the lethal impact of flooding the RREQ packets. However, most of the algorithms have resulted in considerable amount of complexity and deduce the throughput by depending on special hardware components and maintaining complex information which will be less frequently used. By considering routing complexity with the goal of increasing the throughput of the network, in this paper, we have introduced a new approach called Dynamic Probabilistic Route (DPR) discovery. The Node's Forwarding Probability (NFP) is dynamically calculated by the DPR mobile nodes using Probability Function (PF) which depends on density of local neighbor nodes and the cumulative number of its broadcast covered neighbors. PMID:27019868

  6. Unmanned Aerial ad Hoc Networks: Simulation-Based Evaluation of Entity Mobility Models’ Impact on Routing Performance

    Directory of Open Access Journals (Sweden)

    Jean-Daniel Medjo Me Biomo

    2015-06-01

    Full Text Available An unmanned aerial ad hoc network (UAANET is a special type of mobile ad hoc network (MANET. For these networks, researchers rely mostly on simulations to evaluate their proposed networking protocols. Hence, it is of great importance that the simulation environment of a UAANET replicates as much as possible the reality of UAVs. One major component of that environment is the movement pattern of the UAVs. This means that the mobility model used in simulations has to be thoroughly understood in terms of its impact on the performance of the network. In this paper, we investigate how mobility models affect the performance of UAANET in simulations in order to come up with conclusions/recommendations that provide a benchmark for future UAANET simulations. To that end, we first propose a few metrics to evaluate the mobility models. Then, we present five random entity mobility models that allow nodes to move almost freely and independently from one another and evaluate four carefully-chosen MANET/UAANET routing protocols: ad hoc on-demand distance vector (AODV, optimized link state routing (OLSR, reactive-geographic hybrid routing (RGR and geographic routing protocol (GRP. In addition, flooding is also evaluated. The results show a wide variation of the protocol performance over different mobility models. These performance differences can be explained by the mobility model characteristics, and we discuss these effects. The results of our analysis show that: (i the enhanced Gauss–Markov (EGM mobility model is best suited for UAANET; (ii OLSR, a table-driven proactive routing protocol, and GRP, a position-based geographic protocol, are the protocols most sensitive to the change of mobility models; (iii RGR, a reactive-geographic hybrid routing protocol, is best suited for UAANET.

  7. Two-terminal reliability of a mobile ad hoc network under the asymptotic spatial distribution of the random waypoint model

    International Nuclear Information System (INIS)

    Chen, Binchao; Phillips, Aaron; Matis, Timothy I.

    2012-01-01

    The random waypoint (RWP) mobility model is frequently used in describing the movement pattern of mobile users in a mobile ad hoc network (MANET). As the asymptotic spatial distribution of nodes under a RWP model exhibits central tendency, the two-terminal reliability of the MANET is investigated as a function of the source node location. In particular, analytical expressions for one and two hop connectivities are developed as well as an efficient simulation methodology for two-terminal reliability. A study is then performed to assess the effect of nodal density and network topology on network reliability.

  8. Investing in communities: evaluating the added value of community mobilization on HIV prevention outcomes among FSWs in India.

    Science.gov (United States)

    Kuhlmann, Anne Sebert; Galavotti, Christine; Hastings, Philip; Narayanan, Pradeep; Saggurti, Niranjan

    2014-04-01

    Community mobilization often requires greater time and resource investments than typical interventions, yet few evaluations exist to justify these investments. We evaluated the added benefit of community mobilization on HIV prevention outcomes among female sex workers (FSWs) using a composite measure of volunteer participation in program committees by FSWs. After adjusting for treatment propensity, we used multilevel structural equation modeling (MSEM) to test our program theory. We hypothesized that stronger community mobilization would be associated with increased levels of consistent condom use and with increased levels of perceived fairness, mediated by psychosocial processes. Community mobilization had an indirect effect on consistent condom use mediated through social cohesion and an indirect effect on perceived fairness mediated by collective efficacy. Our results suggest higher levels of community mobilization help improve condom use and reduce perceived discrimination beyond the effects of the core HIV intervention program. We recommend further testing of this model.

  9. VisitSense: Sensing Place Visit Patterns from Ambient Radio on Smartphones for Targeted Mobile Ads in Shopping Malls

    Directory of Open Access Journals (Sweden)

    Byoungjip Kim

    2015-07-01

    Full Text Available In this paper, we introduce a novel smartphone framework called VisitSense that automatically detects and predicts a smartphone user’s place visits from ambient radio to enable behavioral targeting for mobile ads in large shopping malls. VisitSense enables mobile app developers to adopt visit-pattern-aware mobile advertising for shopping mall visitors in their apps. It also benefits mobile users by allowing them to receive highly relevant mobile ads that are aware of their place visit patterns in shopping malls. To achieve the goal, VisitSense employs accurate visit detection and prediction methods. For accurate visit detection, we develop a change-based detection method to take into consideration the stability change of ambient radio and the mobility change of users. It performs well in large shopping malls where ambient radio is quite noisy and causes existing algorithms to easily fail. In addition, we proposed a causality-based visit prediction model to capture the causality in the sequential visit patterns for effective prediction. We have developed a VisitSense prototype system, and a visit-pattern-aware mobile advertising application that is based on it. Furthermore, we deploy the system in the COEX Mall, one of the largest shopping malls in Korea, and conduct diverse experiments to show the effectiveness of VisitSense.

  10. VisitSense: Sensing Place Visit Patterns from Ambient Radio on Smartphones for Targeted Mobile Ads in Shopping Malls.

    Science.gov (United States)

    Kim, Byoungjip; Kang, Seungwoo; Ha, Jin-Young; Song, Junehwa

    2015-07-16

    In this paper, we introduce a novel smartphone framework called VisitSense that automatically detects and predicts a smartphone user's place visits from ambient radio to enable behavioral targeting for mobile ads in large shopping malls. VisitSense enables mobile app developers to adopt visit-pattern-aware mobile advertising for shopping mall visitors in their apps. It also benefits mobile users by allowing them to receive highly relevant mobile ads that are aware of their place visit patterns in shopping malls. To achieve the goal, VisitSense employs accurate visit detection and prediction methods. For accurate visit detection, we develop a change-based detection method to take into consideration the stability change of ambient radio and the mobility change of users. It performs well in large shopping malls where ambient radio is quite noisy and causes existing algorithms to easily fail. In addition, we proposed a causality-based visit prediction model to capture the causality in the sequential visit patterns for effective prediction. We have developed a VisitSense prototype system, and a visit-pattern-aware mobile advertising application that is based on it. Furthermore, we deploy the system in the COEX Mall, one of the largest shopping malls in Korea, and conduct diverse experiments to show the effectiveness of VisitSense.

  11. VisitSense: Sensing Place Visit Patterns from Ambient Radio on Smartphones for Targeted Mobile Ads in Shopping Malls

    Science.gov (United States)

    Kim, Byoungjip; Kang, Seungwoo; Ha, Jin-Young; Song, Junehwa

    2015-01-01

    In this paper, we introduce a novel smartphone framework called VisitSense that automatically detects and predicts a smartphone user’s place visits from ambient radio to enable behavioral targeting for mobile ads in large shopping malls. VisitSense enables mobile app developers to adopt visit-pattern-aware mobile advertising for shopping mall visitors in their apps. It also benefits mobile users by allowing them to receive highly relevant mobile ads that are aware of their place visit patterns in shopping malls. To achieve the goal, VisitSense employs accurate visit detection and prediction methods. For accurate visit detection, we develop a change-based detection method to take into consideration the stability change of ambient radio and the mobility change of users. It performs well in large shopping malls where ambient radio is quite noisy and causes existing algorithms to easily fail. In addition, we proposed a causality-based visit prediction model to capture the causality in the sequential visit patterns for effective prediction. We have developed a VisitSense prototype system, and a visit-pattern-aware mobile advertising application that is based on it. Furthermore, we deploy the system in the COEX Mall, one of the largest shopping malls in Korea, and conduct diverse experiments to show the effectiveness of VisitSense. PMID:26193275

  12. Economic Theory and Broadcasting.

    Science.gov (United States)

    Bates, Benjamin J.

    Focusing on access to audience through broadcast time, this paper examines the status of research into the economics of broadcasting. The paper first discusses the status of theory in the study of broadcast economics, both as described directly and as it exists in the statement of the basic assumptions generated by prior work and general…

  13. Theme Issue: European Broadcasting.

    Science.gov (United States)

    Howkins, John, Ed.

    1977-01-01

    In this document separate articles deal with the following topics: recommendations for future British broadcasting policies that recently were proposed to the British Parliament by the Committee on the Future of Broadcasting; specific media goals set by the Swedish Committee on Broadcasting; communications policy making in Austria; a new…

  14. Applied Anthropology in Broadcasting

    Science.gov (United States)

    Eiselein, E. B.

    1976-01-01

    Three different applied media anthropology projects are described. These projects stem from the broadcasters' legal need to know about the community (community ascertainment), the broadcasters' need to know about the station audience (audience profile), and the broadcasters' desire to change a community (action projects). (Author)

  15. A Bioinspired Adaptive Congestion-Avoidance Routing for Mobile Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    Huang Qiong

    2014-01-01

    Full Text Available Traditional mobile Ad Hoc network routing protocols are mainly based on the Shortest Path, which possibly results in many congestion nodes that incur routing instability and rerouting. To mitigate the side-efforts, this paper proposed a new bioinspired adaptive routing protocol (ATAR based on a mathematics biology model ARAS. This paper improved the ARAS by reducing the randomness and by introducing a new routing-decision metric “the next-hop fitness” which was denoted as the congestion level of node and the length of routing path. In the route maintenance, the nodes decide to forward the data to next node according to a threshold value of the fitness. In the recovery phase, the node will adopt random manner to select the neighbor as the next hop by calculation of the improved ARAS. With this route mechanism, the ATAR could adaptively circumvent the congestion nodes and the rerouting action is taken in advance. Theoretical analysis and numerical simulation results show that the ATAR protocol outperforms AODV and MARAS in terms of delivery ratio, ETE delay, and the complexity. In particular, ATAR can efficiently mitigate the congestion.

  16. A FSA Model for Performance Evaluation over Mobile Ad Hoc Networks with Low Traffic Volume

    Directory of Open Access Journals (Sweden)

    Heng LUO

    2014-07-01

    Full Text Available A Mobile Ad hoc network (MANET, which is composed of nodes that are able to move arbitrarily, differs from a direct connection network in the way that it is multi-hopping and self- organizing and thus able to operate without the help of prefixed infrastructures. However, problems such as unfavorable wireless links and dynamic topology are challenging, resulting in the proposal of a collection of routing protocols for MANETs. Nevertheless the performance of protocols may deteriorate dramatically as deployment scenario changes due to the application dependent philosophy behind algorithms. In this paper, the performance evaluation problem for MANETs and is explored and a novel performance ranking model, termed FSA, is proposed. For simplicity but without loss of generality, the performance of two routing protocols DSDV and DSR are studies. The FSA is able to rank the performance of DSDV and DSR depending on the average value and standard deviation results. Extensive simulations show that an overall 20.74 %, at most, gain may be achieved based on the FSA model.

  17. The congestion control algorithm based on queue management of each node in mobile ad hoc networks

    Science.gov (United States)

    Wei, Yifei; Chang, Lin; Wang, Yali; Wang, Gaoping

    2016-12-01

    This paper proposes an active queue management mechanism, considering the node's own ability and its importance in the network to set the queue threshold. As the network load increases, local congestion of mobile ad hoc network may lead to network performance degradation, hot node's energy consumption increase even failure. If small energy nodes congested because of forwarding data packets, then when it is used as the source node will cause a lot of packet loss. This paper proposes an active queue management mechanism, considering the node's own ability and its importance in the network to set the queue threshold. Controlling nodes buffer queue in different levels of congestion area probability by adjusting the upper limits and lower limits, thus nodes can adjust responsibility of forwarding data packets according to their own situation. The proposed algorithm will slow down the send rate hop by hop along the data package transmission direction from congestion node to source node so that to prevent further congestion from the source node. The simulation results show that, the algorithm can better play the data forwarding ability of strong nodes, protect the weak nodes, can effectively alleviate the network congestion situation.

  18. Multipath Activity Based Routing Protocol for Mobile ‎Cognitive Radio Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    Shereen Omar

    2017-01-01

    Full Text Available Cognitive radio networks improve spectrum utilization by ‎sharing licensed spectrum with cognitive radio devices. In ‎cognitive radio ad hoc networks the routing protocol is one ‎of the most challenging tasks due to the changes in ‎frequency spectrum and the interrupted connectivity ‎caused by the primary user activity. In this paper, a multi‎path activity based routing protocol for cognitive radio ‎network (MACNRP is proposed. The protocol utilizes ‎channel availability and creates multiple node-disjoint ‎routes between the source and destination nodes. The ‎proposed protocol is compared with D2CARP and FTCRP ‎protocols. The performance evaluation is conducted ‎through mathematical analysis and using OPNET ‎simulation. The performance of the proposed protocol ‎achieves an increase in network throughput; besides it ‎decreases the probability of route failure due to node ‎mobility and primary user activity. We have found that the ‎MACNRP scheme results in 50% to 75% reduction in ‎blocking probability and 33% to 78% improvement in ‎network throughput, with a reasonable additional routing ‎overhead and average packet delay. Due to the successful ‎reduction of collision between primary users and ‎cognitive users, the MACNRP scheme results in decreasing ‎the path failure rate by 50% to 87%.‎

  19. ADDED VALUE-BASED APROACH TO ANALYZE ELECTRONIC COMMERCE AND MOBILE COMMERCE BUSINESS MODELS

    Directory of Open Access Journals (Sweden)

    Moritz Weizmann

    2004-03-01

    Full Text Available

    Se propone aplicar la teoría del valor informacional agregado (Theory of Informational Added Values, IAV al Electronic Commerce (EC y al Mobile Commerce (MC. El trabajo presentado es una propuesta para acercarse a modelos de negocio, con el foco de criterios típicos de evaluación para modelos de negocio de Internet y del MC. Es también conveniente para comparar modelos de negocio distintos y para poner el valor añadido para los participantes en un contexto. De esta manera, se establecen criterios objetivos que reducen la subjetividad y permiten hacer ciertas predicciones. El artículo termina con un análisis crítico del estado del arte y un comentario sobre las perspectivas futuras.

  20. Delay-dependent asymptotic stability of mobile ad-hoc networks: A descriptor system approach

    International Nuclear Information System (INIS)

    Yang Juan; Yang Dan; Zhang Xiao-Hong; Huang Bin; Luo Jian-Lu

    2014-01-01

    In order to analyze the capacity stability of the time-varying-propagation and delay-dependent of mobile ad-hoc networks (MANETs), in this paper, a novel approach is proposed to explore the capacity asymptotic stability for the delay-dependent of MANETs based on non-cooperative game theory, where the delay-dependent conditions are explicitly taken into consideration. This approach is based on the Lyapunov—Krasovskii stability theory for functional differential equations and the linear matrix inequality (LMI) technique. A corresponding Lyapunov—Krasovskii functional is introduced for the stability analysis of this system with use of the descriptor and “neutral-type” model transformation without producing any additional dynamics. The delay-dependent stability criteria are derived for this system. Conditions are given in terms of linear matrix inequalities, and for the first time referred to neutral systems with the time-varying propagation and delay-dependent stability for capacity analysis of MANETs. The proposed criteria are less conservative since they are based on an equivalent model transformation. Furthermore, we also provide an effective and efficient iterative algorithm to solve the constrained stability control model. Simulation experiments have verified the effectiveness and efficiency of our algorithm. (general)

  1. Data delivery method based on neighbor nodes' information in a mobile ad hoc network.

    Science.gov (United States)

    Kashihara, Shigeru; Hayashi, Takuma; Taenaka, Yuzo; Okuda, Takeshi; Yamaguchi, Suguru

    2014-01-01

    This paper proposes a data delivery method based on neighbor nodes' information to achieve reliable communication in a mobile ad hoc network (MANET). In a MANET, it is difficult to deliver data reliably due to instabilities in network topology and wireless network condition which result from node movement. To overcome such unstable communication, opportunistic routing and network coding schemes have lately attracted considerable attention. Although an existing method that employs such schemes, MAC-independent opportunistic routing and encoding (MORE), Chachulski et al. (2007), improves the efficiency of data delivery in an unstable wireless mesh network, it does not address node movement. To efficiently deliver data in a MANET, the method proposed in this paper thus first employs the same opportunistic routing and network coding used in MORE and also uses the location information and transmission probabilities of neighbor nodes to adapt to changeable network topology and wireless network condition. The simulation experiments showed that the proposed method can achieve efficient data delivery with low network load when the movement speed is relatively slow.

  2. Data Delivery Method Based on Neighbor Nodes’ Information in a Mobile Ad Hoc Network

    Directory of Open Access Journals (Sweden)

    Shigeru Kashihara

    2014-01-01

    Full Text Available This paper proposes a data delivery method based on neighbor nodes’ information to achieve reliable communication in a mobile ad hoc network (MANET. In a MANET, it is difficult to deliver data reliably due to instabilities in network topology and wireless network condition which result from node movement. To overcome such unstable communication, opportunistic routing and network coding schemes have lately attracted considerable attention. Although an existing method that employs such schemes, MAC-independent opportunistic routing and encoding (MORE, Chachulski et al. (2007, improves the efficiency of data delivery in an unstable wireless mesh network, it does not address node movement. To efficiently deliver data in a MANET, the method proposed in this paper thus first employs the same opportunistic routing and network coding used in MORE and also uses the location information and transmission probabilities of neighbor nodes to adapt to changeable network topology and wireless network condition. The simulation experiments showed that the proposed method can achieve efficient data delivery with low network load when the movement speed is relatively slow.

  3. Energy-Efficient Cluster Based Routing Protocol in Mobile Ad Hoc Networks Using Network Coding

    Directory of Open Access Journals (Sweden)

    Srinivas Kanakala

    2014-01-01

    Full Text Available In mobile ad hoc networks, all nodes are energy constrained. In such situations, it is important to reduce energy consumption. In this paper, we consider the issues of energy efficient communication in MANETs using network coding. Network coding is an effective method to improve the performance of wireless networks. COPE protocol implements network coding concept to reduce number of transmissions by mixing the packets at intermediate nodes. We incorporate COPE into cluster based routing protocol to further reduce the energy consumption. The proposed energy-efficient coding-aware cluster based routing protocol (ECCRP scheme applies network coding at cluster heads to reduce number of transmissions. We also modify the queue management procedure of COPE protocol to further improve coding opportunities. We also use an energy efficient scheme while selecting the cluster head. It helps to increase the life time of the network. We evaluate the performance of proposed energy efficient cluster based protocol using simulation. Simulation results show that the proposed ECCRP algorithm reduces energy consumption and increases life time of the network.

  4. Modeling Consumer Adoption and Usage of Value-Added Mobile Services

    NARCIS (Netherlands)

    R. Prins (Remco)

    2008-01-01

    textabstractIn recent years, the mobile telecommunications market has been very dynamic in terms of innovations. Mobile service providers continuously invest in new technologies and introduce many new mobile services for consumers, such as MMS and web services. However, adoption rates are often not

  5. Adding navigation, artificial audition and vital sign monitoring capabilities to a telepresence mobile robot for remote home care applications.

    Science.gov (United States)

    Laniel, Sebastien; Letourneau, Dominic; Labbe, Mathieu; Grondin, Francois; Polgar, Janice; Michaud, Francois

    2017-07-01

    A telepresence mobile robot is a remote-controlled, wheeled device with wireless internet connectivity for bidirectional audio, video and data transmission. In health care, a telepresence robot could be used to have a clinician or a caregiver assist seniors in their homes without having to travel to these locations. Many mobile telepresence robotic platforms have recently been introduced on the market, bringing mobility to telecommunication and vital sign monitoring at reasonable costs. What is missing for making them effective remote telepresence systems for home care assistance are capabilities specifically needed to assist the remote operator in controlling the robot and perceiving the environment through the robot's sensors or, in other words, minimizing cognitive load and maximizing situation awareness. This paper describes our approach adding navigation, artificial audition and vital sign monitoring capabilities to a commercially available telepresence mobile robot. This requires the use of a robot control architecture to integrate the autonomous and teleoperation capabilities of the platform.

  6. An authenticated encrypted routing protocol against attacks in mobile ad-hoc networks

    Directory of Open Access Journals (Sweden)

    C.C. Suma

    2017-01-01

    Full Text Available Mobile Ad hoc Network is stated as a cluster that contains Digital data terminals and they are furnished with the wireless transceivers which are able to communicate with each other with no need of any fixed architecture or concentrated authority. Security is one of the major issues in MANETs because of vast applications such as Military Battlefields, emergency and rescue operations[10]. In order to provide anonymous communications and to identify the malicious nodes in MANETs, many authors have proposed different secure routing protocols but each protocol have their own advantages and disadvantages. In MANTE’s each and every node in the communicating network functions like router and transmits the packets among the networking nodes for the purpose of communication[11]. Sometimes nodes may be attacked by the malicious nodes or the legitimate node will be caught by foemen there by controlling and preventing the nodes to perform the assigned task or nodes may be corrupted due to loss of energy. So, due to these drawbacks securing the network under the presence of adversaries is an important thing. The existing protocols were designed with keeping anonymity and the identification of vicious nodes in the network as the main goal. For providing better security, the anonymity factors such as Unidentifiability and Unlinkability must be fully satisfied[1]. Many anonymous routing schemes that concentrate on achieving anonymity are proposed in the past decade and they provides the security at different levels and also provides the privacy protection that is of different cost. In this paper we consider a protocol called Authenticated Secure Routing Protocol proposed which provides both security & anonymity. Anonymity is achieved in this protocol using Group signature. Over all by using this protocol performance in terms of throughput as well as the packet dropping rate is good compared to the other living protocols.

  7. Residential exposure to radiofrequency fields from mobile phone base stations, and broadcast transmitters: a population-based survey with personal meter

    OpenAIRE

    VIEL, JF; CLERC, S; BARRERA, C; RYMZHANOVA, R; MOISSONNIER, M; HOURS, M; CARDIS, E

    2009-01-01

    Objectives: Both the public perceptions, and most published epidemiologic studies, rely on the assumption that the distance of a particular residence from a base station or a broadcast transmitter is an appropriate surrogate for exposure to radiofrequency fields, although complex propagation characteristics affect the beams from antennas. The main goal of this study was to characterise the distribution of residential exposure from antennas using personal exposure meters.Results: Much of the t...

  8. Information Literacy on the Go! Adding Mobile to an Age Old Challenge

    Science.gov (United States)

    Schmidt Hanbidge, Alice; Sanderson, Nicole; Tin, Tony

    2016-01-01

    Integrating information literacy skills is fundamental to learning in all contexts. The nexus of mobile devices and information literacy lessons to learn these skills is an innovative pedagogy in higher education explored in this Mobile Information Literacy Tool (MIL) project. Currently, the project's second stage of data collection and analysis…

  9. Mobile Ad Hoc Networks in Bandwidth-Demanding Mission-Critical Applications: Practical Implementation Insights

    KAUST Repository

    Bader, Ahmed; Alouini, Mohamed-Slim

    2016-01-01

    There has been recently a growing trend of using live video feeds in mission-critical applications. Real-time video streaming from front-end personnel or mobile agents is believed to substantially improve situational awareness in mission

  10. IF-MANET: Interoperable framework for heterogeneous mobile ad hoc networks

    OpenAIRE

    Hassan, H.

    2015-01-01

    The advances in low power micro-processors, wireless networks and embedded systems have raised the need to utilize the significant resources of mobile devices. These devices for example, smart phones, tablets, laptops, wearables, and sensors are gaining enormous processing power, storage capacity and wireless bandwidth. In addition, the advancement in wireless mobile technology has created a new communication paradigm via which a wireless network can be created without any priori infrastructu...

  11. Broadcast Coded Slotted ALOHA

    DEFF Research Database (Denmark)

    Ivanov, Mikhail; Brännström, Frederik; Graell i Amat, Alexandre

    2016-01-01

    We propose an uncoordinated medium access control (MAC) protocol, called all-to-all broadcast coded slotted ALOHA (B-CSA) for reliable all-to-all broadcast with strict latency constraints. In B-CSA, each user acts as both transmitter and receiver in a half-duplex mode. The half-duplex mode gives ...

  12. 47 CFR 74.601 - Classes of TV broadcast auxiliary stations.

    Science.gov (United States)

    2010-10-01

    ... 47 Telecommunication 4 2010-10-01 2010-10-01 false Classes of TV broadcast auxiliary stations. 74... Television Broadcast Auxiliary Stations § 74.601 Classes of TV broadcast auxiliary stations. (a) TV pickup stations. A land mobile station used for the transmission of TV program material and related communications...

  13. A Cross-Layer Route Discovery Framework for Mobile Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    Wu Jieyi

    2005-01-01

    Full Text Available Most reactive routing protocols in MANETs employ a random delay between rebroadcasting route requests (RREQ in order to avoid "broadcast storms." However this can lead to problems such as "next hop racing" and "rebroadcast redundancy." In addition to this, existing routing protocols for MANETs usually take a single routing strategy for all flows. This may lead to inefficient use of resources. In this paper we propose a cross-layer route discovery framework (CRDF to address these problems by exploiting the cross-layer information. CRDF solves the above problems efficiently and enables a new technique: routing strategy automation (RoSAuto. RoSAuto refers to the technique that each source node automatically decides the routing strategy based on the application requirements and each intermediate node further adapts the routing strategy so that the network resource usage can be optimized. To demonstrate the effectiveness and the efficiency of CRDF, we design and evaluate a macrobian route discovery strategy under CRDF.

  14. Enabling Co-located Learning over Mobile Ad Hoc P2P with LightPeers

    DEFF Research Database (Denmark)

    Christensen, Bent Guldbjerg; Kristensen, Mads Darø; Hansen, Frank Allan

    2008-01-01

    This paper presents LightPeers – a new mobile P2P framework specifically tailored for use in a nomadic learning environment. A set of key requirements for the framework is identified based on nomadic learning, and these requirements are used as outset for designing and implementing the architectu...

  15. Mitigate DoS and DDoS attacks in Mobile Ad Hoc Networks

    DEFF Research Database (Denmark)

    Michalas, Antonis; Komninos, Nikos; Prasad, Neeli R.

    2011-01-01

    This paper proposes a technique to defeat Denial of Service (DoS) and Distributed Denial of Service (DDoS) attacks in Ad Hoc Networks. The technique is divided into two main parts and with game theory and cryptographic puzzles. Introduced first is a new client puzzle to prevent DoS attacks...... in DoS and DDoS attacks. Experimental results show the effectiveness of the approach for devices with limited resources and for environments like ad hoc networks where nodes must exchange information quickly....

  16. Optimal JPWL Forward Error Correction Rate Allocation for Robust JPEG 2000 Images and Video Streaming over Mobile Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    Benoit Macq

    2008-07-01

    Full Text Available Based on the analysis of real mobile ad hoc network (MANET traces, we derive in this paper an optimal wireless JPEG 2000 compliant forward error correction (FEC rate allocation scheme for a robust streaming of images and videos over MANET. The packet-based proposed scheme has a low complexity and is compliant to JPWL, the 11th part of the JPEG 2000 standard. The effectiveness of the proposed method is evaluated using a wireless Motion JPEG 2000 client/server application; and the ability of the optimal scheme to guarantee quality of service (QoS to wireless clients is demonstrated.

  17. Probabilistic monitoring in intrusion detection module for energy efficiency in mobile ad hoc networks

    Science.gov (United States)

    De Rango, Floriano; Lupia, Andrea

    2016-05-01

    MANETs allow mobile nodes communicating to each other using the wireless medium. A key aspect of these kind of networks is the security, because their setup is done without an infrastructure, so external nodes could interfere in the communication. Mobile nodes could be compromised, misbehaving during the multi-hop transmission of data, or they could have a selfish behavior to save energy, which is another important constraint in MANETs. The detection of these behaviors need a framework that takes into account the latest interactions among nodes, so malicious or selfish nodes could be detected also if their behavior is changed over time. The monitoring activity increases the energy consumption, so our proposal takes into account this issue reducing the energy required by the monitoring system, keeping the effectiveness of the intrusion detection system. The results show an improvement in the saved energy, improving the detection performance too.

  18. Trust Management in Mobile Ad Hoc Networks for Bias Minimization and Application Performance Maximization

    Science.gov (United States)

    2014-02-26

    4 develops a novel model-based approach to de- scribe dynamic behaviors of nodes in MANETs in the pres- ence of misbehaving nodes with the objective...bile node to subjectively yet informatively assess the trust levels of other mobile nodes. Further, SQTrust is resilient against misbehaving nodes. Given...objective trust’’ despite the presence of misbehaving nodes. The desirable output is to achieve high accuracy in peer-to-peer subjective trust evaluation

  19. Olympic Broadcast Rights

    OpenAIRE

    Žižka, Martin

    2014-01-01

    Title: Olympic Broadcast Rights Objectives: The main objective of this thesis is to analyse the revenue derived from the sale of the broadcasting rights to the Olympics by Olympic Movement. In the thesis are analysed the total sum of revenue, selected territory and compared the proportion that belongs to the International Olympic Committee and the Organizing Committee of the Olympic Games. The secondary objective is to adapt and calculation of the conversion mechanism for the transfer of amou...

  20. Cross Layer PHY-MAC Protocol for Wireless Static and Mobile Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    Chris Blondia

    2008-11-01

    Full Text Available Multihop mobile wireless networks have drawn a lot of attention in recent years thanks to their wide applicability in civil and military environments. Since the existing IEEE 802.11 distributed coordination function (DCF standard does not provide satisfactory access to the wireless medium in multihop mobile networks, we have designed a cross-layer protocol, (CroSs-layer noise aware power driven MAC (SNAPdMac, which consists of two parts. The protocol first concentrates on the flexible adjustment of the upper and lower bounds of the contention window (CW to lower the number of collisions. In addition, it uses a power control scheme, triggered by the medium access control (MAC layer, to limit the waste of energy and also to decrease the number of collisions. Thanks to a noticeable energy conservation and decrease of the number of collisions, it prolongs significantly the lifetime of the network and delays the death of the first node while increasing both the throughput performance and the sending bit rate/throughput fairness among contending flows.

  1. Improving the Dominating-Set Routing over Delay-Tolerant Mobile Ad-Hoc Networks via Estimating Node Intermeeting Times

    Directory of Open Access Journals (Sweden)

    Preiss Bruno

    2011-01-01

    Full Text Available With limited coverage of wireless networks and frequent roaming of mobile users, providing a seamless communication service poses a technical challenge. In our previous research, we presented a supernode system architecture that employs the delay-tolerant network (DTN concept to provide seamless communications for roaming users over interconnected heterogeneous wireless networks. Mobile ad hoc networks (MANETs are considered a key component of the supernode system for services over an area not covered by other wireless networks. Within the super node system, a dominating-set routing technique is proposed to improve message delivery over MANETs and to achieve better resource utilization. The performance of the dominating-set routing technique depends on estimation accuracy of the probability of a future contact between nodes. This paper studies how node mobility can be modeled and used to better estimate the probability of a contact. We derive a distribution for the node-to-node intermeeting time and present numerical results to demonstrate that the distribution can be used to improve the dominating-set routing technique performance. Moreover, we investigate how the distribution can be employed to relax the constraints of selecting the dominating-set members in order to improve the system resource utilization.

  2. Adding intelligence to mobile asset management in hospitals: the true value of RFID.

    Science.gov (United States)

    Castro, Linda; Lefebvre, Elisabeth; Lefebvre, Louis A

    2013-10-01

    RFID (Radio Frequency Identification) technology is expected to play a vital role in the healthcare arena, especially in times when cost containments are at the top of the priorities of healthcare management authorities. Medical equipment represents a significant share of yearly healthcare operational costs; hence, ensuring an effective and efficient management of such key assets is critical to promptly and reliably deliver a diversity of clinical services at the patient bedside. Empirical evidence from a phased-out RFID implementation in one European hospital demonstrates that RFID has the potential to transform asset management by improving inventory management, enhancing asset utilization, increasing staff productivity, improving care services, enhancing maintenance compliance, and increasing information visibility. Most importantly, RFID allows the emergence of intelligent asset management processes, which is, undoubtedly, the most important benefit that could be derived from the RFID system. Results show that the added intelligence can be rather basic (auto-status change) or a bit more advanced (personalized automatic triggers). More importantly, adding intelligence improves planning and decision-making processes.

  3. Reliable Ant Colony Routing Algorithm for Dual-Channel Mobile Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    YongQiang Li

    2018-01-01

    Full Text Available For the problem of poor link reliability caused by high-speed dynamic changes and congestion owing to low network bandwidth in ad hoc networks, an ant colony routing algorithm, based on reliable path under dual-channel condition (DSAR, is proposed. First, dual-channel communication mode is used to improve network bandwidth, and a hierarchical network model is proposed to optimize the dual-layer network. Thus, we reduce network congestion and communication delay. Second, a comprehensive reliable path selection strategy is designed, and the reliable path is selected ahead of time to reduce the probability of routing restart. Finally, the ant colony algorithm is used to improve the adaptability of the routing algorithm to changes of network topology. Simulation results show that DSAR improves the reliability of routing, packet delivery, and throughput.

  4. Adding memory processing behaviors to the fuzzy behaviorist-based navigation of mobile robots

    Energy Technology Data Exchange (ETDEWEB)

    Pin, F.G.; Bender, S.R.

    1996-05-01

    Most fuzzy logic-based reasoning schemes developed for robot control are fully reactive, i.e., the reasoning modules consist of fuzzy rule bases that represent direct mappings from the stimuli provided by the perception systems to the responses implemented by the motion controllers. Due to their totally reactive nature, such reasoning systems can encounter problems such as infinite loops and limit cycles. In this paper, we proposed an approach to remedy these problems by adding a memory and memory-related behaviors to basic reactive systems. Three major types of memory behaviors are addressed: memory creation, memory management, and memory utilization. These are first presented, and examples of their implementation for the recognition of limit cycles during the navigation of an autonomous robot in a priori unknown environments are then discussed.

  5. Broadcasted Location-Aware Data Cache for Vehicular Application

    Directory of Open Access Journals (Sweden)

    Fukuda Akira

    2007-01-01

    Full Text Available There has been increasing interest in the exploitation of advances in information technology, for example, mobile computing and wireless communications in ITS (intelligent transport systems. Classes of applications that can benefit from such an infrastructure include traffic information, roadside businesses, weather reports, entertainment, and so on. There are several wireless communication methods currently available that can be utilized for vehicular applications, such as cellular phone networks, DSRC (dedicated short-range communication, and digital broadcasting. While a cellular phone network is relatively slow and a DSRC has a very small communication area, one-segment digital terrestrial broadcasting service was launched in Japan in 2006, high-performance digital broadcasting for mobile hosts has been available recently. However, broadcast delivery methods have the drawback that clients need to wait for the required data items to appear on the broadcast channel. In this paper, we propose a new cache system to effectively prefetch and replace broadcast data using "scope" (an available area of location-dependent data and "mobility specification" (a schedule according to the direction in which a mobile host moves. We numerically evaluate the cache system on the model close to the traffic road environment, and implement the emulation system to evaluate this location-aware data delivery method for a concrete vehicular application that delivers geographic road map data to a car navigation system.

  6. Broadcasted Location-Aware Data Cache for Vehicular Application

    Directory of Open Access Journals (Sweden)

    Kenya Sato

    2007-05-01

    Full Text Available There has been increasing interest in the exploitation of advances in information technology, for example, mobile computing and wireless communications in ITS (intelligent transport systems. Classes of applications that can benefit from such an infrastructure include traffic information, roadside businesses, weather reports, entertainment, and so on. There are several wireless communication methods currently available that can be utilized for vehicular applications, such as cellular phone networks, DSRC (dedicated short-range communication, and digital broadcasting. While a cellular phone network is relatively slow and a DSRC has a very small communication area, one-segment digital terrestrial broadcasting service was launched in Japan in 2006, high-performance digital broadcasting for mobile hosts has been available recently. However, broadcast delivery methods have the drawback that clients need to wait for the required data items to appear on the broadcast channel. In this paper, we propose a new cache system to effectively prefetch and replace broadcast data using “scope” (an available area of location-dependent data and “mobility specification” (a schedule according to the direction in which a mobile host moves. We numerically evaluate the cache system on the model close to the traffic road environment, and implement the emulation system to evaluate this location-aware data delivery method for a concrete vehicular application that delivers geographic road map data to a car navigation system.

  7. Implementing a Topology Management Algorithm for Mobile Ad-Hoc Networks

    Directory of Open Access Journals (Sweden)

    Mrinal K. Naskar

    2008-01-01

    Full Text Available In this paper, we propose to maintain the topology of a MANET by suitably selecting multiple coordinators among the nodes constituting the MANET. The maintenance of topology in a mobile ad–hoc network is of primary importance because the routing techniques can only work if we have a connected network. Thus of the burning issues at present is to device algorithms which ensure that the network topology is always maintained. The basic philosophy behind our algorithm is to isolate two coordinators amongst the system based on positional data. Once elected, they are entrusted with the responsibility to emit signals of different frequencies while the other nodes individually decide the logic they need to follow in order to maintain the topology, thereby greatly reducing the overhead. As far as our knowledge goes, we are the first ones to introduce the concept of multiple coordinators which not only reduces the workload of the coordinator, but also eliminates the need of different signal ranges thereby ensuring greater efficiency. We have simulated the algorithm with the help of a number of robots using embedded systems. The results we have obtained have been quite encouraging.

  8. Residential exposure to radiofrequency fields from mobile phone base stations, and broadcast transmitters: a population-based survey with personal meter.

    Science.gov (United States)

    Viel, J F; Clerc, S; Barrera, C; Rymzhanova, R; Moissonnier, M; Hours, M; Cardis, E

    2009-08-01

    Both the public perceptions, and most published epidemiologic studies, rely on the assumption that the distance of a particular residence from a base station or a broadcast transmitter is an appropriate surrogate for exposure to radiofrequency fields, although complex propagation characteristics affect the beams from antennas. The main goal of this study was to characterise the distribution of residential exposure from antennas using personal exposure meters. A total of 200 randomly selected people were enrolled. Each participant was supplied with a personal exposure meter for 24 h measurements, and kept a time-location-activity diary. Two exposure metrics for each radiofrequency were then calculated: the proportion of measurements above the detection limit (0.05 V/m), and the maximum electric field strength. Residential address was geocoded, and distance from each antenna was calculated. Much of the time, the recorded field strength was below the detection level (0.05 V/m), the FM band standing apart with a proportion above the detection threshold of 12.3%. The maximum electric field strength was always lower than 1.5 V/m. Exposure to GSM and DCS waves peaked around 280 m and 1000 m from the antennas. A downward trend was found within a 10 km range for FM. Conversely, UMTS, TV 3, and TV 4&5 signals did not vary with distance. Despite numerous limiting factors entailing a high variability in radiofrequency exposure assessment, but owing to a sound statistical technique, we found that exposures from GSM and DCS base stations increase with distance in the near source zone, to a maximum where the main beam intersects the ground. We believe these results will contribute to the ongoing public debate over the location of base stations and their associated emissions.

  9. Broadcasting of inseparability

    International Nuclear Information System (INIS)

    Adhikari, Satyabrata; Choudhury, B S; Chakrabarty, Indranil

    2006-01-01

    Suppose we are given an entangled pair and asked how well we can produce two entangled pairs starting from a given entangled pair using only local operations. To respond to this question, we study broadcasting of entanglement using a state-dependent quantum cloning machine as a local copier. We show that the length of the interval for probability-amplitude-squared α 2 for broadcasting of entanglement using a state-dependent cloner can be made larger than the length of the interval for probability-amplitude-squared for broadcasting entanglement using a state-independent cloner. Further we show that there exists a local state-dependent cloner which gives better quality copy (in terms of average fidelity) of an entangled pair than the local universal cloner

  10. Monitoring and classifying animal behavior using ZigBee-based mobile ad hoc wireless sensor networks and artificial neural networks

    DEFF Research Database (Denmark)

    S. Nadimi, Esmaeil; Nyholm Jørgensen, Rasmus; Blanes-Vidal, Victoria

    2012-01-01

    Animal welfare is an issue of great importance in modern food production systems. Because animal behavior provides reliable information about animal health and welfare, recent research has aimed at designing monitoring systems capable of measuring behavioral parameters and transforming them...... into their corresponding behavioral modes. However, network unreliability and high-energy consumption have limited the applicability of those systems. In this study, a 2.4-GHz ZigBee-based mobile ad hoc wireless sensor network (MANET) that is able to overcome those problems is presented. The designed MANET showed high...... communication reliability, low energy consumption and low packet loss rate (14.8%) due to the deployment of modern communication protocols (e.g. multi-hop communication and handshaking protocol). The measured behavioral parameters were transformed into the corresponding behavioral modes using a multilayer...

  11. A Time-Slotted On-Demand Routing Protocol for Mobile Ad Hoc Unmanned Vehicle Systems

    Energy Technology Data Exchange (ETDEWEB)

    Hope Forsmann; Robert Hiromoto; John Svoboda

    2007-04-01

    The popularity of UAVs has increased dramatically because of their successful deployment in military operations, their ability to preserve human life, and the continual improvements in wireless communication that serves to increase their capabilities. We believe the usefulness of UAVs would be dramatically increased if formation flight were added to the list of capabilities. Currently, sustained formation flight with a cluster of UAVs has only been achieved with two nodes by the Multi-UAV Testbed at the Massachusetts Institute of Technology. (Park, 2004) Formation flight is a complex operation requiring the ability to adjust the flight patterns on the fly and correct for wind gusts, terrain, and differences in node equipment. All of which increases the amount of inner node communication. Since one of the problems with MANET communication is network congestion, we believe a first step towards formation flight can be made through improved inner node communication. We have investigated current communication routing protocols and developed an altered hybrid routing protocol in order to provide communication with less network congestion.

  12. Data broadcasting: merging digital broadcasting with the Internet

    DEFF Research Database (Denmark)

    2001-01-01

    , and for what means it can be used. It also analyses data broadcasting from the perspectives of both the medium and business. * Features the latest developments in electronic media * Discusses the major media opportunities of data broadcasting * Shows how data broadcasting can overcome many notorious problems...... and developers in the telecommunications, software, hardware and media industries of the main commercial, editorial and technical opportunities of data broadcasting....

  13. A Simulation Study: The Impact of Random and Realistic Mobility Models on the Performance of Bypass-AODV in Ad Hoc Wireless Networks

    Directory of Open Access Journals (Sweden)

    Baroudi Uthman

    2010-01-01

    Full Text Available To bring VANET into reality, it is crucial to devise routing protocols that can exploit the inherited characteristics of VANET environment to enhance the performance of the running applications. Previous studies have shown that a certain routing protocol behaves differently under different presumed mobility patterns. Bypass-AODV is a new optimization of the AODV routing protocol for mobile ad-hoc networks. It is proposed as a local recovery mechanism to enhance the performance of the AODV routing protocol. It shows outstanding performance under the Random Waypoint mobility model compared with AODV. However, Random Waypoint is a simple model that may be applicable to some scenarios but it is not sufficient to capture some important mobility characteristics of scenarios where VANETs are deployed. In this paper, we will investigate the performance of Bypass-AODV under a wide range of mobility models including other random mobility models, group mobility models, and vehicular mobility models. Simulation results show an interesting feature that is the insensitivity of Bypass-AODV to the selected random mobility model, and it has a clear performance improvement compared to AODV. For group mobility model, both protocols show a comparable performance, but for vehicular mobility models, Bypass-AODV suffers from performance degradation in high-speed conditions.

  14. Implementing voice over Internet protocol in mobile ad hoc network – analysing its features regarding efficiency, reliability and security

    Directory of Open Access Journals (Sweden)

    Naveed Ahmed Sheikh

    2014-05-01

    Full Text Available Providing secure and efficient real-time voice communication in mobile ad hoc network (MANET environment is a challenging problem. Voice over Internet protocol (VoIP has originally been developed over the past two decades for infrastructure-based networks. There are strict timing constraints for acceptable quality VoIP services, in addition to registration and discovery issues in VoIP end-points. In MANETs, ad hoc nature of networks and multi-hop wireless environment with significant packet loss and delays present formidable challenges to the implementation. Providing a secure real-time VoIP service on MANET is the main design objective of this paper. The authors have successfully developed a prototype system that establishes reliable and efficient VoIP communication and provides an extremely flexible method for voice communication in MANETs. The authors’ cooperative mesh-based MANET implementation can be used for rapidly deployable VoIP communication with survivable and efficient dynamic networking using open source software.

  15. Probabilistic broadcasting of mixed states

    International Nuclear Information System (INIS)

    Li Lvjun; Li Lvzhou; Wu Lihua; Zou Xiangfu; Qiu Daowen

    2009-01-01

    It is well known that the non-broadcasting theorem proved by Barnum et al is a fundamental principle of quantum communication. As we are aware, optimal broadcasting (OB) is the only method to broadcast noncommuting mixed states approximately. In this paper, motivated by the probabilistic cloning of quantum states proposed by Duan and Guo, we propose a new way for broadcasting noncommuting mixed states-probabilistic broadcasting (PB), and we present a sufficient condition for PB of mixed states. To a certain extent, we generalize the probabilistic cloning theorem from pure states to mixed states, and in particular, we generalize the non-broadcasting theorem, since the case that commuting mixed states can be exactly broadcast can be thought of as a special instance of PB where the success ratio is 1. Moreover, we discuss probabilistic local broadcasting (PLB) of separable bipartite states

  16. The quandry of benchmarking broadcasts

    International Nuclear Information System (INIS)

    Karonis, N T; Supinski, B R

    1999-01-01

    A message passing library's implementation of broadcast communication can significantly affect the performance of applications built with that library. In order to choose between similar implementations or to evaluate available libraries, accurate measurements of broadcast performance are required. As we demonstrate, existing methods for measuring broadcast performance are either inaccurate or inadequate. Fortunately, we have designed an accurate method for measuring broadcast performance. Measuring broadcast performance is not simple. Simply sending one broadcast after another allows them to proceed through the network concurrently, thus resulting in accurate per broadcast timings. Existing methods either fail to eliminate this pipelining effect or eliminate it by introducing overheads that are as difficult to measure as the performance of the broadcast itself. Our method introduces a measurable overhead to eliminate the pipelining effect

  17. CATV and the Broadcasters.

    Science.gov (United States)

    Flanagan, Bill

    Competition between cable television systems (CATV) and regular broadcast stations concerns pay-TV and distant signal importation. The pay-TV that CATV provides competes with the networks by "siphoning" away sports and feature films, while the distant signals that CATV imports to a local market "fragment" the local audience and…

  18. Virtue Broadcasting - directorate change

    CERN Multimedia

    2003-01-01

    The Board of Virtue Broadcasting Plc ("Virtue") have announced the appointment of Mr. Klaus Ackerstaff as the CEO of the main Board. He began his professional career at CERN, where he was responsible for the IT infrastructure of the OPAL (particle physics) project (1/2 page).

  19. Improving TCP Performance over Wireless Ad Hoc Networks with Busy Tone Assisted Scheme

    Directory of Open Access Journals (Sweden)

    Cai Lin

    2006-01-01

    Full Text Available It is well known that transmission control protocol (TCP performance degrades severely in IEEE 802.11-based wireless ad hoc networks. We first identify two critical issues leading to the TCP performance degradation: (1 unreliable broadcast, since broadcast frames are transmitted without the request-to-send and clear-to-send (RTS/CTS dialog and Data/ACK handshake, so they are vulnerable to the hidden terminal problem; and (2 false link failure which occurs when a node cannot successfully transmit data temporarily due to medium contention. We then propose a scheme to use a narrow-bandwidth, out-of-band busy tone channel to make reservation for broadcast and link error detection frames only. The proposed scheme is simple and power efficient, because only the sender needs to transmit two short messages in the busy tone channel before sending broadcast or link error detection frames in the data channel. Analytical results show that the proposed scheme can dramatically reduce the collision probability of broadcast and link error detection frames. Extensive simulations with different network topologies further demonstrate that the proposed scheme can improve TCP throughput by 23% to 150%, depending on user mobility, and effectively enhance both short-term and long-term fairness among coexisting TCP flows in multihop wireless ad hoc networks.

  20. Gossip-Based Broadcast

    Science.gov (United States)

    Leitão, João; Pereira, José; Rodrigues, Luís

    Gossip, or epidemic, protocols have emerged as a powerful strategy to implement highly scalable and resilient reliable broadcast primitives on large scale peer-to-peer networks. Epidemic protocols are scalable because they distribute the load among all nodes in the system and resilient because they have an intrinsic level of redundancy that masks node and network failures. This chapter provides an introduction to gossip-based broadcast on large-scale unstructured peer-to-peer overlay networks: it surveys the main results in the field, discusses techniques to build and maintain the overlays that support efficient dissemination strategies, and provides an in-depth discussion and experimental evaluation of two concrete protocols, named HyParView and Plumtree.

  1. Broadcast sound technology

    CERN Document Server

    Talbot-Smith, Michael

    1990-01-01

    Broadcast Sound Technology provides an explanation of the underlying principles of modern audio technology. Organized into 21 chapters, the book first describes the basic sound; behavior of sound waves; aspects of hearing, harming, and charming the ear; room acoustics; reverberation; microphones; phantom power; loudspeakers; basic stereo; and monitoring of audio signal. Subsequent chapters explore the processing of audio signal, sockets, sound desks, and digital audio. Analogue and digital tape recording and reproduction, as well as noise reduction, are also explained.

  2. Financing Public Service Broadcasting

    DEFF Research Database (Denmark)

    Berg, Christian Edelvold; Lund, Anker Brink

    2012-01-01

    Broadcasting (PSB) financing regimes in Europe, concluding that Denmark, Finland, Iceland, Norway, and Sweden may still be considered conventional, licence fee PSB countries, but with some interesting differences in relation to competitive and market oriented alternatives of resource provision......Recently several European countries have abolished the traditional public service licence fee system, replacing it with direct public funding. But except for Iceland, the Nordic countries have not followed suit. The article discusses this development within a comparative framework of Public Service...

  3. A Family of Key Agreement Mechanisms for Mission Critical Communications for Secure Mobile Ad Hoc and Wireless Mesh Internetworking

    Directory of Open Access Journals (Sweden)

    Tryfonas Theo

    2011-01-01

    Full Text Available Future wireless networks like mobile ad hoc networks and wireless mesh networks are expected to play important role in demanding communications such as mission critical communications. MANETs are ideal for emergency cases where the communication infrastructure has been completely destroyed and there is a need for quick set up of communications among the rescue/emergency workers. In such emergency scenarios wireless mesh networks may be employed in a later phase for providing advanced communications and services acting as a backbone network in the affected area. Internetworking of both types of future networks will provide a broad range of mission critical applications. While offering many advantages, such as flexibility, easy of deployment and low cost, MANETs and mesh networks face important security and resilience threats, especially for such demanding applications. We introduce a family of key agreement methods based on weak to strong authentication associated with several multiparty contributory key establishment methods. We examine the attributes of each key establishment method and how each method can be better applied in different scenarios. The proposed protocols support seamlessly both types of networks and consider system and application requirements such as efficient and secure internetworking, dynamicity of network topologies and support of thin clients.

  4. Secure Communication and Information Exchange using Authenticated Ciphertext Policy Attribute-Based Encryption in Mobile Ad-hoc Network

    Directory of Open Access Journals (Sweden)

    Samsul Huda

    2016-08-01

    Full Text Available MANETs are considered as suitable for commercial applications such as law enforcement, conference meeting, and sharing information in a student classroom and critical services such as military operations, disaster relief, and rescue operations. Meanwhile, in military operation especially in the battlefield in freely medium which naturally needs high mobility and flexibility. Thus, applying MANETs make these networks vulnerable to various types of attacks such aspacket eavesdropping, data disseminating, message replay, message modification, and especially privacy issue. In this paper, we propose a secure communication and information exchange in MANET with considering secure adhoc routing and secure information exchange. Regarding privacy issue or anonymity, we use a reliable asymmetric encryption which protecting user privacy by utilizing insensitive user attributes as user identity, CP-ABE (Ciphertext-Policy Attribute-Based Encryption cryptographic scheme. We also design protocols to implement the proposed scheme for various battlefied scenarios in real evironment using embedded devices. Our experimental results showed that the additional of HMAC (Keyed-Hash Message Authentication Code and AES (Advanced Encryption standard schemes using processor 1.2GHz only take processing time about 4.452 ms,  we can confirm that our approach by using CP-ABE with added HMAC and AES schemes make low overhead.

  5. TV Broadcast Efficiency in 5G Networks from Subscriber Prospective

    KAUST Repository

    Lau, Chun Pong

    2015-12-06

    The flexibility of radio access network facilitated by 5G networks opens the gateway of deploying dynamic strategies for broadcasting TV channels in an efficient way. Currently, spectrum efficiency and bandwidth efficiency are the two common metrics measuring the efficiency of a system. These metrics assess the net bitrate for a unit of spectrum bandwidth. However, there is a lack of measurement, quantifying the effectiveness of a broadcasting strategy from the user perspective. In this paper, we introduce a novel measurement approach, called broadcast efficiency which considers the mobile user as a main reference. Broadcast efficiency is calculated as the number of served audiences per unit of radio resource. From numerical analysis, we show that broadcasting unpopular TV channels dramatically decreases the broadcast efficiency. This finding is evaluated by employing multiple distributions on the size of audience among TV channels. Furthermore, by conducting a real-life simulation, we discover that a high broadcast efficiency may result in a low percentage of served audiences if the audiences of TV channels are quite evenly distributed.

  6. Data dissemination in the wild: A testbed for high-mobility MANETs

    DEFF Research Database (Denmark)

    Vingelmann, Peter; Pedersen, Morten Videbæk; Heide, Janus

    2012-01-01

    This paper investigates the problem of efficient data dissemination in Mobile Ad hoc NETworks (MANETs) with high mobility. A testbed is presented; which provides a high degree of mobility in experiments. The testbed consists of 10 autonomous robots with mobile phones mounted on them. The mobile...... information, and the goal is to convey that information to all devices. A strategy is proposed that uses UDP broadcast transmissions and random linear network coding to facilitate the efficient exchange of information in the network. An application is introduced that implements this strategy on Nokia phones...

  7. Disentangling location based mobile advertising: the effects of location congruence and type of the medium on consumers' ad-recall and buying behaviour

    NARCIS (Netherlands)

    Bernritter, S.; Ketelaar, P.; van Woudenberg, T.J.; Vantriet, J.; Huhn, A.; Janssen, L.

    2015-01-01

    An emerging body of research focuses on location-based advertising (LBA). This literature suggests that the merits of LBA rely on the fact that consumers can be targeted with location-congruent ads on their personal mobile devices. However, it has not yet been taken into account that LBA consists of

  8. Implications of Internet on Broadcasting

    DEFF Research Database (Denmark)

    Henten, Anders; Tadayoni, Reza

    One of the main challenges within broadcasting research in the recent years has been to understand the evolution from traditional broadcasting to digital broadcasting. The aim of this paper is to step further and give an analysis of Internet’s influence on traditional broadcasting services....... In this analysis an inter-disciplinary approach is used, where technological, economic, political and cultural drivers and barriers in this development are identified. It is then shown to what degree these parameters and the inter-relation between them influence this development....

  9. Spatial Air Index Based on Largest Empty Rectangles for Non-Flat Wireless Broadcast in Pervasive Computing

    Directory of Open Access Journals (Sweden)

    Jun-Hong Shen

    2016-11-01

    Full Text Available In pervasive computing, location-based services (LBSs are valuable for mobile clients based on their current locations. LBSs use spatial window queries to enable useful applications for mobile clients. Based on skewed access patterns of mobile clients, non-flat wireless broadcast has been shown to efficiently disseminate spatial objects to mobile clients. In this paper, we consider a scenario in which spatial objects are broadcast to mobile clients over a wireless channel in a non-flat broadcast manner to process window queries. For such a scenario, we propose an efficient spatial air index method to handle window query access in non-flat wireless broadcast environments. The concept of largest empty rectangles is used to avoid unnecessary examination of the broadcast content, thus reducing the processing time for window queries. Simulation results show that the proposed spatial air index method outperforms the existing methods under various settings.

  10. Bluetooth Broadcasting : How far can we go? An experimental study

    NARCIS (Netherlands)

    Aiello, Marco; Jong, Remko de; Nes, Joel de

    2009-01-01

    Bluetooth is a wireless communication technology to build small networks of devices. It was designed as a cable replacement technology. Given its widespread adoption, especially in mobile devices, new uses are possible today. For instance, one can broadcast messages to nomadic users based on their

  11. Commercial satellite broadcasting for Europe

    Science.gov (United States)

    Forrest, J. R.

    1988-12-01

    A review is presented of the current television broadcasting situation in European countries, which involves a varied mix of terrestrial VHF or UHF systems and cable networks. A small market has emerged in Europe for receivers using the low-power telecommunications satellite transmission between the program providers and cable network companies. This is expected to change with the launch of medium-power pan-European telecommunication satellites (e.g. ASTRA, EUTELSAT II), which are now directly addressing the market of home reception. DBS (direct broadcast satellite) in the UK, using the D-MAC transmission standard, will offer three additional television channels, data broadcasting services, and a planned evolution to compatible forms of wide-screen, high-definition television. Comments are given on receiver and conditional access system standardization. Some views are expressed on satellite broadcasting as part of an overall broadcasting framework for the future.

  12. Flight Extraction and Phase Identification for Large Automatic Dependent Surveillance–Broadcast Datasets

    NARCIS (Netherlands)

    Sun, J.; Ellerbroek, J.; Hoekstra, J.M.

    2017-01-01

    AUTOMATIC dependent surveillance–broadcast (ADS-B) [1,2] is widely implemented in modern commercial aircraft and will become mandatory equipment in 2020. Flight state information such as position, velocity, and vertical rate are broadcast by tens of thousands of aircraft around the world constantly

  13. Broadcasting, Reacting, Engaging

    DEFF Research Database (Denmark)

    Etter, Michael

    2014-01-01

    Purpose - Symmetric communication and relationship building are core principles of public relations, which have been highlighted for CSR communication. In this paper three different communication strategies for CSR communication in Twitter are developed, of which each contributes differently...... to the ideals of symmetric communication and relationship building. The framework is then applied to analyze how companies use the micro-blogging service Twitter for CSR communication. Design/methodology/approach - Social network analysis is used to identify the 30 most central corporate accounts in a CSR...... Twitter-Network. From these accounts over 40´000 tweets are extracted and manually coded. Anova is applied to investigate differences in the weighting of CSR topics between the different strategies. Findings - The analysis reveals that corporations adhere to a broadcasting strategy or a reactive strategy...

  14. A Resource Curriculum in Broadcast Media. Bulletin No. 8025.

    Science.gov (United States)

    Herian, Roger; Moen, Mary

    A resource for teachers who design instructional programs in broadcast media, this curriculum guide consists of eight units which deal with the nature of broadcast media, broadcast programming and public interest, broadcast advertising, broadcast regulation, societal effects of broadcasting, broadcasting and future technology, radio broadcasting,…

  15. Minimizing the negative effects of device mobility in cell-based ad-hoc wireless computational grids

    CSIR Research Space (South Africa)

    Mudali, P

    2006-09-01

    Full Text Available This paper provides an outline of research being conducted to minimize the disruptive effects of device mobility in wireless computational grid networks. The proposed wireless grid framework uses the existing GSM cellular architecture, with emphasis...

  16. Resource Allocation Management for Broadcast/Multicast Services

    OpenAIRE

    Fuente Iglesias, Alejandro de la; Pérez Leal, Raquel; García-Armada, Ana

    2015-01-01

    Ponencia presentada en: XXX Simposium Nacional de la Unión Científica Internacional de Radio, los dias 2 y 4 septiembre 2015, en Pamplona (españa). Video services are expected to become more than 70% of the mobile traffic in 2020. Broadcast and multicast service is the most efficient mechanism to deliver the same content to many users. Not only focusing on venue casting, but also distributing many other media such as software updates and breaking news, 5G broadcasting is a key driver to a...

  17. 78 FR 71557 - Radio Broadcasting Services; Tohatchi, New Mexico

    Science.gov (United States)

    2013-11-29

    ...] Radio Broadcasting Services; Tohatchi, New Mexico AGENCY: Federal Communications Commission. ACTION... Channel 268C2, Tohatchi, New Mexico, as a first local service under the Tribal Priority. A staff... [Amended] 0 2. Section 73.202(b), the Table of FM Allotments under New Mexico, is amended by adding...

  18. MQARR-AODV: A NOVEL MULTIPATH QOS AWARE RELIABLE REVERSE ON-DEMAND DISTANCE VECTOR ROUTING PROTOCOL FOR MOBILE AD-HOC NETWORKS

    Directory of Open Access Journals (Sweden)

    K.G. Santhiya

    2012-12-01

    Full Text Available MANET (Mobile Ad-hoc Network is an infra structure less wireless ad-hoc network that does not require any basic central control. The topology of the network changes drastically due to very fast mobility of nodes. So an adaptive routing protocol is needed for routing in MANET. AODV (Ad-hoc On-demand Distance Vector routing is the effective and prominent on-demand Ad-hoc routing protocols. During route establishment phase in traditional AODV, only one route reply message will be sent in the reverse path to establish routing path. The high mobility of nodes may affect the reply messages which lead to the retransmission of route request message by the sender which in turn leads to higher communication delay, power consumption and the reduction in the ratio of packets delivered. Sending multiple route reply messages and establishing multiple paths in a single path discovery will reduce the routing overhead involved in maintaining the connection between source and destination nodes. Multipath routing can render high scalability, end-to-end throughput and provide load balancing in MANET. The new proposed novel Multipath QoS aware reliable routing protocol establishes two routes of maximum node disjoint paths and the data transfer is carried out in the two paths simultaneously. To select best paths, the new proposed protocol uses three parameters Link Eminence, MAC overhead and node residual energy. The experimental values prove that the MQARR-AODV protocol achieves high reliability, stability, low latency and outperforms AODV by the less energy consumption, overhead and delay.

  19. Flexible Wi-Fi Communication among Mobile Robots in Indoor Industrial Environments

    Directory of Open Access Journals (Sweden)

    Jetmir Haxhibeqiri

    2018-01-01

    Full Text Available In order to speed up industrial processes and to improve logistics, mobile robots are getting important in industry. In this paper, we propose a flexible and configurable architecture for the mobile node that is able to operate in different network topology scenarios. The proposed solution is able to operate in presence of network infrastructure, in ad hoc mode only, or to use both possibilities. In case of mixed architecture, mesh capabilities will enable coverage problem detection and overcoming. The solution is based on real requirements from an automated guided vehicle producer. First, we evaluate the overhead introduced by our solution. Since the mobile robot communication relies in broadcast traffic, the broadcast scalability in mesh network is evaluated too. Finally, through experiments on a wireless testbed for a variety of scenarios, we analyze the impact of roaming, mobility and traffic separation, and demonstrate the advantage of our approach in handling coverage problems.

  20. Broadcast Services. Information Bulletin No. 3.

    Science.gov (United States)

    Federal Communications Commission, Washington, DC.

    Radio and television broadcasting is authorized and regulated by the Federal Communications Commission (FCC). Following a brief description of the development of broadcasting, broadcast regulations, and the Commission, this report examines various aspects of the subject pertaining to the fairness doctrine, political broadcasting, advertising, sale…

  1. GPS Ephemeris Message Broadcast Simulation

    National Research Council Canada - National Science Library

    Browne, Nathan J; Light, James J

    2005-01-01

    The warfighter constantly needs increased accuracy from GPS and a means to increasing this accuracy to the decimeter level is a broadcast ephemeris message containing GPS satellite orbit and clock corrections...

  2. Probabilistic Mobility Models for Mobile and Wireless Networks

    DEFF Research Database (Denmark)

    Song, Lei; Godskesen, Jens Christian

    2010-01-01

    In this paper we present a probabilistic broadcast calculus for mobile and wireless networks whose connections are unreliable. In our calculus broadcasted messages can be lost with a certain probability, and due to mobility the connection probabilities may change. If a network broadcasts a message...... from a location it will evolve to a network distribution depending on whether nodes at other locations receive the message or not. Mobility of locations is not arbitrary but guarded by a probabilistic mobility function (PMF) and we also define the notion of a weak bisimulation given a PMF...

  3. A Cellular Bonding and Adaptive Load Balancing Based Multi-Sim Gateway for Mobile Ad Hoc and Sensor Networks

    OpenAIRE

    Francesco Beritelli; Aurelio La Corte; Corrado Rametta; Francesco Scaglione

    2018-01-01

    As it is well known, the QoS(quality of service) provided by mobile Internet access point devices is far from the QoS level offered by the common ADSL modem-router due to several reasons: in fact, mobile Internet access networks are not designed to support real-time data traffic because of several drawbacks concerning the wireless medium such as resource sharing, traffic congestion, radio link coverage etc., which impact directly such parameters as delay, jitter, and packet loss rate that are...

  4. A Multi-User Game-Theoretical Multipath Routing Protocol to Send Video-Warning Messages over Mobile Ad Hoc Networks.

    Science.gov (United States)

    Mezher, Ahmad Mohamad; Igartua, Mónica Aguilar; de la Cruz Llopis, Luis J; Pallarès Segarra, Esteve; Tripp-Barba, Carolina; Urquiza-Aguiar, Luis; Forné, Jordi; Sanvicente Gargallo, Emilio

    2015-04-17

    The prevention of accidents is one of the most important goals of ad hoc networks in smart cities. When an accident happens, dynamic sensors (e.g., citizens with smart phones or tablets, smart vehicles and buses, etc.) could shoot a video clip of the accident and send it through the ad hoc network. With a video message, the level of seriousness of the accident could be much better evaluated by the authorities (e.g., health care units, police and ambulance drivers) rather than with just a simple text message. Besides, other citizens would be rapidly aware of the incident. In this way, smart dynamic sensors could participate in reporting a situation in the city using the ad hoc network so it would be possible to have a quick reaction warning citizens and emergency units. The deployment of an efficient routing protocol to manage video-warning messages in mobile Ad hoc Networks (MANETs) has important benefits by allowing a fast warning of the incident, which potentially can save lives. To contribute with this goal, we propose a multipath routing protocol to provide video-warning messages in MANETs using a novel game-theoretical approach. As a base for our work, we start from our previous work, where a 2-players game-theoretical routing protocol was proposed to provide video-streaming services over MANETs. In this article, we further generalize the analysis made for a general number of N players in the MANET. Simulations have been carried out to show the benefits of our proposal, taking into account the mobility of the nodes and the presence of interfering traffic. Finally, we also have tested our approach in a vehicular ad hoc network as an incipient start point to develop a novel proposal specifically designed for VANETs.

  5. A Multi-User Game-Theoretical Multipath Routing Protocol to Send Video-Warning Messages over Mobile Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    Ahmad Mohamad Mezher

    2015-04-01

    Full Text Available The prevention of accidents is one of the most important goals of ad hoc networks in smart cities. When an accident happens, dynamic sensors (e.g., citizens with smart phones or tablets, smart vehicles and buses, etc. could shoot a video clip of the accident and send it through the ad hoc network. With a video message, the level of seriousness of the accident could be much better evaluated by the authorities (e.g., health care units, police and ambulance drivers rather than with just a simple text message. Besides, other citizens would be rapidly aware of the incident. In this way, smart dynamic sensors could participate in reporting a situation in the city using the ad hoc network so it would be possible to have a quick reaction warning citizens and emergency units. The deployment of an efficient routing protocol to manage video-warning messages in mobile Ad hoc Networks (MANETs has important benefits by allowing a fast warning of the incident, which potentially can save lives. To contribute with this goal, we propose a multipath routing protocol to provide video-warning messages in MANETs using a novel game-theoretical approach. As a base for our work, we start from our previous work, where a 2-players game-theoretical routing protocol was proposed to provide video-streaming services over MANETs. In this article, we further generalize the analysis made for a general number of N players in the MANET. Simulations have been carried out to show the benefits of our proposal, taking into account the mobility of the nodes and the presence of interfering traffic. Finally, we also have tested our approach in a vehicular ad hoc network as an incipient start point to develop a novel proposal specifically designed for VANETs.

  6. Static analysis of topology-dependent broadcast networks

    DEFF Research Database (Denmark)

    Nanz, Sebastian; Nielson, Flemming; Nielson, Hanne Riis

    2010-01-01

    changing network topology is a crucial ingredient. In this paper, we develop a static analysis that automatically constructs an abstract transition system, labelled by actions and connectivity information, to yield a mobility-preserving finite abstraction of the behaviour of a network expressed......Broadcast semantics poses significant challenges over point-to-point communication when it comes to formal modelling and analysis. Current approaches to analysing broadcast networks have focused on fixed connectivities, but this is unsuitable in the case of wireless networks where the dynamically...... in a process calculus with asynchronous local broadcast. Furthermore, we use model checking based on a 3-valued temporal logic to distinguish network behaviour which differs under changing connectivity patterns. (C) 2009 Elsevier Inc. All rights reserved....

  7. The political attack ad

    Directory of Open Access Journals (Sweden)

    Palma Peña-Jiménez, Ph.D.

    2011-01-01

    Full Text Available During election campaigns the political spot has a clear objective: to win votes. This message is communicated to the electorate through television and Internet, and usually presents a negative approach, which includes a direct critical message against the opponent, rather than an exposition of proposals. This article is focused on the analysis of the campaign attack video ad purposely created to encourage the disapproval of the political opponent among voters. These ads focus on discrediting the opponent, many times, through the transmission of ad hominem messages, instead of disseminating the potential of the political party and the virtues and manifesto of its candidate. The article reviews the development of the attack ad since its first appearance, which in Spain dates back to 1996, when the famous Doberman ad was broadcast, and examines the most memorable campaign attack ads.

  8. Mobilities

    DEFF Research Database (Denmark)

    to social networks, personal identities, and our relationship to the built environment. The omnipresence of mobilities within everyday life, high politics, technology, and tourism (to mention but a few) all point to a key insight harnessed by the ‘mobilities turn’. Namely that mobilities is much more than......The world is on the move. This is a widespread understanding by many inhabitants of contemporary society across the Globe. But what does it actually mean? During over one decade the ‘mobilities turn’ within the social sciences have provided a new set of insights into the repercussions of mobilities...... and environmental degradation. The spaces and territories marked by mobilities as well as the sites marked by the bypassing of such are explored. Moreover, the architectural and technological dimensions to infrastructures and sites of mobilities will be included as well as the issues of power, social exclusion...

  9. Effects of organic amendments on the mobility of Pb and Zn from mine tailings added to semi-arid soils.

    Science.gov (United States)

    Barajas-Aceves, M; Rodríguez-Vázquez, R

    2013-01-01

    The effects of mine tailings and three organic amendments (compost, bokashi and vermicompost) on the mobility factor for Pb and Zn and on the potential C and N mineralization in semi-arid agricultural and rangeland soils were examined. During the experiment, soil samples were analyzed periodically for CO(2)-C evolution, inorganic N, dehydrogenase activity and percent Pb and Zn mobility during 169 d of incubation. The dehydrogenase activity and CO(2)-C evolved were strongly inhibited by mine tailings mixed with organic compost in both agricultural and rangeland soils (37 to 43 %), followed by N mineralization in treatments with mine tailings plus bokashi or compost (13 to 26.5 %) at 169 d incubation. The highest % mobility of Pb and Zn were observed in soils amended with mine tailings alone, while the lowest was observed in agricultural soils treated with vermicompost plus mine tailings. The CO(2)-C evolved was fitted to first order E, while the cumulative N mineralization was fitted to the linearized power function. Mine tailings were found to influence the potential C and N mineralization rate constants in both soils. The models for C and N mineralization could be used to evaluate the effects of mine tailings, which include intrinsic parameters in the soil.

  10. Adding Value to the Network: Exploring the Software as a Service and Platform as a Service Models for Mobile Operators

    Science.gov (United States)

    Gonçalves, Vânia

    The environments of software development and software provision are shifting to Web-based platforms supported by Platform/Software as a Service (PaaS/SaaS) models. This paper will make the case that there is equally an opportunity for mobile operators to identify additional sources of revenue by exposing network functionalities through Web-based service platforms. By elaborating on the concepts, benefits and risks of SaaS and PaaS, several factors that should be taken into consideration in applying these models to the telecom world are delineated.

  11. Analisis Unjuk Kerja Aplikasi VoIP Call Android di Jaringan MANET [Performance Analysis of VoIP Call Application Android in MANET (Mobile Ad Hoc Network

    Directory of Open Access Journals (Sweden)

    Ryan Ari Setyawan

    2015-06-01

    Full Text Available Penelitian ini bertujuan menganalisis kinerja aplikasi  VoIP call android di jaringan MANET (mobile ad hoc network.  Hasil pengujian menunjukan bahwa aplikasi VoIP call android dapat digunakan di jaringan MANET. Delay yang dihasilkan paling besar di pengujian indoor dengan jarak 11-15 meter yakni sebesar 0,014624811 seconds. Packet loss yang dihasilkan pada range 1%-2% sedangkan standar packet loss yang ditetapkan oleh CISCO untuk layanan aplikasi VoIP adalah < 5%. Jitter yang dihasilkan yakni antara 0,01-0,06 seconds sedangkan standar yang ditetapkan oleh CISCO adalah ≤ 30 ms atau 0,03 seconds. Throughput yang dihasilkan pada proses pengujian yakni antar 161 kbps-481 kbps. *****This study aims to analyze the performance of VOIP call android application in the MANET (mobile ad hoc network. The results showed that VoIP applications could be implemented in MANET network. The highest  delay is produced in indoor testing  with distance of 11-15 meters,  which is equal to 0.014624811 seconds. Packet loss is generated in the range of 1% -2%, while packet loss standards set by Cisco for VoIP application services are <5%. The jitter is between 0.01 to 0.06 seconds, while the standard set by CISCO is ≤ 30 ms or 0.03 seconds. Throughput generated in the testing process is between 161 kbps-481 kbps.

  12. Detection and Prevention of Denial of Service (DoS Attacks in Mobile Ad Hoc Networks using Reputation-based Incentive Schemes

    Directory of Open Access Journals (Sweden)

    Mieso, K Denko

    2005-08-01

    Full Text Available Mobile ad hoc networks (MANETs are dynamic mobile networks that can be formed in the absence of any pre-existing communication infrastructure. In addition to node mobility, a MANET is characterized by limited resources such as bandwidth, battery power, and storage space. The underlying assumption in MANETs is that the intermediate nodes cooperate in forwarding packets. However, this assumption does not hold in commercial and emerging civilian applications. MANETs are vulnerable to Denial of Service (DoS due to their salient characteristics. There is a need to provide an incentive mechanism that can provide cooperation among nodes in the network and improve overall network performance by reducing DoS attacks. In this paper, we propose a reputation-based incentive mechanism for detecting and preventing DoS attacks. DoS attacks committed by selfish and malicious nodes were investigated. Our scheme motivates nodes to cooperate and excludes them from the network only if they fail to do so. We evaluated the performance of our scheme using the packet delivery ratio, the routing and communication overhead, and misbehaving node detection in a discrete event-simulation environment. The results indicate that a reputation-based incentive mechanism can significantly reduce the effect of DoS attacks and improve performance in MANETs.

  13. Research on user interest modeling in mobile ad recommendation%手机广告推荐中的用户兴趣建模研究

    Institute of Scientific and Technical Information of China (English)

    顾其威; 郭鹏; 潘锋

    2012-01-01

    为了增强基于WAP网页的手机广告推荐中用户建模的准确性,并对“非邀”式广告推荐中脱离用户兴趣试探性推荐进行修正,针对手机广告推荐中手机屏幕小、用户注意力集中等特点,根据用户对广告的访问历史和操作模式建立其广告兴趣模型和非兴趣模型,同时分析用户网页访问模式探测其网页兴趣度,在此基础上建立用户综合兴趣模型.分别采用基于网页兴趣模型、基于广告兴趣模型和基于用户综合兴趣模型进行广告推荐,随着样本空间增大,综合兴趣模型的查准率明显优于另两者.实验验证了用户综合兴趣模型在手机广告推荐中的有效性和优越性.%For enhancing the accuracy of mobile advertising recommendation on the basis of WAP Web page, and amending the exploratory recommended in the mobile advertising recommendation of which recommendation pattern is No Invitation, on account of mobile phone' s small screen and user' s great attention, builds advertising interest model and noninterest model according the ads visiting history and operation mode. Simultaneously, analyzed the Web access mode to detect the user' s Web interest degree, proposed a user comprehensive interest model which considering the user' s Web interest and user' s ads interest. Employed three recommended patterns to recommend the mobile advertising based on Web page interest model, advertising interest model and comprehensive interest model, with the sample space growing, the accuracy of comprehensive interest model was superior to other two models. Experiments prove that the effectiveness and superiority of comprehensive model in the mobile advertising recommendation.

  14. On-the-fly Packet Error Recovery in a Cooperative Cluster of Mobile Devices

    DEFF Research Database (Denmark)

    Vingelmann, Peter; Heide, Janus; Pedersen, Morten Videbæk

    2011-01-01

    This paper investigates the possibility of packet error recovery in a cooperative cluster of mobile devices. We assume that these devices receive data from a broadcast transmission on their primary network interface (e.g. LTE network), and they are using a secondary network interface (e.g. ad hoc....... We also introduce a demo application that implements this technique on Nokia phones. Then we present our testbed and the collected measurement results in order to evaluate the performance of our protocol....

  15. Health Education by Open Broadcast.

    Science.gov (United States)

    ICIT Report, 1976

    1976-01-01

    This issue focuses on uses and techniques of radio for educational purposes in developing nations. Two health education projects are described which are utilizing open broadcasting to attract a mass audience of listeners not committed to a structured radio education program. Kenya's Swahili language radio serial, "Giving Birth and Caring for your…

  16. Broadcast and Aggregation in BBC

    DEFF Research Database (Denmark)

    Hüttel, Hans; Kiilerich Pratas, Nuno

    2015-01-01

    In this paper we introduce a process calculus BBC that has both forms of communication. For both many-to-one and one-to-many communication, it is often a natural assumption that communication is bounded; this reflects two distinct aspects of the limitations of a medium. In the case of broadcast, ...

  17. Broadcasting Stations of the World; Part III. Frequency Modulation Broadcasting Stations.

    Science.gov (United States)

    Foreign Broadcast Information Service, Washington, DC.

    This third part of "Broadcasting Stations of the World", which lists all reported radio broadcasting and television stations, with the exception of those in the United States which broadcast on domestic channels, covers frequency modulation broadcasting stations. It contains two sections: one indexed alphabetically by country and city, and the…

  18. Anthropologists and Broadcasting: Roles and Entry Strategies

    Science.gov (United States)

    Eiselein, E. B.; Topper, Martin

    1976-01-01

    The article describes some of the roles open to anthropologists in radio and television. Entry strategies for occupying these roles include taking the first step in approaching the broadcast station, learning about broadcasting, and communicating anthropology to the broadcasters. (Author/NQ)

  19. Rapid screening of non-steroidal anti-inflammatory drugs illegally added in anti-rheumatic herbal supplements and herbal remedies by portable ion mobility spectrometry.

    Science.gov (United States)

    Li, Mengjiao; Ma, Haiyan; Gao, Jinglin; Zhang, Lina; Wang, Xinyu; Liu, Di; Bian, Jing; Jiang, Ye

    2017-10-25

    In this work, for the first time, a high-performance ion mobility spectrometry with electrospray ionization (ESI-HPIMS) method has been employed as a rapid screening tool for the detection of acetaminophen, ibuprofen, naproxen, diclofenac sodium and indomethacin illegally added in anti-rheumatic herbal supplements and herbal remedies. Samples were dissolved and filtered through a 0.45μm microporous membrane, then the filtrate was directly injected into the high-performance ion mobility spectrometry for analysis. Using this approach, the screening of illegal additions can be accomplished in as rapid as two to three minutes with no pretreatment required. The proposed method provided a LOD of 0.06-0.33μgmL -1 , as well as a good seperation of the five NSAIDs. The precision of the method was 0.1-0.4% (repeatability, n=6) and 0.9-3.3% (reproducibility, n=3). The proposed method appeared to be simple, rapid and highly specific, thus could be effective for the in-situ screening of NSAIDs in anti-rheumatic herbal supplements and herbal remedies. Copyright © 2017 Elsevier B.V. All rights reserved.

  20. Robust Radio Broadcast Monitoring Using a Multi-Band Spectral Entropy Signature

    Science.gov (United States)

    Camarena-Ibarrola, Antonio; Chávez, Edgar; Tellez, Eric Sadit

    Monitoring media broadcast content has deserved a lot of attention lately from both academy and industry due to the technical challenge involved and its economic importance (e.g. in advertising). The problem pose a unique challenge from the pattern recognition point of view because a very high recognition rate is needed under non ideal conditions. The problem consist in comparing a small audio sequence (the commercial ad) with a large audio stream (the broadcast) searching for matches.

  1. AD HOC Networks for the Autonomous Car

    Science.gov (United States)

    Ron, Davidescu; Negrus, Eugen

    2017-10-01

    The future of the vehicle is made of cars, roads and infrastructures connected in a two way automated communication in a holistic system. It is a mandatory to use Encryption to maintain Confidentiality, Integrity and Availability in an ad hoc vehicle network. Vehicle to Vehicle communication, requires multichannel interaction between mobile, moving and changing parties to insure the full benefit from data sharing and real time decision making, a network of such users referred as mobile ad hoc network (MANET), however as ad hoc networks were not implemented in such a scale, it is not clear what is the best method and protocol to apply. Furthermore the visibility of secure preferred asymmetric encrypted ad hoc networks in a real time environment of dense moving autonomous vehicles has to be demonstrated, In order to evaluate the performance of Ad Hoc networks in changing conditions a simulation of multiple protocols was performed on large number of mobile nodes. The following common routing protocols were tested, DSDV is a proactive protocol, every mobile station maintains a routing table with all available destinations, DSR is a reactive routing protocol which allows nodes in the MANET to dynamically discover a source route across multiple network hops, AODV is a reactive routing protocol Instead of being proactive. It minimizes the number of broadcasts by creating routes based on demand, SAODV is a secure version of AODV, requires heavyweight asymmetric cryptographic, ARIANDE is a routing protocol that relies on highly efficient symmetric cryptography the concept is primarily based on DSR. A methodical evolution was performed in a various density of transportation, based on known communication bench mark parameters including, Throughput Vs. time, Routing Load per packets and bytes. Out of the none encrypted protocols, It is clear that in terms of performance of throughput and routing load DSR protocol has a clear advantage the high node number mode. The encrypted

  2. Unified broadcast in sensor networks

    DEFF Research Database (Denmark)

    Hansen, Morten Tranberg; Jurdak, Raja; Kusy, Branislav

    2011-01-01

    of the network stack. UB is implemented as a transparent layer between the link and network layers, where it delays, schedules, and combines broadcasts from upper layer protocols before transmission on the wireless channel. Our empirical results in simulation and on a testbed show that UB can decrease...... the overall packet transmissions in the network by more than 60%, corresponding to more than 40% energy savings, without requiring new interfaces or affecting the correctness of the upper layer protocols....

  3. Developments in the Regulation of Broadcasting Advertising

    OpenAIRE

    Morris, Yvonne; Randle, Paul

    2005-01-01

    This Intervention provides a review of developments in the regulation of broadcast advertising within the UK. The piece focuses on the implications of media convergence on broadcast advertising, and provides a brief history and analysis of the regulation of broadcast advertising within the UK. The piece also reviews Advertising Codes and provides an overview of regulatory bodies such as OFCOM and the ASA, and their respective roles.

  4. Hearings Before the Select Committee on Nutrition and Human Needs of the United States Senate, Ninety-Third Congress, First Session. Nutrition Education 1973. Part 8--Broadcast Industry's Response to TV Ads. Hearings Held Washington, D.C., June 11, 1973.

    Science.gov (United States)

    Congress of the U.S., Washington, DC. Senate Select Committee on Nutrition and Human Needs.

    These hearings are with the broadcasting industry on television advertising of food to children. The committee had heard testimony previously from nutritionists, dentists and consumers that there is incessant advertising of sugared and snack foods on television to children, which adversely affects their dental and physical health. The Code…

  5. Optic Fibers as a Broadcasting Media

    Directory of Open Access Journals (Sweden)

    Jusuf QARKAXHIJA

    2018-04-01

    Full Text Available Fast brodcasting of an information is always a challange from our daily activities. Through fast broadcasting of the information always created pre-eminence in military activities, business, researching, etc. From ancient times we know that information was orally and hand in hand broadcasted which in most of the times casused in loss of information and due to this also in loss of activities which are mentioned above. Due to information technology notably computer networks and internet overtime information started broadcasting faster. Information started broadcasting through copper wires and through wireless. Big applications started to develop with the increased use of Internet, high quality broadcasting (HD, video on demand broadcasting (VoD, triple pay broadcasting (three services on a medium, etc., then these two mediums couldn’t complete all these requests. Therfore after these problems, optic fiber began to be used as a broadcasting medium which eleminated all the defects of other mediums. Importance of this paper work is telling developing stages of optic fiber, it’s characteristics and it’s losses. Then it is shown that which devises enforce the signal of fibers and in the end all three mediums that we mentioned are compared on the basis of attributes. Findings form the paper will only enforce that knowledge we had before about optic fiber, the best broadcasting medium.

  6. Watershed Education for Broadcast Meteorologists

    Science.gov (United States)

    Lamos, J. P.; Sliter, D.; Espinoza, S.; Spangler, T. C.

    2006-12-01

    The National Environmental Education and Training Organization (NEETF) published a report in 2005 that summarized the findings of ten years of NEETF and Roper Research. The report stated, "Our years of data from Roper surveys show a persistent pattern of environmental ignorance even among the most educated and influential members of society." Market research has also shown that 80% of television viewers list the weather as the primary reason for watching the local news. Broadcast meteorologists, with a broader understanding of environmental and related sciences have an opportunity to use their weathercasts to inform the public about the environment and the factors that influence environmental health. As "station scientists," broadcast meteorologists can use the weather, and people's connection to it, to broaden their understanding of the environment they live in. Weather and watershed conditions associated with flooding and drought have major human and environmental impacts. Increasing the awareness of the general public about basic aspects of the hydrologic landscape can be an important part of mitigating the adverse effects of too much or too little precipitation, and of protecting the environment as well. The concept of a watershed as a person's natural neighborhood is a very important one for understanding hydrologic and environmental issues. Everyone lives in a watershed, and the health of a watershed is the result of the interplay between weather and human activity. This paper describes an online course to give broadcast meteorologists a basic understanding of watersheds and how watersheds are impacted by weather. It discusses how to convey watershed science to a media- savvy audience as well as how to model the communication of watershed and hydrologic concepts to the public. The course uses a narrative, story-like style to present its content. It is organized into six short units of instruction, each approximately 20 minutes in duration. Each unit is

  7. 47 CFR 73.6011 - Protection of TV broadcast stations.

    Science.gov (United States)

    2010-10-01

    ... 47 Telecommunication 4 2010-10-01 2010-10-01 false Protection of TV broadcast stations. 73.6011... RADIO BROADCAST SERVICES Class A Television Broadcast Stations § 73.6011 Protection of TV broadcast stations. Class A TV stations must protect authorized TV broadcast stations, applications for minor changes...

  8. ESA personal communications and digital audio broadcasting systems based on non-geostationary satellites

    Science.gov (United States)

    Logalbo, P.; Benedicto, J.; Viola, R.

    1993-01-01

    Personal Communications and Digital Audio Broadcasting are two new services that the European Space Agency (ESA) is investigating for future European and Global Mobile Satellite systems. ESA is active in promoting these services in their various mission options including non-geostationary and geostationary satellite systems. A Medium Altitude Global Satellite System (MAGSS) for global personal communications at L and S-band, and a Multiregional Highly inclined Elliptical Orbit (M-HEO) system for multiregional digital audio broadcasting at L-band are described. Both systems are being investigated by ESA in the context of future programs, such as Archimedes, which are intended to demonstrate the new services and to develop the technology for future non-geostationary mobile communication and broadcasting satellites.

  9. 8 CFR 204.13 - How can the International Broadcasting Bureau of the United States Broadcasting Board of...

    Science.gov (United States)

    2010-01-01

    ... description of the job to be performed; and (ii) The broadcasting expertise held by the alien, including how... broadcasts; hosts for news broadcasts, news analysis, editorial and other broadcast features; or a news analysis specialist. The term broadcaster does not include individuals performing purely technical or...

  10. Population planning broadcasts in Bangladesh.

    Science.gov (United States)

    Ali, S A

    1982-06-01

    Bangladesh's growth rate of 2.36%/year is one of the highest in the world and, if present population trends continue, Bangladesh will have 153 million people by the year 2000. The Government adopted a comprehensive population policy in 1976 and seeks to reduce the population growth rate to 0 by 1992. Bangladesh's population control program further aims to raise the contraceptive acceptance rate from the current level of 14% of eligible couples to 38% by 1985, to raise the number of current contraceptive users from 2.4 to 7.3 million couples, and to achieve a sterilization level of 3.4 million people. Radio Bangladesh, which has been broadcasting programs on family planning since 1965, is playing an important motivational role in this effort. A Population Planning Cell was established within Radio Bangladesh in 1975 and 5 subcells located throughout the country broadcast independent programs on family planning 6 days/week. Evaluative surveys have confirmed the belief that radio is the most popular form of mass communication in rural areas. 47% of respondents in 1 survey identified radio as their main source of information about family planning, although only 12% reported contraceptive usage. An important task for radio in Bangladesh is to convince listeners that family planning practice is not incompatible with Islamic ideals and to overcome other superstitions and misconceptions about contraception.

  11. Live broadcast from the Globe

    CERN Multimedia

    La tête au carréTuesday, 17 June 2008 between 2.00 and 3.00 p.m.“La tête au carré”, a France Inter radio programme devoted to science, will set up its sound booth at CERN for a special broadcast on the LHC.The journalist Mathieu Vidard will interview the following guests: - Pierre Van Hove, an experimental physicist working on CMS. He is a CNRS research scientist from the Institut Hubert Curien in Strasbourg, France.- Abdelhak Djouadi is a theoretical physicist. He is a research director at the CNRS’s Laboratoire de physique théorique at Orsay, France and holder of the CNRS silver medal.- Magali Gruwe, one of the engineers in charge of LHC operations at CERN.» To take part in this live broadcast, which is open to the public, come to the Globe at 1:30 p.m. The number of places is limited.» No specialist knowledge required.» See the programme's homepage

  12. History of Satellite TV Broadcasting and Satellite Broadcasting Market in Turkey

    Directory of Open Access Journals (Sweden)

    Mihalis KUYUCU

    2015-09-01

    Full Text Available The present study analyses the satellite broadcasting that is the first important development that emerged as a result of digitalization in communication technologies and its reflections in Turkey. As the first milestone in the globalization of television broadcasting, satellite broadcasting provided substantial contribution towards the development of the media. Satellite bro adcasting both increased the broadcasting quality and geographical coverage of the television media. A conceptual study was carried out in the first part of the study in connection with the history of satellite broadcasting in Turkey and across the world. In the research part of the study, an analysis was performed on 160 television channels that broadcast in Turkey via Turksat Satellite. Economic structure of the television channels broadcasting in Turkey via satellite was studied and an analysis was perfo rmed on the operational structure of the channels. As a result of the study, it was emphasized that the television channels broadcasting via satellite platform also use other platforms for the purpose of spreading their broadcasts and television channel ow ners make investments in different branches of the media, too. Capital owners invest in different business areas other than the media although television channels broadcasting via Turksat mostly focus on thematic broadcasting and make effort to generate ec onomic income from advertisements. Delays are encountered in the course of the convergence between the new media and television channels that broadcast only from the satellite platform and such television channels experience more economic problems than the other channels. New media and many TV broadcasting platforms emerged as a result of the developments in the communication technologies. In television broadcasting, satellite platform is not an effective platform on its own. Channels make effort to reach t o more people by using other platforms in addition to

  13. Perceptions of Advertising Influence on Broadcast News.

    Science.gov (United States)

    Brown, Hubert W.; Barnes, Beth E.

    2001-01-01

    Finds that while students (studying broadcast journalism or advertising) and practitioners (station news directors and agency media directors) were in agreement on the majority of opinion statements discussing advertising's influence on broadcast news content, except students were less bothered by advertising's influence on news content than were…

  14. Beyond the Anchor: Students and Broadcasting Opportunities.

    Science.gov (United States)

    Marks, Rick

    1999-01-01

    Describes how the author taught a class (called "Editing for Broadcasting") for 19 neophyte newspeople through total immersion: students learned how to run a newsroom while operating one. Notes that students learned the principles and fundamentals of broadcast journalism, including news judgment, writing, editing, reporting, and…

  15. Management Theories and Broadcasting: A Handbook.

    Science.gov (United States)

    Craig, J. Robert; Hindmarsh, Wayne A.

    Today's contemporary management and motivation theories, as applied to the business of broadcasting, are the focus of the first section of this paper. It deals with the kinds and reactions of employees in broadcasting stations in relation to 11 motivational theories: (1) Theories X and Y, (2) Immaturity-Maturity Theory, (3) V Theory, (4) Z Theory,…

  16. 47 CFR 73.1217 - Broadcast hoaxes.

    Science.gov (United States)

    2010-10-01

    ... broadcast station shall broadcast false information concerning a crime or a catastrophe if: (a) The licensee... harm would occur. A “crime” is any act or omission that makes the offender subject to criminal punishment by law. A “catastrophe” is a disaster or imminent disaster involving violent or sudden event...

  17. Broadcast Copywriting and Computer Assisted Instruction.

    Science.gov (United States)

    Hagerman, William L.

    The teaching of broadcast copywriting can be enhanced by computer assisted instruction, especially in screening students' writing for adherence to classic "formulas" or "rules" for broadcast writing. Such rules might include avoiding cliches or not beginning a sentence with a subordinate clause. Other rules the computer can…

  18. Real Time Synchronization of Live Broadcast Streams with User Generated Content and Social Network Streams

    NARCIS (Netherlands)

    Stokking, H.M.; Kaptein, A.M.; Veenhuizen, A.T.; Spitters4, M.M.; Niamut, O.A.

    2013-01-01

    This paper describes the work in the FP7 STEER project on augmenting a live broadcast with live user generated content. This user generated content consists of both video content, captured with mobile devices, and social network content, such as Facebook or Twitter messages. To enable multi-source

  19. Safety message broadcast in vehicular networks

    CERN Document Server

    Bi, Yuanguo; Zhuang, Weihua; Zhao, Hai

    2017-01-01

    This book presents the current research on safety message dissemination in vehicular networks, covering medium access control and relay selection for multi-hop safety message broadcast. Along with an overall overview of the architecture, characteristics, and applications of vehicular networks, the authors discuss the challenging issues in the research on performance improvement for safety applications, and provide a comprehensive review of the research literature. A cross layer broadcast protocol is included to support efficient safety message broadcast by jointly considering geographical location, physical-layer channel condition, and moving velocity of vehicles in the highway scenario. To further support multi-hop safety message broadcast in a complex road layout, the authors propose an urban multi-hop broadcast protocol that utilizes a novel forwarding node selection scheme. Additionally, a busy tone based medium access control scheme is designed to provide strict priority to safety applications in vehicle...

  20. Random broadcast on random geometric graphs

    Energy Technology Data Exchange (ETDEWEB)

    Bradonjic, Milan [Los Alamos National Laboratory; Elsasser, Robert [UNIV OF PADERBORN; Friedrich, Tobias [ICSI/BERKELEY; Sauerwald, Tomas [ICSI/BERKELEY

    2009-01-01

    In this work, we consider the random broadcast time on random geometric graphs (RGGs). The classic random broadcast model, also known as push algorithm, is defined as: starting with one informed node, in each succeeding round every informed node chooses one of its neighbors uniformly at random and informs it. We consider the random broadcast time on RGGs, when with high probability: (i) RGG is connected, (ii) when there exists the giant component in RGG. We show that the random broadcast time is bounded by {Omicron}({radical} n + diam(component)), where diam(component) is a diameter of the entire graph, or the giant component, for the regimes (i), or (ii), respectively. In other words, for both regimes, we derive the broadcast time to be {Theta}(diam(G)), which is asymptotically optimal.

  1. Metadata for the description of broadcast assets

    DEFF Research Database (Denmark)

    Efthimiadis, Efthimis N.; Mai, Jens Erik; Burrows, Paul E.

    2003-01-01

    The Corporation for Public Broadcasting (CPB) and public broadcasters consider Media Asset Management (MAM) of critical importance since without a concerted and cooperative plan to manage their vast library of content, broadcasters are unable to reach their potential for service in the digital age....... The concerns for Media Asset Management, human and technical, are myriad. Media Asset Management is the framework upon which many of the largest technology projects will be built, including the future interconnection system between and among CPB member stations. It is CPB's hope that its licensees...... and their partners in university, museum, and library communities, will work together to contribute to Media Asset Management solutions. These issues are not unique to Public Broadcasters. Similar issues are faced by all networks at different levels of complexity. This panel will present efforts by broadcasters...

  2. Lossless Compression of Broadcast Video

    DEFF Research Database (Denmark)

    Martins, Bo; Eriksen, N.; Faber, E.

    1998-01-01

    We investigate several techniques for lossless and near-lossless compression of broadcast video.The emphasis is placed on the emerging international standard for compression of continous-tone still images, JPEG-LS, due to its excellent compression performance and moderatecomplexity. Except for one...... cannot be expected to code losslessly at a rate of 125 Mbit/s. We investigate the rate and quality effects of quantization using standard JPEG-LS quantization and two new techniques: visual quantization and trellis quantization. Visual quantization is not part of baseline JPEG-LS, but is applicable...... in the framework of JPEG-LS. Visual tests show that this quantization technique gives much better quality than standard JPEG-LS quantization. Trellis quantization is a process by which the original image is altered in such a way as to make lossless JPEG-LS encoding more effective. For JPEG-LS and visual...

  3. The cigarette advertising broadcast ban and magazine coverage of smoking and health.

    Science.gov (United States)

    Warner, K E; Goldenhar, L M

    1989-01-01

    At the time of the cigarette broadcast advertising ban, which took effect in 1971, cigarette manufacturers rapidly shifted advertising expenditures from the broadcast media to the print media. In the last year of broadcast advertising and the first year of the ban, cigarette ad expenditures in a sample of major national magazines increased by 49 and then 131 percent in constant dollars. From an 11-year period preceding the ban to an 11-year period following it, these magazines decreased their coverage of smoking and health by 65 percent, an amount that is statistically significantly greater than decreases found in magazines that did not carry cigarette ads and in two major newspapers. This finding adds to evidence that media dependent on cigarette advertising have restricted their coverage of smoking and health. This may have significant implications for public health, as well as raising obvious concerns about the integrity of the profession of journalism.

  4. Dynamic ad hoc networks

    CERN Document Server

    Rashvand, Habib

    2013-01-01

    Motivated by the exciting new application paradigm of using amalgamated technologies of the Internet and wireless, the next generation communication networks (also called 'ubiquitous', 'complex' and 'unstructured' networking) are changing the way we develop and apply our future systems and services at home and on local, national and global scales. Whatever the interconnection - a WiMAX enabled networked mobile vehicle, MEMS or nanotechnology enabled distributed sensor systems, Vehicular Ad hoc Networking (VANET) or Mobile Ad hoc Networking (MANET) - all can be classified under new networking s

  5. A Group Based Key Sharing and Management Algorithm for Vehicular Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    Zeeshan Shafi Khan

    2014-01-01

    Full Text Available Vehicular ad hoc networks (VANETs are one special type of ad hoc networks that involves vehicles on roads. Typically like ad hoc networks, broadcast approach is used for data dissemination. Blind broadcast to each and every node results in exchange of useless and irrelevant messages and hence creates an overhead. Unicasting is not preferred in ad-hoc networks due to the dynamic topology and the resource requirements as compared to broadcasting. Simple broadcasting techniques create several problems on privacy, disturbance, and resource utilization. In this paper, we propose media mixing algorithm to decide what information should be provided to each user and how to provide such information. Results obtained through simulation show that fewer number of keys are needed to share compared to simple broadcasting. Privacy is also enhanced through this approach.

  6. Towards reliable multi-hop broadcast in VANETs : An analytical approach

    NARCIS (Netherlands)

    Gholibeigi, M.; Baratchi, M.; Berg, J.L. van den; Heijenk, G.

    2017-01-01

    Intelligent Transportation Systems in the domain of vehicular networking, have recently been subject to rapid development. In vehicular ad hoc networks, data broadcast is one of the main communication types and its reliability is crucial for high performance applications. However, due to the lack of

  7. Towards Reliable Multi-Hop Broadcast in VANETs: An Analytical Approach

    NARCIS (Netherlands)

    Gholibeigi, Mozhdeh; Baratchi, Mitra; van den Berg, Hans Leo; Heijenk, Geert

    2016-01-01

    Intelligent Transportation Systems in the domain of vehicular networking, have recently been subject to rapid development. In vehicular ad hoc networks, data broadcast is one of the main communication types and its reliability is crucial for high performance applications. However, due to the lack of

  8. Supervision de la sécurité pour des réseaux ad hoc mobiles : un système léger, robuste, et fiable de détection d'intrusion

    OpenAIRE

    Alattar , Mouhannad

    2013-01-01

    Mobile Ad hoc NETworks (referred to as MANETs) continue increasing their presence in our every day life. They become a corner stone in the commercial, the society, the military, the science, and even the next-generation applications. However, these networks mostly operate over open environments and are therefore vulnerable to a large body of threats. Traditional ways of securing networks relying on preventive techniques, e.g., firewall and encryption, are not sufficient and should henceforth ...

  9. 47 CFR 74.705 - TV broadcast analog station protection.

    Science.gov (United States)

    2010-10-01

    ... 47 Telecommunication 4 2010-10-01 2010-10-01 false TV broadcast analog station protection. 74.705... EXPERIMENTAL RADIO, AUXILIARY, SPECIAL BROADCAST AND OTHER PROGRAM DISTRIBUTIONAL SERVICES Low Power TV, TV Translator, and TV Booster Stations § 74.705 TV broadcast analog station protection. (a) The TV broadcast...

  10. 47 CFR 73.4102 - FAA communications, broadcast of.

    Science.gov (United States)

    2010-10-01

    ... 47 Telecommunication 4 2010-10-01 2010-10-01 false FAA communications, broadcast of. 73.4102 Section 73.4102 Telecommunication FEDERAL COMMUNICATIONS COMMISSION (CONTINUED) BROADCAST RADIO SERVICES RADIO BROADCAST SERVICES Rules Applicable to All Broadcast Stations § 73.4102 FAA communications...

  11. Political Broadcast Advertising and Primary Election Voting

    Science.gov (United States)

    Wanat, John

    1974-01-01

    Results of a research project which hypothisized that: Other things being equal, the heavier a candidate's usage of broadcast advertising in a primary election campaign, the greater will be his share of the votes in the election. (Author/HB)

  12. Mass storage system by using broadcast technology

    International Nuclear Information System (INIS)

    Fujii, Hirofumi; Itoh, Ryosuke; Manabe, Atsushi; Miyamoto, Akiya; Morita, Youhei; Nozaki, Tadao; Sasaki, Takashi; Watase, Yoshiyuko; Yamasaki, Tokuyuki

    1996-01-01

    There are many similarities between data recording systems for high energy physics and broadcast systems; the data flow is almost one-way, requires real-time recording; requires large-scale automated libraries for 24-hours operation, etc. In addition to these functional similarities, the required data-transfer and data-recording speeds are also close to those for near future experiments. For these reasons, we have collaborated with SONY Broadcast Company to study the usability of broadcast devices for our data storage system. Our new data storage system consists of high-speed data recorders and tape-robots which are originally based on the digital video-tape recorder and the tape-robot for broadcast systems. We are also studying the possibility to use these technologies for the online data-recording system for B-physics experiment at KEK. (author)

  13. The Digital Dividend of Terrestrial Broadcasting

    CERN Document Server

    Beutler, Roland

    2012-01-01

    The “digital revolution” of the last two decades has pervaded innumerable aspects of our daily lives and changed our planet irreversibly. The shift from analog to digital broadcasting has facilitated a seemingly infinite variety of new applications—audience interactivity being but one example. The greater efficiency and compression of digital media have endowed broadcasters with a “digital dividend” of spare transmission capacity over and above the requirements of terrestrial broadcasting. The question is, who will use it, and how? Comparing the European experience with that of broadcasters elsewhere in the world, the author sketches the current status of international frequency management, quantifies the value of the “dividend” itself, analyzes the details of the analog-to-digital switchovers already completed, and posits what the future holds for the sector. As we grapple with new devices, inconceivable a mere generation ago, that allow us to access digital media instantly, anywhere and at any...

  14. Synchronous Design and Test of Distributed Passive Radar Systems Based on Digital Broadcasting and Television

    Directory of Open Access Journals (Sweden)

    Wan Xianrong

    2017-02-01

    Full Text Available Digital broadcasting and television are important classes of illuminators of opportunity for passive radars. Distributed and multistatic structure are the development trends for passive radars. Most modern digital broadcasting and television systems work on a network, which not only provides a natural condition to distributed passive radar but also puts forward higher requirements on the design of passive radar systems. Among those requirements, precise synchronization among the receivers and transmitters as well as among multiple receiving stations, which mainly involves frequency and time synchronization, is the first to be solved. To satisfy the synchronization requirements of distributed passive radars, a synchronization scheme based on GPS is presented in this paper. Moreover, an effective scheme based on the China Mobile Multimedia Broadcasting signal is proposed to test the system synchronization performance. Finally, the reliability of the synchronization design is verified via the distributed multistatic passive radar experiments.

  15. 47 CFR 0.434 - Data bases and lists of authorized broadcast stations and pending broadcast applications.

    Science.gov (United States)

    2010-10-01

    ... stations and pending broadcast applications. 0.434 Section 0.434 Telecommunication FEDERAL COMMUNICATIONS... Commission § 0.434 Data bases and lists of authorized broadcast stations and pending broadcast applications... broadcast stations, pending applications for such stations, and rulemaking proceedings involving amendments...

  16. Context discovery in ad-hoc networks

    NARCIS (Netherlands)

    Liu, F.

    2011-01-01

    With the rapid development of wireless technology and portable devices, mobile ad-hoc networks (MANETs) are more and more present in our daily life. Ad-hoc networks are often composed of mobile and battery-supplied devices, like laptops, mobile phones, and PDAs. With no requirement for

  17. Advertising on mobile applications

    OpenAIRE

    Sobolevsky, Alexandr

    2015-01-01

    The article analyzes the new method of mobile advertising. Advertising in mobile applications - a subspecies of mobile marketing, where advertising is distributed using mobile phones and smartphones. Ad placement is going on inside of applications and games for smartphones. It has a high potential due to the large number of mobile phone users (over 6.5 billion in 2013).

  18. An Intelligent Broadcasting Algorithm for Early Warning Message Dissemination in VANETs

    Directory of Open Access Journals (Sweden)

    Ihn-Han Bae

    2015-01-01

    Full Text Available Vehicular ad hoc network (VANET has gained much attention recently to improve road safety, reduce traffic congestion, and enable efficient traffic management because of its many important applications in transportation. In this paper, an early warning intelligence broadcasting algorithm is proposed, EW-ICAST, to disseminate a safety message for VANETs. The proposed EW-ICAST uses not only the early warning system on the basis of time to collision (TTC but also the intelligent broadcasting algorithm on the basis of fuzzy logic. Thus, the EW-ICAST resolves effectively broadcast storm problem and meets time-critical requirement. The performance of EW-ICAST is evaluated through simulation and compared with that of other alert message dissemination algorithms. From the simulation results, we know that EW-ICAST is superior to Simple, P-persistence, and EDB algorithms.

  19. Hairy AdS solitons

    International Nuclear Information System (INIS)

    Anabalón, Andrés; Astefanesei, Dumitru; Choque, David

    2016-01-01

    We construct exact hairy AdS soliton solutions in Einstein-dilaton gravity theory. We examine their thermodynamic properties and discuss the role of these solutions for the existence of first order phase transitions for hairy black holes. The negative energy density associated to hairy AdS solitons can be interpreted as the Casimir energy that is generated in the dual filed theory when the fermions are antiperiodic on the compact coordinate.

  20. Hairy AdS solitons

    Energy Technology Data Exchange (ETDEWEB)

    Anabalón, Andrés, E-mail: andres.anabalon@uai.cl [Departamento de Ciencias, Facultad de Artes Liberales and Facultad de Ingeniería y Ciencias, Universidad Adolfo Ibáñez, Av. Padre Hurtado 750, Viña del Mar (Chile); Astefanesei, Dumitru, E-mail: dumitru.astefanesei@pucv.cl [Instituto de Física, Pontificia Universidad Católica de Valparaíso, Casilla 4059, Valparaíso (Chile); Choque, David, E-mail: brst1010123@gmail.com [Instituto de Física, Pontificia Universidad Católica de Valparaíso, Casilla 4059, Valparaíso (Chile); Universidad Técnica Federico Santa María, Av. España 1680, Valparaíso (Chile)

    2016-11-10

    We construct exact hairy AdS soliton solutions in Einstein-dilaton gravity theory. We examine their thermodynamic properties and discuss the role of these solutions for the existence of first order phase transitions for hairy black holes. The negative energy density associated to hairy AdS solitons can be interpreted as the Casimir energy that is generated in the dual filed theory when the fermions are antiperiodic on the compact coordinate.

  1. The Use of Television Format Adaptation in Denmark: Public Service Broadcasters Compared to Commercial Broadcasters

    DEFF Research Database (Denmark)

    Jensen, Pia Majbritt

    brought about major changes in both production and scheduling. This paper evaluates the impact that format adaptation has had in Denmark on public service broadcasters (PSBs) compared to commercial broadcasters. To illustrate transnational differences, references are made to Germany and Australia. First......, a quantitative analysis of PSB and commercial schedules in Denmark is presented to establish the extent to which PSBs have employed formats between 2000 and 2012, and how this compares with commercial broadcasters. Secondly, a qualitative analysis looks into genre and the nature of the individual formats...... employed to assess any important differences between the formats in the two sectors. Most formats fall within entertainment and is well suited to providing the consumption friendly environment that commercial broadcasters seek to offer their advertising clients (Brennan 2012). Broadcasters also favour...

  2. Satellite single-axis attitude determination based on Automatic Dependent Surveillance - Broadcast signals

    Science.gov (United States)

    Zhou, Kaixing; Sun, Xiucong; Huang, Hai; Wang, Xinsheng; Ren, Guangwei

    2017-10-01

    The space-based Automatic Dependent Surveillance - Broadcast (ADS-B) is a new technology for air traffic management. The satellite equipped with spaceborne ADS-B system receives the broadcast signals from aircraft and transfers the message to ground stations, so as to extend the coverage area of terrestrial-based ADS-B. In this work, a novel satellite single-axis attitude determination solution based on the ADS-B receiving system is proposed. This solution utilizes the signal-to-noise ratio (SNR) measurement of the broadcast signals from aircraft to determine the boresight orientation of the ADS-B receiving antenna fixed on the satellite. The basic principle of this solution is described. The feasibility study of this new attitude determination solution is implemented, including the link budget and the access analysis. On this basis, the nonlinear least squares estimation based on the Levenberg-Marquardt method is applied to estimate the single-axis orientation. A full digital simulation has been carried out to verify the effectiveness and performance of this solution. Finally, the corresponding results are processed and presented minutely.

  3. Efficient Mobile Client Caching Supporting Transaction Semantics

    Directory of Open Access Journals (Sweden)

    IlYoung Chung

    2000-05-01

    Full Text Available In mobile client-server database systems, caching of frequently accessed data is an important technique that will reduce the contention on the narrow bandwidth wireless channel. As the server in mobile environments may not have any information about the state of its clients' cache(stateless server, using broadcasting approach to transmit the updated data lists to numerous concurrent mobile clients is an attractive approach. In this paper, a caching policy is proposed to maintain cache consistency for mobile computers. The proposed protocol adopts asynchronous(non-periodic broadcasting as the cache invalidation scheme, and supports transaction semantics in mobile environments. With the asynchronous broadcasting approach, the proposed protocol can improve the throughput by reducing the abortion of transactions with low communication costs. We study the performance of the protocol by means of simulation experiments.

  4. Broadcasting a message in a parallel computer

    Science.gov (United States)

    Berg, Jeremy E [Rochester, MN; Faraj, Ahmad A [Rochester, MN

    2011-08-02

    Methods, systems, and products are disclosed for broadcasting a message in a parallel computer. The parallel computer includes a plurality of compute nodes connected together using a data communications network. The data communications network optimized for point to point data communications and is characterized by at least two dimensions. The compute nodes are organized into at least one operational group of compute nodes for collective parallel operations of the parallel computer. One compute node of the operational group assigned to be a logical root. Broadcasting a message in a parallel computer includes: establishing a Hamiltonian path along all of the compute nodes in at least one plane of the data communications network and in the operational group; and broadcasting, by the logical root to the remaining compute nodes, the logical root's message along the established Hamiltonian path.

  5. Automated quality control in a file-based broadcasting workflow

    Science.gov (United States)

    Zhang, Lina

    2014-04-01

    Benefit from the development of information and internet technologies, television broadcasting is transforming from inefficient tape-based production and distribution to integrated file-based workflows. However, no matter how many changes have took place, successful broadcasting still depends on the ability to deliver a consistent high quality signal to the audiences. After the transition from tape to file, traditional methods of manual quality control (QC) become inadequate, subjective, and inefficient. Based on China Central Television's full file-based workflow in the new site, this paper introduces an automated quality control test system for accurate detection of hidden troubles in media contents. It discusses the system framework and workflow control when the automated QC is added. It puts forward a QC criterion and brings forth a QC software followed this criterion. It also does some experiments on QC speed by adopting parallel processing and distributed computing. The performance of the test system shows that the adoption of automated QC can make the production effective and efficient, and help the station to achieve a competitive advantage in the media market.

  6. Satellite broadcasting - The European experience and perspective

    Science.gov (United States)

    Watson, Alan

    1991-11-01

    The use of satellites is considered as a means for developing a European transnational broadcasting system with attention given to the control of technology. A tension is described between maintaining technology as the property of one nation when the DBSs are developed for multinational program broadcasting. The simultaneous development of satellite systems is theorized to lead eventually to a single merged program for a particular nation, and the effect is considered of the regulation of cross-holding and cross-selling systems by investors.

  7. Transmission Quality Measurements in DAB+ Broadcast System

    Directory of Open Access Journals (Sweden)

    Gilski Przemysław

    2017-12-01

    Full Text Available In the age of digital media, delivering broadcast content to customers at an acceptable level of quality is one of the most challenging tasks. The most important factor is the efficient use of available resources, including bandwidth. An appropriate way of managing the digital multiplex is essential for both the economic and technical issues. In this paper we describe transmission quality measurements in the DAB+ broadcast system. We provide a methodology for analysing parameters and factors related with the efficiency and reliability of a digital radio link. We describe a laboratory stand that can be used for transmission quality assessment on a regional and national level.

  8. On using multiple routing metrics with destination sequenced distance vector protocol for MultiHop wireless ad hoc networks

    Science.gov (United States)

    Mehic, M.; Fazio, P.; Voznak, M.; Partila, P.; Komosny, D.; Tovarek, J.; Chmelikova, Z.

    2016-05-01

    A mobile ad hoc network is a collection of mobile nodes which communicate without a fixed backbone or centralized infrastructure. Due to the frequent mobility of nodes, routes connecting two distant nodes may change. Therefore, it is not possible to establish a priori fixed paths for message delivery through the network. Because of its importance, routing is the most studied problem in mobile ad hoc networks. In addition, if the Quality of Service (QoS) is demanded, one must guarantee the QoS not only over a single hop but over an entire wireless multi-hop path which may not be a trivial task. In turns, this requires the propagation of QoS information within the network. The key to the support of QoS reporting is QoS routing, which provides path QoS information at each source. To support QoS for real-time traffic one needs to know not only minimum delay on the path to the destination but also the bandwidth available on it. Therefore, throughput, end-to-end delay, and routing overhead are traditional performance metrics used to evaluate the performance of routing protocol. To obtain additional information about the link, most of quality-link metrics are based on calculation of the lost probabilities of links by broadcasting probe packets. In this paper, we address the problem of including multiple routing metrics in existing routing packets that are broadcasted through the network. We evaluate the efficiency of such approach with modified version of DSDV routing protocols in ns-3 simulator.

  9. Optimizing T-Learning Course Scheduling Based on Genetic Algorithm in Benefit-Oriented Data Broadcast Environments

    Science.gov (United States)

    Huang, Yong-Ming; Chen, Chao-Chun; Wang, Ding-Chau

    2012-01-01

    Ubiquitous learning receives much attention in these few years due to its wide spectrum of applications, such as the T-learning application. The learner can use mobile devices to watch the digital TV based course content, and thus, the T-learning provides the ubiquitous learning environment. However, in real-world data broadcast environments, the…

  10. WHO OWNS THE BROADCASTING TELEVISION NETWORK BUSINESS IN INDONESIA?

    Directory of Open Access Journals (Sweden)

    Rendra WIDYATAMA

    2018-06-01

    Full Text Available Broadcasting TV occupies a significant position in the community. Therefore, all the countries in the world give attention to TV broadcasting business. In Indonesia, the government requires TV stations to broadcast locally, except through networking. In this state, there are 763 private TV companies broadcasting free to air. Of these, some companies have many TV stations and build various broadcasting networks. In this article, the author reveals the substantial TV stations that control the market, based on literature studies. From the data analysis, there are 14 substantial free to network broadcast private TV broadcasters but owns by eight companies; these include the MNC Group, EMTEK, Viva Media Asia, CTCorp, Media Indonesia, Rajawali Corpora, and Indigo Multimedia. All TV stations are from Jakarta, which broadcasts in 22 to 32 Indonesian provinces.

  11. 47 CFR 73.297 - FM stereophonic sound broadcasting.

    Science.gov (United States)

    2010-10-01

    ... broadcast station may, without specific authority from the FCC, transmit stereophonic (biphonic... broadcasting must measure the pilot subcarrier frequency as often as necessary to ensure that it is kept at all...

  12. 75 FR 10692 - Television Broadcasting Services; Birmingham, AL

    Science.gov (United States)

    2010-03-09

    ...] Television Broadcasting Services; Birmingham, AL AGENCY: Federal Communications Commission. ACTION: Final... Television Commission, the licensee of noncommercial educational station WBIQ(TV), channel *10, Birmingham... Part 73 Television, Television broadcasting. 0 For the reasons discussed in the preamble, the Federal...

  13. 76 FR 52632 - Television Broadcasting Services; Panama City, FL

    Science.gov (United States)

    2011-08-23

    ...] Television Broadcasting Services; Panama City, FL AGENCY: Federal Communications Commission. ACTION: Proposed rule. SUMMARY: The Commission has before it a petition for rulemaking filed by Gray Television Licensee... 73 Television, Television broadcasting. Federal Communications Commission. Barbara A. Kreisman, Chief...

  14. 76 FR 35831 - Television Broadcasting Services; Eau Claire, WI

    Science.gov (United States)

    2011-06-20

    ...] Television Broadcasting Services; Eau Claire, WI AGENCY: Federal Communications Commission. ACTION: Proposed rule. SUMMARY: The Commission has before it a petition for rulemaking filed by Gray Television Licensee... 73 Television, Television broadcasting. Federal Communications Commission. Barbara A. Kreisman, Chief...

  15. 76 FR 14855 - Television Broadcasting Services; Nashville, TN

    Science.gov (United States)

    2011-03-18

    ... FEDERAL COMMUNICATIONS COMMISSION 47 CFR Part 73 [MB Docket No. 11-29, RM-11622; DA 11-335] Television Broadcasting Services; Nashville, TN AGENCY: Federal Communications Commission. ACTION: Proposed... 73 Television, Television broadcasting. Federal Communications Commission. Kevin R. Harding...

  16. 78 FR 44090 - Television Broadcasting Services; Cedar Rapids, Iowa

    Science.gov (United States)

    2013-07-23

    ...] Television Broadcasting Services; Cedar Rapids, Iowa AGENCY: Federal Communications Commission. ACTION... acceptance of full power television rulemaking petitions requesting channel substitutions in May 2011, it... 73 Television, Television broadcasting. Federal Communications Commission. Hossein Hashemzadeh...

  17. CAPITALISM VS BUSINESS ETHICS IN INDONESIA’S TELEVISION BROADCASTING

    Directory of Open Access Journals (Sweden)

    Rendra WIDYATAMA

    2018-05-01

    Full Text Available Generally, in every country, there is supervision of the television broadcasting system. In Indonesia, all television broadcasting is supervised by the Komisi Penyiaran Indonesia/KPI (Indonesian Broadcasting Commission. This commission oversees broadcast television, to ensure all TV broadcasts in Indonesia comply with government regulations. Often the KPI imposes sanctions, but frequent violations still occur. This article describes the results of research on the contradiction between business interests and ethics in the television industry in Indonesia. This study uses the method of evaluation research, where researchers analyze data, here in the form of sanctions documents released by broadcasting commissions. The results reveal that all national private television stations often violate regulations. They prioritize their business interests rather than follow broadcasting guidelines, especially since KPI does not have the full authority to grant and revoke a broadcasting license. The granting and revocation of permits remains under the authority of the government, where political lobbying plays a more significant role.

  18. Broadcast Condom Advertising: A Case Study.

    Science.gov (United States)

    Kaplan, Herb; Houlberg, Rick

    1990-01-01

    Examines a San Francisco television station's decision to accept paid condom advertising. Notes that station leaders debated questions of public interest and public tastes in a city hard hit by AIDS. Finds that the station devised careful guidelines and began broadcasting the commercials on a trial basis. Notes that nearly all public and media…

  19. Broadcast Journalism Education and the Capstone Experience

    Science.gov (United States)

    Tanner, Andrea; Forde, Kathy Roberts; Besley, John C.; Weir, Tom

    2012-01-01

    This study assesses the current state of the television news capstone experience in accredited journalism and mass communication programs in the United States. Specifically, the authors employed a mixed-methods approach, interviewing 20 television news capstone instructors and conducting an analysis of broadcast journalism curriculum information…

  20. Strategy and Space for Broadcasting Facilities

    DEFF Research Database (Denmark)

    Jensen, Per Anker

    2006-01-01

    The paper is based on results from an ongoing research project on space strategies and building values, which in-cludes a major case study of the development of facilities for the Danish Broadcasting Corporation over time. The focus is to identify, how different space strategies have been...

  1. Video Broadcasting Using Queue Proportional Scheduling

    Directory of Open Access Journals (Sweden)

    Dimitris Toumpakaris

    2007-01-01

    using a Markov Chain approach leading to a method for approximating the packet delay distribution. Based on the resulting distribution, it is discussed how the video encoding rate can be chosen in order to reduce the expected distortion of streams transmitted through Broadcast Channels.

  2. A special broadcast of CERN's Video news

    CERN Multimedia

    2003-01-01

    A special edition of CERN's video news giving a complete update on the LHC project is to be broadcast in the Main Auditorium. After your lunch make a small detour to the Main Auditorium, where you see the big picture. On 14, 15 and 16 May, between 12:30 and 14:00, a special edition of CERN's video news bulletin will be broadcast in the Main Auditorium. You will have the chance get up-to-date on the LHC project and its experiments. With four years to go before the first collisions in the LHC, the LHC Project Leader Lyn Evans will present a status report on the construction of the accelerator. The spokesmen of the five LHC experiments (ALICE, ATLAS, CMS, LHCb and TOTEM) will explain how the work is going and what the state of play will be in four years' time. This special video news broadcast is the result of collaboration between the CERN Audiovisual Service, the Photo Service and the External communication section. The broadcast will begin with a brand-new programme title sequence. And just as in the real c...

  3. Radio broadcasting for sustainable development in southern ...

    African Journals Online (AJOL)

    Patrick O. Waeber and Yvonne Orengo

    2008-12-01

    Dec 1, 2008 ... ABSTRACT. The Millennium Development Goals have been written into the Madagascar Road Map (2007 - 2012) in order to improve the Malagasy social, economic and environmental situation. The Andrew Lees Trust Radio Broadcasting Project in southern. Madagascar has been set up to alleviate ...

  4. Covering Adoption: General Depictions in Broadcast News

    Science.gov (United States)

    Kline, Susan L.; Karel, Amanda I.; Chatterjee, Karishma

    2006-01-01

    Using theories of stigma (Goffman, 1963) and media frames (Iyengar, 1991), 292 news stories pertaining to adoption that appeared on major broadcast networks between 2001 and 2004 were analyzed. Media coverage of adoptees contained more problematic than positive depictions. Although birth parents were not always depicted, adoptive parent and…

  5. 77 FR 33098 - Unlicensed Operation in the TV Broadcast Band

    Science.gov (United States)

    2012-06-05

    ...] Unlicensed Operation in the TV Broadcast Band AGENCY: Federal Communications Commission. ACTION: Correcting... matter of ``Unlicensed Operation in the TV Broadcast Band Approval.'' This document contains corrections... of this correction relate to ``Unlicensed Operation in the TV Broadcast Band Approval'' under Sec. 15...

  6. Mobilities Mobilities

    Directory of Open Access Journals (Sweden)

    César Pompeyo

    2011-12-01

    Full Text Available Urry, John (2007 Mobilities.Oxford: Polity Press.Urry, John (2007 Mobilities.Oxford: Polity Press.John Urry (1946-, profesor en la Universidad de Lancaster, es un sociólogo de sobra conocido y altamente reputado en el panorama internacional de las ciencias sociales. Su dilatada carrera, aparentemente dispersa y diversificada, ha seguido senderos bastante bien definidos dejando tras de sí un catálogo extenso de obras sociológicas de primer nivel. Sus primeros trabajos se centraban en el campo de la teoría social y la filosofía de las ciencias sociales o de la sociología del poder [...

  7. Direct broadcast satellite-radio market, legal, regulatory, and business considerations

    Science.gov (United States)

    Sood, Des R.

    1991-03-01

    A Direct Broadcast Satellite-Radio (DBS-R) System offers the prospect of delivering high quality audio broadcasts to large audiences at costs lower than or comparable to those incurred using the current means of broadcasting. The maturation of mobile communications technologies, and advances in microelectronics and digital signal processing now make it possible to bring this technology to the marketplace. Heightened consumer interest in improved audio quality coupled with the technological and economic feasibility of meeting this demand via DBS-R make it opportune to start planning for implementation of DBS-R Systems. NASA-Lewis and the Voice of America as part of their on-going efforts to improve the quality of international audio broadcasts, have undertaken a number of tasks to more clearly define the technical, marketing, organizational, legal, and regulatory issues underlying implementation of DBS-R Systems. The results and an assessment is presented of the business considerations underlying the construction, launch, and operation of DBS-R Systems.

  8. Direct broadcast satellite-radio market, legal, regulatory, and business considerations

    Science.gov (United States)

    Sood, Des R.

    1991-01-01

    A Direct Broadcast Satellite-Radio (DBS-R) System offers the prospect of delivering high quality audio broadcasts to large audiences at costs lower than or comparable to those incurred using the current means of broadcasting. The maturation of mobile communications technologies, and advances in microelectronics and digital signal processing now make it possible to bring this technology to the marketplace. Heightened consumer interest in improved audio quality coupled with the technological and economic feasibility of meeting this demand via DBS-R make it opportune to start planning for implementation of DBS-R Systems. NASA-Lewis and the Voice of America as part of their on-going efforts to improve the quality of international audio broadcasts, have undertaken a number of tasks to more clearly define the technical, marketing, organizational, legal, and regulatory issues underlying implementation of DBS-R Systems. The results and an assessment is presented of the business considerations underlying the construction, launch, and operation of DBS-R Systems.

  9. Mobility Tolerant Firework Routing for Improving Reachability in MANETs

    Directory of Open Access Journals (Sweden)

    Gen Motoyoshi

    2014-03-01

    Full Text Available In this paper, we investigate our mobility-assisted and adaptive broadcast routing mechanism, called Mobility Tolerant Firework Routing (MTFR, which utilizes the concept of potentials for routing and improves node reachability, especially in situations with high mobility, by including a broadcast mechanism. We perform detailed evaluations by simulations in a mobile environment and demonstrate the advantages of MTFR over conventional potential-based routing. In particular, we show that MTFR produces better reachability in many aspects at the expense of a small additional transmission delay and intermediate traffic overhead, making MTFR a promising routing protocol and feasible for future mobile Internet infrastructures.

  10. Generating Ideas for New Mobile TV Services

    DEFF Research Database (Denmark)

    Sørensen, Lene Tolstrup; Nicolajsen, Hanne Westh

    2010-01-01

    Mobile TV is still in its infancy in respect to identifying new services/content, which deploy the technology convergence of broadcasting, Internet and radio while satisfying the user with respect to interactivity, sociability and content, and at the same time fit the small screen of a mobile phone...

  11. Adding Ajax

    CERN Document Server

    Powers, Shelley

    2007-01-01

    Ajax can bring many advantages to an existing web application without forcing you to redo the whole thing. This book explains how you can add Ajax to enhance, rather than replace, the way your application works. For instance, if you have a traditional web application based on submitting a form to update a table, you can enhance it by adding the capability to update the table with changes to the form fields, without actually having to submit the form. That's just one example.Adding Ajax is for those of you more interested in extending existing applications than in creating Rich Internet Applica

  12. Histories of Public Service Broadcasters on the Web

    DEFF Research Database (Denmark)

    This edited volume details multiple and dynamic histories of relations between public service broadcasters and the World Wide Web. What does it mean to be a national broadcaster in a global communications environment? What are the commercial and public service pressures that were brought to bear...... when public service broadcasters implemented web services? How did “one- to-many” broadcasters adapt to the “many-to-many” medium of the internet? The thematic or- ganisation of this collection addresses such major issues, while each chapter offers a particular historical account of relations between...... public service broadcasters and the World Wide Web....

  13. 47 CFR 73.3572 - Processing of TV broadcast, Class A TV broadcast, low power TV, TV translators, and TV booster...

    Science.gov (United States)

    2010-10-01

    ... 47 Telecommunication 4 2010-10-01 2010-10-01 false Processing of TV broadcast, Class A TV broadcast, low power TV, TV translators, and TV booster applications. 73.3572 Section 73.3572... Rules Applicable to All Broadcast Stations § 73.3572 Processing of TV broadcast, Class A TV broadcast...

  14. How broadcast volume and emotional content affect youth recall of anti-tobacco advertising.

    Science.gov (United States)

    Biener, Lois; Wakefield, Melanie; Shiner, Cecilia M; Siegel, Michael

    2008-07-01

    Televised anti-tobacco advertising has been shown to be effective for discouraging smoking initiation; however, purchasing broadcasting time is very costly. This study investigated the relative impact of the broadcast volume (media weight) and the emotional content of an ad as predictors of advertising recall. The data come from a random-digit-dialed survey conducted in 2001 and 2002 of 3863 youth aged 12-17. Media weight was based on commercial TV ratings data. The emotional intensity of advertisements was derived from the ratings made by independent youth judges. Data analyses were conducted between 2005 and 2007. Results indicated that media weight was a significant predictor of recall, but the emotional content of the ad was an even stronger predictor. Also, ads low in emotional intensity required more media weight than those high in emotional intensity to achieve the same amount of increase in recall. This study extends prior research that highlights the importance of emotional intensity for effective anti-tobacco advertising. It also indicates that, relative to unemotional advertisements, emotionally arousing advertisements require fewer broadcasts to achieve the same level of recall, and hence are likely to be less costly to a public health campaign.

  15. Analysis and Implement of Broadcast Program Monitoring Data

    Directory of Open Access Journals (Sweden)

    Song Jin Bao

    2016-01-01

    Full Text Available With the rapid development of the radio and TV industry and the implementation of INT (the integration of telecommunications networks, cable TV networks and the Internet, the contents of programs and advertisements is showing massive, live and interactive trends. In order to meet the security of radio and television, the broadcast of information have to be controlled and administered. In order to master the latest information of public opinion trends through radio and television network, it is necessary research the specific industry applications of broadcast program monitoring. In this paper, the importance of broadcast monitoring in public opinion analysis is firstly analysed. The monitoring radio and television programs broadcast system architecture is proposed combining with the practice, focusing on the technical requirements and implementation process of program broadcast, advertisement broadcast and TV station broadcast monitoring. The more efficient information is generated through statistical analysis, which provides data analysis for radio and television public opinion analysis.

  16. Time coded distribution via broadcasting stations

    Science.gov (United States)

    Leschiutta, S.; Pettiti, V.; Detoma, E.

    1979-01-01

    The distribution of standard time signals via AM and FM broadcasting stations presents the distinct advantages to offer a wide area coverage and to allow the use of inexpensive receivers, but the signals are radiated a limited number of times per day, are not usually available during the night, and no full and automatic synchronization of a remote clock is possible. As an attempt to overcome some of these problems, a time coded signal with a complete date information is diffused by the IEN via the national broadcasting networks in Italy. These signals are radiated by some 120 AM and about 3000 FM and TV transmitters around the country. In such a way, a time ordered system with an accuracy of a couple of milliseconds is easily achieved.

  17. Buryat Ethnic Mentality and National Broadcasting

    Directory of Open Access Journals (Sweden)

    Dagbaev E.D.

    2016-01-01

    Full Text Available The article focuses on ways the national (in a regional aspect broadcasting impacts ethnic mind formation and its further development, the latter issues being under a main focus of Buryat State University scholars as well. They set an objective to investigate the issue from different angles, for this reason gathering within scientific projects into scholars’groups took place. In this case the group of educators, philologists and sociologists have focused on media which construct ethnic mind via interiorizing and cultivating ethnic-related ideas and images for five years. Providing a general outlook of the world, National Broadcasting (NB is a proper institutional mechanism that helps a person identify himself / herself among different ethnic groups. Ethnic identity and self-consciousness are manifested in various social and intercultural communications. This allows a person to become aware of the peculiarities of his / her and others’ ethnic communities. The outcomes of a sociological research held by the authors verify the significance of both the posed problems and the TV role. One may find theoretical and empirical data in Zandeeva, S.K. (2012, Dagbaeva, N.Zh.(2012, Dagbaev (2014, Dashinimaeva, P.P., et al (2015. Generally, national programs do contribute to integrating people of the same ethnicity into a common community, to shaping such moral qualities as humanity, love to motherland, respect for the elders and other ethnic nationalities. All these characteristics form proper rules of living in a tolerant community. At the same time, they contribute to strengthening of the feeling of ethnic unity. Beyond any doubt, NB needs a relevant assessment and interest to promote and advance its function in a modern society. On the one hand, telecommunications markets liberalize. On the other hand, broadcasting technologies have developed to a highest extent, leading to the increase of international competition [14]. Anyway, both directions force

  18. Time-Zone-Pattern Satellite Broadcasting Antenna

    Science.gov (United States)

    Galindo, Victor; Rahmat-Samii, Yahya; Imbriale, William A.; Cohen, Herb; Cagnon, Ronald R.

    1988-01-01

    Direct-broadcast satellite antenna designs provide contoured beams to match four time zones in 48 contiguous states and spot beams for Alaska, Hawaii, and Puerto Rico presented in 29-page report. Includes descriptions of procedures used to arrive at optimized designs. Arrangements, amplitudes, and phases of antenna feeds presented in tables. Gain contours shown graphically. Additional tables of performance data given for cities in service area of Eastern satellite.

  19. Secure Broadcasting with Uncertain Channel State Information

    KAUST Repository

    Hyadi, Amal

    2016-01-06

    We investigate the problem of secure broadcasting over fast fading channels with imperfect main channel state information (CSI) at the transmitter. In particular, we analyze the effect of the noisy estimation of the main CSI on the throughput of a broadcast channel where the transmission is intended for multiple legitimate receivers in the presence of an eavesdropper. Besides, we consider the realistic case where the transmitter is only aware of the statistics of the eavesdropper s CSI and not of its channel s realizations. First, we discuss the common message transmission case where the source broadcasts the same information to all the receivers, and we provide an upper and a lower bounds on the ergodic secrecy capacity. For this case, we show that the secrecy rate is limited by the legitimate receiver having, on average, the worst main channel link and we prove that a non-zero secrecy rate can still be achieved even when the CSI at the transmitter is noisy. Then, we look at the independent messages case where the transmitter broadcasts multiple messages to the receivers, and each intended user is interested in an independent message. For this case, we present an expression for the achievable secrecy sum-rate and an upper bound on the secrecy sum-capacity and we show that, in the limit of large number of legitimate receivers K, our achievable secrecy sum-rate follows the scaling law log((1-a ) log(K)), where is the estimation error variance of the main CSI. The special cases of high SNR, perfect and no-main CSI are also analyzed. Analytical derivations and numerical results are presented to illustrate the obtained expressions for the case of independent and identically distributed Rayleigh fading channels.

  20. Secure Broadcasting with Uncertain Channel State Information

    KAUST Repository

    Hyadi, Amal

    2017-03-13

    We investigate the problem of secure broadcasting over fast fading channels with imperfect main channel state information (CSI) at the transmitter. In particular, we analyze the effect of the noisy estimation of the main CSI on the throughput of a broadcast channel where the transmission is intended for multiple legitimate receivers in the presence of an eavesdropper. Besides, we consider the realistic case where the transmitter is only aware of the statistics of the eavesdropper\\'s CSI and not of its channel\\'s realizations. First, we discuss the common message transmission case where the source broadcasts the same information to all the receivers, and we provide an upper and a lower bounds on the ergodic secrecy capacity. For this case, we show that the secrecy rate is limited by the legitimate receiver having, on average, the worst main channel link and we prove that a non-zero secrecy rate can still be achieved even when the CSI at the transmitter is noisy. Then, we look at the independent messages case where the transmitter broadcasts multiple messages to the receivers, and each intended user is interested in an independent message. For this case, we present an expression for the achievable secrecy sum-rate and an upper bound on the secrecy sum-capacity and we show that, in the limit of large number of legitimate receivers K, our achievable secrecy sum-rate follows the scaling law log((1-a ) log(K)), where is the estimation error variance of the main CSI. The special cases of high SNR, perfect and no-main CSI are also analyzed. Analytical derivations and numerical results are presented to illustrate the obtained expressions for the case of independent and identically distributed Rayleigh fading channels.

  1. Sales plan generation problem on TV broadcasting

    OpenAIRE

    Özlem Cosgun; İlkay Gultas

    2016-01-01

    Major advertisers and/or advertisement agencies purchase hundreds of slots during a given broadcast period. Deterministic optimization approaches have been well developed for the problem of meeting client requests. The challenging task for the academic research currently is to address optimization problem under uncertainty. This paper is concerned with the sales plan generation problem when the audience levels of advertisement slots are random variables with known probability distributions. T...

  2. Stochastic dynamics of genetic broadcasting networks

    Science.gov (United States)

    Potoyan, Davit A.; Wolynes, Peter G.

    2017-11-01

    The complex genetic programs of eukaryotic cells are often regulated by key transcription factors occupying or clearing out of a large number of genomic locations. Orchestrating the residence times of these factors is therefore important for the well organized functioning of a large network. The classic models of genetic switches sidestep this timing issue by assuming the binding of transcription factors to be governed entirely by thermodynamic protein-DNA affinities. Here we show that relying on passive thermodynamics and random release times can lead to a "time-scale crisis" for master genes that broadcast their signals to a large number of binding sites. We demonstrate that this time-scale crisis for clearance in a large broadcasting network can be resolved by actively regulating residence times through molecular stripping. We illustrate these ideas by studying a model of the stochastic dynamics of the genetic network of the central eukaryotic master regulator NFκ B which broadcasts its signals to many downstream genes that regulate immune response, apoptosis, etc.

  3. Relation between 'no broadcasting' for noncommuting states and 'no local broadcasting' for quantum correlations

    International Nuclear Information System (INIS)

    Luo Shunlong; Li Nan; Cao Xuelian

    2009-01-01

    The no-broadcasting theorem, first established by Barnum et al. [Phys. Rev. Lett. 76, 2818 (1996)], states that a set of quantum states can be broadcast if and only if it constitutes a commuting family. Quite recently, Piani et al. [Phys. Rev. Lett. 100, 090502 (2008)] showed, by using an ingenious and sophisticated method, that the correlations in a single bipartite state can be locally broadcast if and only if the state is effectively a classical one (i.e., the correlations therein are classical). In this Brief Report, under the condition of nondegenerate spectrum, we provide an alternative and significantly simpler proof of the latter result based on the original no-broadcasting theorem and the monotonicity of the quantum relative entropy. This derivation motivates us to conjecture the equivalence between these two elegant yet formally different no-broadcasting theorems and indicates a subtle and fundamental issue concerning spectral degeneracy which also lies at the heart of the conflict between the von Neumann projection postulate and the Lueders ansatz for quantum measurements. This relation not only offers operational interpretations for commutativity and classicality but also illustrates the basic significance of noncommutativity in characterizing quantumness from the informational perspective.

  4. Direct-to-Consumer Broadcast Advertisements for Pharmaceuticals: Off-Label Promotion and Adherence to FDA Guidelines.

    Science.gov (United States)

    Klara, Kristina; Kim, Jeanie; Ross, Joseph S

    2018-05-01

    Direct-to-consumer (DTC) advertisements for prescription drugs in the United States are regulated by the Food and Drug Administration (FDA). Off-label promotion, or the advertisement of a drug for an indication not approved by the FDA, is prohibited. Our objective was to examine the presence of off-label promotion in broadcast DTC ads and to assess their adherence to FDA guidelines mandating fair balance in presentation of risks and benefits and prohibiting misleading advertisement claims. All English-language broadcast DTC ads for prescription drugs that aired in the United States from January 2015 to July 2016 were obtained from AdPharm, an online collection of healthcare advertisements. Ad length was measured and adherence to FDA guidelines was assessed for several categories: key regulatory items, indicators of false or misleading ads, and indicators of fair balance in presentation of risks and benefits. Our sample included 97 unique DTC ads, representing 60 unique drugs and 67 unique drug-indication combinations. No ads described drug risks quantitatively, whereas drug efficacy was presented quantitatively in 25 (26%) ads. Thirteen (13%) ads, all for diabetes medications, suggested off-label uses for weight loss and blood pressure reduction. The most commonly advertised drugs were indicated for the treatment of inflammatory conditions (n = 12; 18%), diabetes or diabetic neuropathy (n = 11; 16%), bowel or bladder dysfunction (n = 6; 9%), and infections or allergic reaction (n = 6; 9%). More than three-quarters (n = 51; 76%) advertised drugs to treat chronic conditions. Few broadcast DTC ads were fully compliant with FDA guidelines. The overall quality of information provided in ads was low, and suggestions of off-label promotion were common for diabetes medications. The impact of current DTC ads and off-label marketing on patient and prescriber decisions merits further scrutiny.

  5. Performance Evaluation and Parameter Optimization of SoftCast Wireless Video Broadcast

    Directory of Open Access Journals (Sweden)

    Dongxue Yang

    2015-08-01

    Full Text Available Wireless video broadcast plays an imp ortant role in multimedia communication with the emergence of mobile video applications. However, conventional video broadcast designs suffer from a cliff effect due to separated source and channel encoding. The newly prop osed SoftCast scheme employs a cross-layer design, whose reconstructed video quality is prop ortional to the channel condition. In this pap er, we provide the p erformance evaluation and the parameter optimization of the SoftCast system. Optimization principles on parameter selection are suggested to obtain a b etter video quality, o ccupy less bandwidth and/or utilize lower complexity. In addition, we compare SoftCast with H.264 in the LTE EPA scenario. The simulation results show that SoftCast provides a b etter p erformance in the scalability to channel conditions and the robustness to packet losses.

  6. Broadcasting the Status of Plant Growth Chamber using Bluetooth Low Energy

    Directory of Open Access Journals (Sweden)

    Al-Azam Moh Noor

    2018-01-01

    Full Text Available Mobile users are getting smarter in using their phones. Many tasks are usually completed or monitored via a computer screen, nowadays can be taken anywhere with Android phones or tablets. Likewise with features in the phone is increasingly sophisticated. Currently bluetooth version 4 is almost mandatory in all phones. Even for entry level phones are now equipped with bluetooth version 4. This paper discusses the use of Bluetooth Low Energy—which is part of bluetooth version 4, in providing information about the status of plant growth chamber conditions. By using this concept, all phones or tablets that have bluetooth version 4 and there are applications in it will be able to receive the latest chamber status. The results show that this way of broadcasting is very effective. The data required to be monitored by a laboratory technician can be continuously broadcasted so that anyone on duty will get instant information at his grasp.

  7. A Safety Enhancement Broadcasting Scheme Based on Context Sensing in VANETs

    Directory of Open Access Journals (Sweden)

    Chen Chen

    2016-01-01

    Full Text Available The broadcasting plays a vital role for context awareness in VANETs (Vehicular Ad Hoc Networks whose primary goal is to improve the driving safety depending on effective information exchanging. In this paper, based on the LQG (linear quadratic Gaussian optimal control theory, a broadcasting control scheme named LQG-CCA is proposed to improve the network throughput thus increasing the opportunities for the safety-related events to be successfully handled. By predicting the network throughput with the Kalman filter model, our LQG model is envisioned to minimize the difference between the predicted and expected throughput through the adjustment of CCA (Clear Channel Assessment sensing threshold. Numerical results show that our proposed model can significantly improve the network performance in terms of average throughput, average End-to-End delay, and average packets delivery ratio compared with a highly cited work D-FPAV and a latest published model APPR.

  8. Reliable Multihop Broadcast Protocol with a Low-Overhead Link Quality Assessment for ITS Based on VANETs in Highway Scenarios

    Directory of Open Access Journals (Sweden)

    Alejandro Galaviz-Mosqueda

    2014-01-01

    Full Text Available Vehicular ad hoc networks (VANETs have been identified as a key technology to enable intelligent transport systems (ITS, which are aimed to radically improve the safety, comfort, and greenness of the vehicles in the road. However, in order to fully exploit VANETs potential, several issues must be addressed. Because of the high dynamic of VANETs and the impairments in the wireless channel, one key issue arising when working with VANETs is the multihop dissemination of broadcast packets for safety and infotainment applications. In this paper a reliable low-overhead multihop broadcast (RLMB protocol is proposed to address the well-known broadcast storm problem. The proposed RLMB takes advantage of the hello messages exchanged between the vehicles and it processes such information to intelligently select a relay set and reduce the redundant broadcast. Additionally, to reduce the hello messages rate dependency, RLMB uses a point-to-zone link evaluation approach. RLMB performance is compared with one of the leading multihop broadcast protocols existing to date. Performance metrics show that our RLMB solution outperforms the leading protocol in terms of important metrics such as packet dissemination ratio, overhead, and delay.

  9. MUSICAL ARRANGEMENT OF MEDIA ADS

    Directory of Open Access Journals (Sweden)

    Chernyshov Alexander V.

    2015-01-01

    Full Text Available The music-compositional principles of commercial and political advertising and also the self-promotion of electronic media (radio, television, Internet are considered in this mediatext: from the elementary beeps, symbolic functions, emblems/logos and musical brands to the sound engineering technology to underscore the product's name and the complex synthesis between music and intra movements and color-light design of frames. Simultaneously examines, how the musical arrangement of ethereal advertising is involved in creation the emotional drama or bravado which reach the level of explicit or associative counterpoint 'music with the advertised object or subject' and which extend to expression of cultural image of all the broadcast channel. The article explores the works of the next genres like infomercial, teleshopping, film-ad, and autonomous commercials that have been produced in European countries or USA.

  10. Research in Mobile Database Query Optimization and Processing

    Directory of Open Access Journals (Sweden)

    Agustinus Borgy Waluyo

    2005-01-01

    Full Text Available The emergence of mobile computing provides the ability to access information at any time and place. However, as mobile computing environments have inherent factors like power, storage, asymmetric communication cost, and bandwidth limitations, efficient query processing and minimum query response time are definitely of great interest. This survey groups a variety of query optimization and processing mechanisms in mobile databases into two main categories, namely: (i query processing strategy, and (ii caching management strategy. Query processing includes both pull and push operations (broadcast mechanisms. We further classify push operation into on-demand broadcast and periodic broadcast. Push operation (on-demand broadcast relates to designing techniques that enable the server to accommodate multiple requests so that the request can be processed efficiently. Push operation (periodic broadcast corresponds to data dissemination strategies. In this scheme, several techniques to improve the query performance by broadcasting data to a population of mobile users are described. A caching management strategy defines a number of methods for maintaining cached data items in clients' local storage. This strategy considers critical caching issues such as caching granularity, caching coherence strategy and caching replacement policy. Finally, this survey concludes with several open issues relating to mobile query optimization and processing strategy.

  11. Scheduling Broadcasts in a Network of Timelines

    KAUST Repository

    Manzoor, Emaad A.

    2015-05-12

    Broadcasts and timelines are the primary mechanism of information exchange in online social platforms today. Services like Facebook, Twitter and Instagram have enabled ordinary people to reach large audiences spanning cultures and countries, while their massive popularity has created increasingly competitive marketplaces of attention. Timing broadcasts to capture the attention of such geographically diverse audiences has sparked interest from many startups and social marketing gurus. However, formal study is lacking on both the timing and frequency problems. In this thesis, we introduce, motivate and solve the broadcast scheduling problem of specifying the timing and frequency of publishing content to maximise the attention received. We validate and quantify three interacting behavioural phenomena to parametrise social platform users: information overload, bursty circadian rhythms and monotony aversion, which is defined here for the first time. Our analysis of the influence of monotony refutes the common assumption that posts on social network timelines are consumed piecemeal independently. Instead, we reveal that posts are consumed in chunks, which has important consequences for any future work considering human behaviour over social network timelines. Our quantification of monotony aversion is also novel, and has applications to problems in various domains such as recommender list diversification, user satiation and variety-seeking consumer behaviour. Having studied the underlying behavioural phenomena, we link schedules, timelines, attention and behaviour by formalising a timeline information exchange process. Our formulation gives rise to a natural objective function that quantifies the expected collective attention an arrangement of posts on a timeline will receive. We apply this formulation as a case-study on real-data from Twitter, where we estimate behavioural parameters, calculate the attention potential for different scheduling strategies and, using the

  12. Emergency department visits during an Olympic gold medal television broadcast.

    Science.gov (United States)

    Redelmeier, Donald A; Vermeulen, Marian J

    2011-01-01

    Practice pattern variations are often attributed to physician decision-making with no accounting for patient preferences. To test whether a mass media television broadcast unrelated to health was associated with changes in the rate and characteristics of visits for acute emergency care. Time-series analysis of emergency department visits for any reason. Population-based sample of all patients seeking emergency care in Ontario, Canada. The broadcast day was defined as the Olympic men's gold medal ice hockey game final. The control days were defined as the 6 Sundays before and after the broadcast day. A total of 99 447 visits occurred over the 7 Sundays, of which 13 990 occurred on the broadcast day. Comparing the broadcast day with control days, we found no significant difference in the hourly rate of visits before the broadcast (544 vs 537, p = 0.41) or after the broadcast (647 vs 639, p = 0.55). In contrast, we observed a significant reduction in hourly rate of visits during the broadcast (647 vs 783, p television broadcasts can influence patient preferences and thereby lead to a decrease in emergency department visits.

  13. Equilibrium in a random viewer model of television broadcasting

    DEFF Research Database (Denmark)

    Hansen, Bodil Olai; Keiding, Hans

    2014-01-01

    The authors considered a model of commercial television market with advertising with probabilistic viewer choice of channel, where private broadcasters may coexist with a public television broadcaster. The broadcasters influence the probability of getting viewer attention through the amount...... number of channels. The authors derive properties of equilibrium in an oligopolistic market with private broadcasters and show that the number of firms has a negative effect on overall advertising and viewer satisfaction. If there is a public channel that also sells advertisements but does not maximize...... profits, this will have a positive effect on advertiser and viewer satisfaction....

  14. A broadcast engineering tutorial for non-engineers

    CERN Document Server

    Pizzi, Skip

    2014-01-01

    A Broadcast Engineering Tutorial for Non-Engineers is the leading publication on the basics of broadcast technology. Whether you are new to the industry or do not have an engineering background, this book will give you a comprehensive primer of television, radio, and digital media relating to broadcast-it is your guide to understanding the technical world of radio and television broadcast engineering. It covers all the important topics such as DTV, IBOC, HD, standards, video servers, editing, electronic newsrooms, and more.

  15. Digital terrestrial television broadcasting technology and system

    CERN Document Server

    2015-01-01

    Now under massive deployment worldwide, digital terrestrial television broadcasting (DTTB) offers one of the most attractive ways to deliver digital TV over the VHF/UHF band. Written by a team of experts for specialists and non-specialists alike, this book serves as a comprehensive guide to DTTB. It covers the fundamentals of channel coding and modulation technologies used in DTTB, as well as receiver technology for synchronization, channel estimation, and equalization. It also covers the recently introduced Chinese DTTB standard, using the SFN network in Hong Kong as an example.

  16. Broadcasting in America; Second Edition. A Survey of Television and Radio.

    Science.gov (United States)

    Head, Sydney W.

    The plan of this volume follows that of the first (1956) edition: a section on physical bases of broadcasting, one on the origin and growth of broadcasting, another on the economics of broadcasting, a fourth on the social control of broadcasting, and a final section for an assessment of the effects and influences of broadcasting. Special attention…

  17. Bubbling AdS3

    International Nuclear Information System (INIS)

    Martelli, Dario; Morales, Jose Francisco

    2005-01-01

    In the light of the recent Lin, Lunin, Maldacena (LLM) results, we investigate 1/2-BPS geometries in minimal (and next to minimal) supergravity in D = 6 dimensions. In the case of minimal supergravity, solutions are given by fibrations of a two-torus T 2 specified by two harmonic functions. For a rectangular torus the two functions are related by a non-linear equation with rare solutions: AdS 3 x S 3 , the pp-wave and the multi-center string. 'Bubbling', i.e. superpositions of droplets, is accommodated by allowing the complex structure of the T 2 to vary over the base. The analysis is repeated in the presence of a tensor multiplet and similar conclusions are reached, with generic solutions describing D1D5 (or their dual fundamental string-momentum) systems. In this framework, the profile of the dual fundamental string-momentum system is identified with the boundaries of the droplets in a two-dimensional plane. (author)

  18. The Traffic Adaptive Data Dissemination (TrAD Protocol for both Urban and Highway Scenarios

    Directory of Open Access Journals (Sweden)

    Bin Tian

    2016-06-01

    Full Text Available The worldwide economic cost of road crashes and injuries is estimated to be US$518 billion per year and the annual congestion cost in France is estimated to be €5.9 billion. Vehicular Ad hoc Networks (VANETs are one solution to improve transport features such as traffic safety, traffic jam and infotainment on wheels, where a great number of event-driven messages need to be disseminated in a timely way in a region of interest. In comparison with traditional wireless networks, VANETs have to consider the highly dynamic network topology and lossy links due to node mobility. Inter-Vehicle Communication (IVC protocols are the keystone of VANETs. According to our survey, most of the proposed IVC protocols focus on either highway or urban scenarios, but not on both. Furthermore, too few protocols, considering both scenarios, can achieve high performance. In this paper, an infrastructure-less Traffic Adaptive data Dissemination (TrAD protocol which takes into account road traffic and network traffic status for both highway and urban scenarios will be presented. TrAD has double broadcast suppression techniques and is designed to adapt efficiently to the irregular road topology. The performance of the TrAD protocol was evaluated quantitatively by means of realistic simulations taking into account different real road maps, traffic routes and vehicular densities. The obtained simulation results show that TrAD is more efficient in terms of packet delivery ratio, number of transmissions and delay in comparison with the performance of three well-known reference protocols. Moreover, TrAD can also tolerate a reasonable degree of GPS drift and still achieve efficient data dissemination.

  19. The Traffic Adaptive Data Dissemination (TrAD) Protocol for both Urban and Highway Scenarios.

    Science.gov (United States)

    Tian, Bin; Hou, Kun Mean; Zhou, Haiying

    2016-06-21

    The worldwide economic cost of road crashes and injuries is estimated to be US$518 billion per year and the annual congestion cost in France is estimated to be €5.9 billion. Vehicular Ad hoc Networks (VANETs) are one solution to improve transport features such as traffic safety, traffic jam and infotainment on wheels, where a great number of event-driven messages need to be disseminated in a timely way in a region of interest. In comparison with traditional wireless networks, VANETs have to consider the highly dynamic network topology and lossy links due to node mobility. Inter-Vehicle Communication (IVC) protocols are the keystone of VANETs. According to our survey, most of the proposed IVC protocols focus on either highway or urban scenarios, but not on both. Furthermore, too few protocols, considering both scenarios, can achieve high performance. In this paper, an infrastructure-less Traffic Adaptive data Dissemination (TrAD) protocol which takes into account road traffic and network traffic status for both highway and urban scenarios will be presented. TrAD has double broadcast suppression techniques and is designed to adapt efficiently to the irregular road topology. The performance of the TrAD protocol was evaluated quantitatively by means of realistic simulations taking into account different real road maps, traffic routes and vehicular densities. The obtained simulation results show that TrAD is more efficient in terms of packet delivery ratio, number of transmissions and delay in comparison with the performance of three well-known reference protocols. Moreover, TrAD can also tolerate a reasonable degree of GPS drift and still achieve efficient data dissemination.

  20. 78 FR 18527 - Implementation of Competitive Bidding for Commercial Broadcast and Instructional Television Fixed...

    Science.gov (United States)

    2013-03-27

    ... Broadcast and Instructional Television Fixed Service Licenses AGENCY: Federal Communications Commission... Implementation of Competitive Bidding for Commercial Broadcast and Instructional Television Fixed Service... for Commercial Broadcast and Instructional Television Fixed Service Licenses, MM Docket No. 97- 234 et...

  1. Loops of Spoken Language i Danish Broadcasting Corporation News

    DEFF Research Database (Denmark)

    le Fevre Jakobsen, Bjarne

    2012-01-01

    The tempo of Danish television news broadcasts has changed markedly over the past 40 years, while the language has essentially always been conservative, and remains so today. The development in the tempo of the broadcasts has gone through a number of phases from a newsreader in a rigid structure...

  2. The Use of Computer Simulation Gaming in Teaching Broadcast Economics.

    Science.gov (United States)

    Mancuso, Louis C.

    The purpose of this study was to develop a broadcast economic computer simulation and to ascertain how a lecture-computer simulation game compared as a teaching method with a more traditional lecture and case study instructional methods. In each of three sections of a broadcast economics course, a different teaching methodology was employed: (1)…

  3. 75 FR 76294 - Radio Broadcasting Services; Fairbanks, AK

    Science.gov (United States)

    2010-12-08

    ... FEDERAL COMMUNICATIONS COMMISSION 47 CFR Part 73 [DA 10-2211; MB Docket No. 10-81; RM-11600] Radio Broadcasting Services; Fairbanks, AK AGENCY: Federal Communications Commission. ACTION: Final rule. SUMMARY... Subjects in 47 CFR Part 73 Radio, Radio broadcasting. 0 For the reasons discussed in the preamble, the...

  4. Public and Private Activity in Commercial TV Broadcasting

    DEFF Research Database (Denmark)

    Olai Hansen, Bodil; Keiding, Hans

    2006-01-01

    We consider a model of commercial television market, where private broadcasters coexist with a public television broadcaster. Assuming that the public TV station follows a policy of Ramsey pricing whereas the private stations are profit maximizers, we consider the equilibria in this market...

  5. Religious Broadcasting in the Middle East : Content Analysis of ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    Over the past decade, television broadcasting has become central in shaping public attitudes in the Middle East. Against a backdrop of authoritarian governments, political instability, war and pervasive foreign military intervention, broadcasting has emerged as a platform for expressing views and opinions that might ...

  6. Airborne evaluation/verification of antenna patterns of broadcasting stations

    NARCIS (Netherlands)

    Witvliet, Ben

    2006-01-01

    This paper describes a method for airborne evaluation and verification of the antenna patterns of broadcasting stations. Although it is intended for governmental institutions and broadcasters it may be also of interest to anyone who wants to evaluate large radiating structures. An airborne

  7. Canal + Spain & Live Football Broadcasts: A Whole Different Game

    NARCIS (Netherlands)

    Rodríguez Ortega, Vicente; Romero Santos, Rubén

    2017-01-01

    textabstractIn 1988 the Law for Private Television Broadcasting was approved by Spanish parliament. Three licenses were initially awarded. Soon thereafter, in 1990, three channels started broadcasting: Antena 3, Berlusconi-related Tele 5 and, against all odds, a pay channel, Canal + Spain. This

  8. 78 FR 78318 - Television Broadcasting Services; Oklahoma City, Oklahoma

    Science.gov (United States)

    2013-12-26

    ...: Proposed rule. SUMMARY: The Commission has before it a petition for rulemaking filed by Family Broadcasting Group, Inc. (``Family Broadcasting''), the licensee of station KSBI(TV), channel 51, Oklahoma City... instituted a freeze on the acceptance of full power television rulemaking petitions requesting channel...

  9. 76 FR 9991 - Television Broadcasting Services; Kalispell, MT

    Science.gov (United States)

    2011-02-23

    ... FEDERAL COMMUNICATIONS COMMISSION 47 CFR Part 73 [DA 11-224; MB Docket No. 11-20; RM-11619] Television Broadcasting Services; Kalispell, MT AGENCY: Federal Communications Commission. ACTION: Proposed... 73 Television, Television broadcasting. For the reasons discussed in the preamble, the Federal...

  10. 75 FR 67077 - Television Broadcasting Services; Huntsville, AL

    Science.gov (United States)

    2010-11-01

    ... FEDERAL COMMUNICATIONS COMMISSION 47 CFR Part 73 [DA 10-2000; MB Docket No. 08-194; RM-11488] Television Broadcasting Services; Huntsville, AL AGENCY: Federal Communications Commission. ACTION: Proposed... 73 Television, Television broadcasting. For the reasons discussed in the preamble, the Federal...

  11. 75 FR 1546 - Television Broadcasting Services; Bangor, ME

    Science.gov (United States)

    2010-01-12

    ...] Television Broadcasting Services; Bangor, ME AGENCY: Federal Communications Commission. ACTION: Final rule... the Congressional review Act, see 5 U.S.C. 801(a)(1)(A). List of Subjects in 47 CFR Part 73 Television, Television broadcasting. 0 For the reasons discussed in the preamble, the Federal Communications Commission...

  12. 76 FR 5119 - Television Broadcasting Services; Jackson, MS

    Science.gov (United States)

    2011-01-28

    ... FEDERAL COMMUNICATIONS COMMISSION 47 CFR Part 73 [DA 11-96; MB Docket No. 11-8; RM-11618] Television Broadcasting Services; Jackson, MS AGENCY: Federal Communications Commission. ACTION: Proposed... CFR 1.415 and 1.420. List of Subjects in 47 CFR Part 73 Television, Television broadcasting. For the...

  13. 75 FR 25119 - Television Broadcasting Services; Seaford, DE

    Science.gov (United States)

    2010-05-07

    ...] Television Broadcasting Services; Seaford, DE AGENCY: Federal Communications Commission. ACTION: Final rule... very high frequency commercial television channel to each State, if technically feasible. DATES: This... Part 73 Television, Television broadcasting. 0 For the reasons discussed in the preamble, the Federal...

  14. 76 FR 54188 - Television Broadcasting Services; Montgomery, AL

    Science.gov (United States)

    2011-08-31

    ... FEDERAL COMMUNICATIONS COMMISSION 47 CFR Part 73 [MB Docket No. 11-137, RM-11637; DA 11-1414] Television Broadcasting Services; Montgomery, AL AGENCY: Federal Communications Commission. ACTION: Proposed... 47 CFR Part 73 Television, Television broadcasting. Federal Communications Commission. Barbara A...

  15. 75 FR 9859 - Television Broadcasting Services; Beaumont, TX

    Science.gov (United States)

    2010-03-04

    ... FEDERAL COMMUNICATIONS COMMISSION 47 CFR Part 73 [DA 10-307; MB Docket No. 10-49; RM-11593] Television Broadcasting Services; Beaumont, TX AGENCY: Federal Communications Commission. ACTION: Proposed... 73 Television, Television broadcasting. For the reasons discussed in the preamble, the Federal...

  16. 76 FR 76337 - Television Broadcasting Services; Lincoln, NE

    Science.gov (United States)

    2011-12-07

    ... FEDERAL COMMUNICATIONS COMMISSION 47 CFR Part 73 [MB Docket No. 11-192, RM-11646; DA 11-1924] Television Broadcasting Services; Lincoln, NE AGENCY: Federal Communications Commission. ACTION: Proposed... 73 Television, Television broadcasting. Federal Communications Commission Barbara A. Kreisman, Chief...

  17. 76 FR 13966 - Television Broadcasting Services; Topeka, KS

    Science.gov (United States)

    2011-03-15

    ... FEDERAL COMMUNICATIONS COMMISSION 47 CFR Part 73 [MB Docket No. 11-33, RM-11623; DA 11-406] Television Broadcasting Services; Topeka, KS AGENCY: Federal Communications Commission. ACTION: Proposed rule... 73 Television, Television broadcasting. Federal Communications Commission. Barbara A. Kreisman, Chief...

  18. 75 FR 5015 - Television Broadcasting Services; Oklahoma City, OK

    Science.gov (United States)

    2010-02-01

    ...] Television Broadcasting Services; Oklahoma City, OK AGENCY: Federal Communications Commission. ACTION... procedures for comments, see 47 CFR 1.415 and 1.420. List of Subjects in 47 CFR Part 73 Television, Television broadcasting. For the reasons discussed in the preamble, the Federal Communications Commission...

  19. 76 FR 5120 - Television Broadcasting Services; El Paso, TX

    Science.gov (United States)

    2011-01-28

    ... FEDERAL COMMUNICATIONS COMMISSION 47 CFR Part 73 [DA 11-74; MB Docket No. 11-4; RM-11616] Television Broadcasting Services; El Paso, TX AGENCY: Federal Communications Commission. ACTION: Proposed... 73 Television, Television broadcasting. For the reasons discussed in the preamble, the Federal...

  20. 76 FR 3875 - Television Broadcasting Services; Decatur, IL

    Science.gov (United States)

    2011-01-21

    ... FEDERAL COMMUNICATIONS COMMISSION 47 CFR Part 73 [DA 10-2426; MB Docket No. 10-264; RM-11615] Television Broadcasting Services; Decatur, IL AGENCY: Federal Communications Commission. ACTION: Proposed... 73 Television, Television broadcasting. For the reasons discussed in the preamble, the Federal...

  1. 76 FR 5290 - Television Broadcasting Services; Huntsville, AL

    Science.gov (United States)

    2011-01-31

    ...] Television Broadcasting Services; Huntsville, AL AGENCY: Federal Communications Commission. ACTION: Final... the Congressional review Act, see 5 U.S.C. 801(a)(1)(A). List of Subjects in 47 CFR Part 73 Television, Television broadcasting. For the reasons discussed in the preamble, the Federal Communications Commission...

  2. Realtime multiprocessor for mobile ad hoc networks

    Directory of Open Access Journals (Sweden)

    T. Jungeblut

    2008-05-01

    Full Text Available This paper introduces a real-time Multiprocessor System-On-Chip (MPSoC for low power wireless applications. The multiprocessor is based on eight 32bit RISC processors that are connected via an Network-On-Chip (NoC. The NoC follows a novel approach with guaranteed bandwidth to the application that meets hard realtime requirements. At a clock frequency of 100 MHz the total power consumption of the MPSoC that has been fabricated in 180 nm UMC standard cell technology is 772 mW.

  3. Research on the Safe Broadcasting of Television Program

    Directory of Open Access Journals (Sweden)

    Song Jin Bao

    2016-01-01

    Full Text Available The existing way of broadcasting and television monitoring has a lot of problems in China. On the basis of the signal technical indicators monitoring in the present broadcasting and television monitoring system, this paper further extends the function of the monitoring network in order to broaden the services of monitoring business and improve the effect and efficiency of monitoring work. The problem of identifying video content and channel in television and related electronic media is conquered at a low cost implementation way and the flexible technology mechanism. The coverage for video content and identification of the channel is expanded. The informative broadcast entries are generated after a series of video processing. The value of the numerous broadcast data is deeply excavated by using big data processing in order to realize a comprehensive, objective and accurate information monitoring for the safe broadcasting of television program.

  4. Method and apparatus for scheduling broadcasts in social networks

    KAUST Repository

    Manzoor, Emaad Ahmed

    2016-08-25

    A method, apparatus, and computer readable medium are provided for maximizing consumption of broadcasts by a producer. An example method includes receiving selection of a total number of time slots to use for scheduling broadcasts, and receiving information regarding the producer\\'s followers. The example method further 5 includes identifying, by a processor and based on the received information, discount factors associated with the producer\\'s followers, and calculating, by the processor and based on the received information, a predicted number of competitor broadcasts during each time slot of the total number of time slots. Finally, the example method includes determining, by the processor and based on the discount factors and the predicted 10 number of competitor broadcasts during each time slot, a number of broadcasts for the producer to transmit in each time slot of the total number of time slots.

  5. Reliable Wireless Broadcast with Linear Network Coding for Multipoint-to-Multipoint Real-Time Communications

    Science.gov (United States)

    Kondo, Yoshihisa; Yomo, Hiroyuki; Yamaguchi, Shinji; Davis, Peter; Miura, Ryu; Obana, Sadao; Sampei, Seiichi

    This paper proposes multipoint-to-multipoint (MPtoMP) real-time broadcast transmission using network coding for ad-hoc networks like video game networks. We aim to achieve highly reliable MPtoMP broadcasting using IEEE 802.11 media access control (MAC) that does not include a retransmission mechanism. When each node detects packets from the other nodes in a sequence, the correctly detected packets are network-encoded, and the encoded packet is broadcasted in the next sequence as a piggy-back for its native packet. To prevent increase of overhead in each packet due to piggy-back packet transmission, network coding vector for each node is exchanged between all nodes in the negotiation phase. Each user keeps using the same coding vector generated in the negotiation phase, and only coding information that represents which user signal is included in the network coding process is transmitted along with the piggy-back packet. Our simulation results show that the proposed method can provide higher reliability than other schemes using multi point relay (MPR) or redundant transmissions such as forward error correction (FEC). We also implement the proposed method in a wireless testbed, and show that the proposed method achieves high reliability in a real-world environment with a practical degree of complexity when installed on current wireless devices.

  6. Intelligent routing protocol for ad hoc wireless network

    Science.gov (United States)

    Peng, Chaorong; Chen, Chang Wen

    2006-05-01

    A novel routing scheme for mobile ad hoc networks (MANETs), which combines hybrid and multi-inter-routing path properties with a distributed topology discovery route mechanism using control agents is proposed in this paper. In recent years, a variety of hybrid routing protocols for Mobile Ad hoc wireless networks (MANETs) have been developed. Which is proactively maintains routing information for a local neighborhood, while reactively acquiring routes to destinations beyond the global. The hybrid protocol reduces routing discovery latency and the end-to-end delay by providing high connectivity without requiring much of the scarce network capacity. On the other side the hybrid routing protocols in MANETs likes Zone Routing Protocol still need route "re-discover" time when a route between zones link break. Sine the topology update information needs to be broadcast routing request on local zone. Due to this delay, the routing protocol may not be applicable for real-time data and multimedia communication. We utilize the advantages of a clustering organization and multi-routing path in routing protocol to achieve several goals at the same time. Firstly, IRP efficiently saves network bandwidth and reduces route reconstruction time when a routing path fails. The IRP protocol does not require global periodic routing advertisements, local control agents will automatically monitor and repair broke links. Secondly, it efficiently reduces congestion and traffic "bottlenecks" for ClusterHeads in clustering network. Thirdly, it reduces significant overheads associated with maintaining clusters. Fourthly, it improves clusters stability due to dynamic topology changing frequently. In this paper, we present the Intelligent Routing Protocol. First, we discuss the problem of routing in ad hoc networks and the motivation of IRP. We describe the hierarchical architecture of IRP. We describe the routing process and illustrate it with an example. Further, we describe the control manage

  7. Broadcast Communication by System Frequency Modulation

    DEFF Research Database (Denmark)

    Douglass, Philip James; You, Shi; Heussen, Kai

    2012-01-01

    Load controllers available today can measure AC system frequency and react to frequency deviations. A system operator can communicate to frequency sensitive loads by changing the set-points of the system’s dispatchable frequency regulation resources. Explicitly signaling system state by generating...... off-nominal system frequency values is a novel narrowband broadcast communications channel between system operators and frequency sensitive distributed energy resources (FS-DER). The feasibility of the proposed system is evaluated on an existing island power system in Denmark. This study shows...... that within standard frequency quality constraints, 4 distinct symbols are feasible on the island. However, the overarching imperative of system stability prevents the symbols from having arbitrary meanings. Higher frequency values must translate into greater consumption from loads, and vice versa. Within...

  8. Sales plan generation problem on TV broadcasting

    Directory of Open Access Journals (Sweden)

    Özlem Cosgun

    2016-07-01

    Full Text Available Major advertisers and/or advertisement agencies purchase hundreds of slots during a given broadcast period. Deterministic optimization approaches have been well developed for the problem of meeting client requests. The challenging task for the academic research currently is to address optimization problem under uncertainty. This paper is concerned with the sales plan generation problem when the audience levels of advertisement slots are random variables with known probability distributions. There are several constraints the TV networks must meet including client budget, product category and demographic information, plan weighting by week, program mix requirements, and the lengths of advertisement slots desired by the client. We formulate the problem as a chance constrained goal program and we demonstrate that it provides a robust solution with a user specified level of reliability.

  9. User innovation in public service broadcasts

    DEFF Research Database (Denmark)

    Khajeheian, Datis; Tadayoni, Reza

    2016-01-01

    and develop user innovations into professional content. This study follows a qualitative approach with a document study of Denmark's public service broadcast and two interviews. Findings indicate that the commitment to quality and professional content prevents managers of PSBs from outsourcing......This research aims to understand how public service media can encourage media entrepreneurship in the society to enrich user innovations as a source of ideas, products, contents, talent and creativity. The assumption is that media entrepreneurs turn users into sources of external creativity...... their production to media entrepreneurs, but they trust large media companies as external producers. This research contributes to the field by proposing that public service media can foster media entrepreneurship in a society indirectly and by creating demand for external sources of creativity. Large media...

  10. The impact of emotional tone, message, and broadcast parameters in youth anti-smoking advertisements.

    Science.gov (United States)

    Biener, Lois; Ji, Ming; Gilpin, Elizabeth A; Albers, Alison B

    2004-01-01

    In the context of controversy regarding the optimal characteristics of anti-smoking advertisements for youth, this study examines the impact on recall and perceived effectiveness of variations in the message, emotional tone, reach and frequency of broadcast, remoteness of broadcast, and characteristics of the adolescent audience such as changes in smoking behavior, ownership of cigarette promotional items, and demographic variables. A two-wave longitudinal survey of a population-based sample of 618 Massachusetts youth 12 to 15 years old was carried out in 1993 and 1997. A Generalized Estimating Equation (GEE) approach was used to model the recall and perceived effectiveness of eight advertisements as a function of viewer and ad characteristics. Advertisements featuring messages about serious health consequences which had been independently rated as high in negative emotion were more likely to be recalled and were perceived as more effective by youth survey respondents than ads featuring messages about normative behavior for teens or ads relying on humor. Advertising intensity, while contributing to recall, was negatively related to perceived effectiveness. This study supports mounting evidence that negative emotion in anti-smoking advertisements is effective with youth audiences.

  11. A content analysis of health-related advertisements in Islamic Republic of Iran broadcasting (IRIB)

    Science.gov (United States)

    Etemad, Koorosh; Ebrahimi, Parvin; Azimi, Hassan; Lotfi, Mansoureh; Nojomi, Marzieh

    2016-01-01

    Background: Media advertisements especially radio and TV are one of the most important and effective ways for health promotion and consumption of healthy productions worldwide. Ministry of Health and some other ministries in Iran agreed to control and restrict the advertising of unhealthy products and services. Therefore, adequate supervision and monitoring should be done in this field. A content analysis of Health-related Advertisements was done in Islamic Republic of Iran Broadcasting (IRIB) Methods: This study was a cross-sectional research and collecting of data was carried out in 2012. Ten selected TV and radio channels were recorded from 6 a.m. to 12 p.m. for two successive months in the special weekdays. Broadcasted advertisements data were extracted by the trained observers according to a checklist and analyzed using SPSS 18 software and described with descriptive statistics. Results: The percentage of different types of advertising were including 73.9% unrelated to health, 21.9% harmless health related, 2.9% less healthy, 1.3% harmful or harmful with a probability of abuse. Non-harmful to health advertisements included 95.86% of total advertisements out of ten TV and radio channels; and the remained advertisements (4.14%) were related to the harmful, less healthy foodstuff and detrimental services and products. Also, 0.8% of the advertisements were shown during children programs. Conclusion: The main findings of the current study revealed that majority of the advertisements of Islamic Republic Broadcasting were unrelated to health. It seems advertising of harmful for health in IRIB was less than 5%, and the levels of these type ads were less than the other countries. Even so, the policymakers need to pass and enforce some executive and governing law for the prevention of broadcasting unhealthy advertisements to increase the society health level and prevent the diseases resulted from unhealthy products causing the considerable damages in a long time. PMID

  12. National association of broadcasters engineering handbook NAB engineering handbook

    CERN Document Server

    Jones, Graham A; Osenkowsky, Thomas G; Williams, Edmund A

    2013-01-01

    The NAB Engineering Handbook provides detailed information on virtually every aspect of the broadcast chain, from news gathering, program production and postproduction through master control and distribution links to transmission, antennas, RF propagation, cable and satellite. Hot topics covered include HD Radio, HDTV, 2 GHz broadcast auxiliary services, EAS, workflow, metadata, digital asset management, advanced video and audio compression, audio and video over IP, and Internet broadcasting. A wide range of related topics that engineers and managers need to understand are also covered, includ

  13. Direct broadcast of a sporting event as televisual cultural form

    Directory of Open Access Journals (Sweden)

    Jože Vogrinc

    2012-07-01

    Full Text Available Direct TV broadcasting of sport events is undoubtedly the focal point of interest of sport fans in sports media as well as of sponsors and investors responsible for the global mediatisation of popular sports. In this article, the centrality of direct TV broadcasts in the televisual coverage of sports, as well as in the presence of sports in new media in general is explained in the context of the impact of the mediatisation of sports upon cultural forms of TV coverage of sports. The complexity of these forms and its main features (the role of the commentator, the rules of editing, dramatisation and narrativisation in direct broadcasts are analysed.

  14. String Theory on AdS Spaces

    NARCIS (Netherlands)

    de Boer, J.

    2000-01-01

    In these notes we discuss various aspects of string theory in AdS spaces. We briefly review the formulation in terms of Green-Schwarz, NSR, and Berkovits variables, as well as the construction of exact conformal field theories with AdS backgrounds. Based on lectures given at the Kyoto YITP Workshop

  15. 75 FR 8070 - Closed Auction of Broadcast Construction Permits Scheduled for July 20, 2010; Auction 88...

    Science.gov (United States)

    2010-02-23

    ... to support their claims with valuation analyses and suggested amounts or formulas for reserve prices... seek comment on factors that could reasonably have an impact on valuation of the broadcast spectrum..., Inc. Arkansas Valley Broadcasting, LLC BBK Broadcasting Big Sky Company Birach Broadcasting...

  16. 75 FR 27199 - Promoting Diversification of Ownership in the Broadcasting Services

    Science.gov (United States)

    2010-05-14

    ...'' in explaining the requirements for broadcasters to certify that their advertising contracts do not... for the Commission to require broadcasters renewing their licenses to certify that their advertising... broadcast licensee, cable television system, daily newspaper, or other media outlet subject to the broadcast...

  17. 47 CFR 74.1204 - Protection of FM broadcast, FM Translator and LP100 stations.

    Science.gov (United States)

    2010-10-01

    ... 47 Telecommunication 4 2010-10-01 2010-10-01 false Protection of FM broadcast, FM Translator and... SERVICES FM Broadcast Translator Stations and FM Broadcast Booster Stations § 74.1204 Protection of FM broadcast, FM Translator and LP100 stations. (a) An application for an FM translator station will not be...

  18. 47 CFR 73.6026 - Broadcast regulations applicable to Class A television stations.

    Science.gov (United States)

    2010-10-01

    ... television stations. 73.6026 Section 73.6026 Telecommunication FEDERAL COMMUNICATIONS COMMISSION (CONTINUED) BROADCAST RADIO SERVICES RADIO BROADCAST SERVICES Class A Television Broadcast Stations § 73.6026 Broadcast regulations applicable to Class A television stations. The following rules are applicable to Class A...

  19. 47 CFR 73.9001 - Redistribution control of digital television broadcasts.

    Science.gov (United States)

    2010-10-01

    ... 47 Telecommunication 4 2010-10-01 2010-10-01 false Redistribution control of digital television... RADIO SERVICES RADIO BROADCAST SERVICES Digital Broadcast Television Redistribution Control § 73.9001 Redistribution control of digital television broadcasts. Licensees of TV broadcast stations may utilize the...

  20. Evaluation of ADS-B Surveillance Data to Identify Flight Operations with Reduced Safety Margin in the National Airspace System, Phase I

    Data.gov (United States)

    National Aeronautics and Space Administration — As part of the FAA's plans for modernization of the Air Traffic Control (ATC) system, Automatic Dependent Surveillance - Broadcast (ADS-B) will be the basis of the...

  1. 78 FR 12010 - Radio Broadcasting Services; Pearsall, Texas

    Science.gov (United States)

    2013-02-21

    ... Broadcasting Services; Pearsall, Texas AGENCY: Federal Communications Commission. ACTION: Proposed rule... (``Petitioner''), licensee of FM Station KSAG, Channel 277A, Pearsall, Texas. Petitioner proposes to amend the... be allotted at Pearsall, Texas, in compliance with the Commission's minimum distance separation...

  2. An interference cancellation strategy for broadcast in hierarchical cell structure

    KAUST Repository

    Yang, Yuli

    2014-12-01

    In this paper, a hierarchical cell structure is considered, where public safety broadcasting is fulfilled in a femtocell located within a macrocell. In the femtocell, also known as local cell, an access point broadcasts to each local node (LN) over an orthogonal frequency sub-band independently. Since the local cell shares the spectrum licensed to the macrocell, a given LN is interfered by transmissions of the macrocell user (MU) in the same sub-band. To improve the broadcast performance in the local cell, a novel scheme is proposed to mitigate the interference from the MU to the LN while achieving diversity gain. For the sake of performance evaluation, ergodic capacity of the proposed scheme is quantified and a corresponding closed-form expression is obtained. By comparing with the traditional scheme that suffers from the MU\\'s interference, numerical results substantiate the advantage of the proposed scheme and provide a useful tool for the broadcast design in hierarchical cell systems.

  3. An interference cancellation strategy for broadcast in hierarchical cell structure

    KAUST Repository

    Yang, Yuli; Aï ssa, Sonia; Eltawil, Ahmed M.; Salama, Khaled N.

    2014-01-01

    In this paper, a hierarchical cell structure is considered, where public safety broadcasting is fulfilled in a femtocell located within a macrocell. In the femtocell, also known as local cell, an access point broadcasts to each local node (LN) over an orthogonal frequency sub-band independently. Since the local cell shares the spectrum licensed to the macrocell, a given LN is interfered by transmissions of the macrocell user (MU) in the same sub-band. To improve the broadcast performance in the local cell, a novel scheme is proposed to mitigate the interference from the MU to the LN while achieving diversity gain. For the sake of performance evaluation, ergodic capacity of the proposed scheme is quantified and a corresponding closed-form expression is obtained. By comparing with the traditional scheme that suffers from the MU's interference, numerical results substantiate the advantage of the proposed scheme and provide a useful tool for the broadcast design in hierarchical cell systems.

  4. 47 CFR 76.1506 - Carriage of television broadcast signals.

    Science.gov (United States)

    2010-10-01

    ... with the Commission its Notice of Intent to establish an open video system. (m) Sports broadcast... notices unless they receive notice within a reasonable time from the appropriate programming provider that... Office of Management and Budget. ...

  5. Poland's Press and Broadcasting Under the Gierek Regime

    Science.gov (United States)

    Shanor, Donald R.

    1974-01-01

    Reports that the Polish press and broadcasting have been carrying more news and less propaganda since the 1970 Baltic upheavel and that the Polish media are generally allowed more freedom than media in other Communist nations. (RB)

  6. Compressive sensing for feedback reduction in MIMO broadcast channels

    KAUST Repository

    Eltayeb, Mohammed E.; Al-Naffouri, Tareq Y.; Bahrami, Hamid Reza Talesh

    2014-01-01

    In multi-antenna broadcast networks, the base stations (BSs) rely on the channel state information (CSI) of the users to perform user scheduling and downlink transmission. However, in networks with large number of users, obtaining CSI from all users

  7. TV Broadcast Efficiency in 5G Networks from Subscriber Prospective

    KAUST Repository

    Lau, Chun Pong; Shihada, Basem

    2015-01-01

    measuring the efficiency of a system. These metrics assess the net bitrate for a unit of spectrum bandwidth. However, there is a lack of measurement, quantifying the effectiveness of a broadcasting strategy from the user perspective. In this paper, we

  8. 77 FR 46631 - Television Broadcasting Services; Greenville, NC

    Science.gov (United States)

    2012-08-06

    ...] Television Broadcasting Services; Greenville, NC AGENCY: Federal Communications Commission. ACTION: Final... acceptance of full power television rulemaking petitions requesting channel substitutions in May 2011, it... Subjects in 47 CFR Part 73 Television. Federal Communications Commission. Barbara A. Kreisman, Chief, Video...

  9. 77 FR 6481 - Television Broadcasting Services; Lincoln, NE

    Science.gov (United States)

    2012-02-08

    ...] Television Broadcasting Services; Lincoln, NE AGENCY: Federal Communications Commission. ACTION: Final rule... power television rulemaking petitions requesting channel substitutions in May 2011, it subsequently... CFR Part 73 Television. Federal Communications Commission. Barbara A. Kreisman, Chief, Video Division...

  10. 78 FR 75306 - Television Broadcasting Services; Birmingham, Alabama

    Science.gov (United States)

    2013-12-11

    ...] Television Broadcasting Services; Birmingham, Alabama AGENCY: Federal Communications Commission. ACTION... Television Commission (``AETC''), the licensee of station WBIQ(TV), channel *39, Birmingham, Alabama... freeze on the filing of petitions for rulemaking by television stations seeking channel substitutions in...

  11. How we use online broadcasting - Web TV - for community engagement

    Science.gov (United States)

    Allison, M. L.; Conway, F. M.; Matti, J.; Palmer, R.

    2013-12-01

    The Arizona Geological Survey uses online broadcasting (Webcast or 'Web TV') to help fulfill our statutory mission to 'Inform, advise and assist the public in matters concerning the geological processes, materials and landscapes and the development and use of the mineral resources of this state.' We launched a monthly online broadcast called 'Arizona Mining Review' via Livestream, a low-cost or free video streaming service. The show provides news, interviews, and discussions about mining and mineral resources topics of interest in Arizona, the nation's second largest non-fuel mining state. The costs to set up and broadcast are minor. Interviews with local guests are held in a corner of the AZGS conference room with easy chairs and a couch; long-distance interviews are held via Skype. The broadcast originates from a desktop computer with a webcam, a $60 microphone, three sets of earbud headphones and a powered amplifier. During broadcasts, we supplement interview footage with slides, photos, or video clips that we have or are provided by guests. Initial broadcasts were live; recordings of these were later uploaded to our YouTube channel. Because scheduling and executing a live Internet broadcast is stressful and demanding for both the production team and guests, we recently elected to record and produce episodes prior to broadcasting them. This allows us more control over supplementary materials used during the broadcast; it also permits us to record the broadcast using a high-definition digital video camera that cannot be used for streaming video. In addition to the Arizona Mining Review, we record conferences and workshops and special presentations on topical issues. A video on the recently discovered Little Chino fault has drawn over 3,000 views. Our latest presentations are short 1-2 minute 'video abstracts' delivered by authors of new publications released by the Survey. These include maps and graphics from the reports to help illustrate the topics and their

  12. Warped AdS3 black holes

    International Nuclear Information System (INIS)

    Anninos, Dionysios; Li Wei; Padi, Megha; Song Wei; Strominger, Andrew

    2009-01-01

    Three dimensional topologically massive gravity (TMG) with a negative cosmological constant -l -2 and positive Newton constant G admits an AdS 3 vacuum solution for any value of the graviton mass μ. These are all known to be perturbatively unstable except at the recently explored chiral point μl = 1. However we show herein that for every value of μl ≠ 3 there are two other (potentially stable) vacuum solutions given by SL(2,R) x U(1)-invariant warped AdS 3 geometries, with a timelike or spacelike U(1) isometry. Critical behavior occurs at μl = 3, where the warping transitions from a stretching to a squashing, and there are a pair of warped solutions with a null U(1) isometry. For μl > 3, there are known warped black hole solutions which are asymptotic to warped AdS 3 . We show that these black holes are discrete quotients of warped AdS 3 just as BTZ black holes are discrete quotients of ordinary AdS 3 . Moreover new solutions of this type, relevant to any theory with warped AdS 3 solutions, are exhibited. Finally we note that the black hole thermodynamics is consistent with the hypothesis that, for μl > 3, the warped AdS 3 ground state of TMG is holographically dual to a 2D boundary CFT with central charges c R -formula and c L -formula.

  13. Transmission techniques for emergent multicast and broadcast systems

    CERN Document Server

    da Silva, Mario Marques; Dinis, Rui; Souto, Nuno; Silva, Joao Carlos

    2010-01-01

    Describing efficient transmission schemes for broadband wireless systems, Transmission Techniques for Emergent Multicast and Broadcast Systems examines advances in transmission techniques and receiver designs capable of supporting the emergent wireless needs for multimedia broadcast and multicast service (MBMS) requirements. It summarizes the research and development taking place in wireless communications for multimedia MBMS and addresses the means to improved spectral efficiency to allow for increased user bit rate, as well as increased capacity of the digital cellular radio network.The text

  14. A dynamic analysis of consolidation in the broadcast television industry

    OpenAIRE

    Jessica C. Stahl

    2009-01-01

    This paper estimates a dynamic oligopoly model in order to separately identify the demand-side and cost-side advantages of consolidation in the broadcast television industry. I exploit an exogenous change in regulation that led to significant industry consolidation. Using revenue and ownership data for broadcast stations over the past ten years, I estimate the effect of ownership changes on revenue. I recover costs by examining patterns in ownership changes that are left unexplained by revenu...

  15. Productivity and its Decomposition in the Japanese Broadcasting Market

    OpenAIRE

    Asai, Sumiko

    2005-01-01

    The purpose of this paper is to calculate the total factor productivity (TFP) as well as scale economies of Japanese terrestrial broadcasters and examine the industry’s characteristics through the decomposition of TFP growth. In order to calculate TFP growth rate, a variable cost function is estimated using data on twenty-five broadcasters for the period 1997–2002, and the TFP growth rate is decomposed into three sources: output effect, capital adjustment and technical change. Calculation rev...

  16. Connecting Mobile Game Advertising with Local Stores

    OpenAIRE

    Wen, Yanzhao

    2016-01-01

    With the growth of mobile market, mobile advertising and mobile game advertising are becoming more and more important. On one hand, mobile advertising is able to deliver relevant ads to targeted users based on their locations and behaviors. On the other hand, as the number of mobile game players and free-to-play mobile games are increasing, mobile game advertising forms one important way of monetization. It is important to increase the advertising effectiveness while producing friendly user e...

  17. SURVEI PENANGANAN BROADCAST STORM PROBLEM PADA PROTOKOL ROUTING AODV DI MANET

    Directory of Open Access Journals (Sweden)

    Indera Zainul Muttaqien

    2015-07-01

    Full Text Available Komunikasi multi-hop pada lingkungan MANET dapat melibatkan broadcast paket dalam proses route discovery. Protokol routing pada MANET akan melakukan broadcast paket RREQ dan menjalarkannya ke node tujuan secepat dan seefisien mungkin, dimana paket RREQ dari rute yang optimal adalah paket RREQ yang terlebih dahulu sampai ke tujuan. Aktifitas broadcast yang tidak terkontrol dapat menyebabkan suatu kondisi yang disebut broadcast storm problem. Broadcast storm problem dapat berdampak pada terganggunya kinerja dari protokol routing akibat adanya packet redundancy, contention, dan collision. Broadcast storm problem dapat ditangani dengan membatasi jumlah node yang dapat melakukan broadcast. Tujuan utama dari pembuatan makalah ini adalah merangkum beberapa mekanisme terbaru yang telah diakukan oleh para peneliti untuk menangani broadcast storm problem. Kami juga menyajikan perbandingan dari mekanisme tersebut berdasarkan karakteristik dari mekanisme ditinjau dari kesesuaian dengan beberapa skema penanganan broadcast storm problem yang diajukan oleh peneliti sebelumnya, kebutuhan informasi tertentu antar node, lingkungan uji coba dan apakah mekanisme ini dapat diterapkan pada protokol routing lainnya.

  18. AdS solutions through transgression

    International Nuclear Information System (INIS)

    Donos, Aristomenis; Gauntlett, Jerome P.; Kim, Nakwoo

    2008-01-01

    We present new classes of explicit supersymmetric AdS 3 solutions of type IIB supergravity with non-vanishing five-form flux and AdS 2 solutions of D = 11 supergravity with electric four-form flux. The former are dual to two-dimensional SCFTs with (0,2) supersymmetry and the latter to supersymmetric quantum mechanics with two supercharges. We also investigate more general classes of AdS 3 solutions of type IIB supergravity and AdS 2 solutions of D = 11 supergravity which in addition have non-vanishing three-form flux and magnetic four-form flux, respectively. The construction of these more general solutions makes essential use of the Chern-Simons or 'transgression' terms in the Bianchi identity or the equation of motion of the field strengths in the supergravity theories. We construct infinite new classes of explicit examples and for some of the type IIB solutions determine the central charge of the dual SCFTs. The type IIB solutions with non-vanishing three-form flux that we construct include a two-torus, and after two T-dualities and an S-duality, we obtain new AdS 3 solutions with only the NS fields being non-trivial.

  19. Polarised Black Holes in AdS

    CERN Document Server

    Costa, Miguel S.; Oliveira, Miguel; Penedones, João; Santos, Jorge E.

    2016-05-03

    We consider solutions in Einstein-Maxwell theory with a negative cosmological constant that asymptote to global $AdS_{4}$ with conformal boundary $S^{2}\\times\\mathbb{R}_{t}$. At the sphere at infinity we turn on a space-dependent electrostatic potential, which does not destroy the asymptotic $AdS$ behaviour. For simplicity we focus on the case of a dipolar electrostatic potential. We find two new geometries: (i) an $AdS$ soliton that includes the full backreaction of the electric field on the $AdS$ geometry; (ii) a polarised neutral black hole that is deformed by the electric field, accumulating opposite charges in each hemisphere. For both geometries we study boundary data such as the charge density and the stress tensor. For the black hole we also study the horizon charge density and area, and further verify a Smarr formula. Then we consider this system at finite temperature and compute the Gibbs free energy for both $AdS$ soliton and black hole phases. The corresponding phase diagram generalizes the Hawkin...

  20. Digital terrestrial broadcasting receiver in the U.K; Eikoku chijoha digital hoso jushinki

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1999-03-01

    Digital terrestrial broadcasting is broadcasted in parallel with existing UHF analog broadcasting, whereas each of allocated channel frequencies can transmit five to six programs simultaneously. Each home can receive a number of programs with the existing antenna without a need of installing a new satellite antenna or cable. Among the countries of the world running forward to digitization of broadcasting all at once, the U.K. develops advancing movements and leads the world by starting the digital terrestrial broadcasting. In addition to the digitized broadcasting of conventional analog broadcasting programs, the `Ondigitals` (broadcasting operators) have started newly the pay broadcasting. Toshiba has been selected as one of the six developers and manufacturers of digital terrestrial broadcasting receivers, and has developed the digital terrestrial broadcasting receiver DTB2000. For the modulation system, the orthogonal frequency division multiplex (OFDM) was chosen as a system being strong against ghost and most suitable for digital terrestrial broadcasting. In addition, the receiver is equipped with software download function by using the broadcasting waves, and the common interface being the communication specification specified in the DVB (digital video broadcasting) to provide future function expandability. (translated by NEDO)

  1. Water vapor estimation using digital terrestrial broadcasting waves

    Science.gov (United States)

    Kawamura, S.; Ohta, H.; Hanado, H.; Yamamoto, M. K.; Shiga, N.; Kido, K.; Yasuda, S.; Goto, T.; Ichikawa, R.; Amagai, J.; Imamura, K.; Fujieda, M.; Iwai, H.; Sugitani, S.; Iguchi, T.

    2017-03-01

    A method of estimating water vapor (propagation delay due to water vapor) using digital terrestrial broadcasting waves is proposed. Our target is to improve the accuracy of numerical weather forecast for severe weather phenomena such as localized heavy rainstorms in urban areas through data assimilation. In this method, we estimate water vapor near a ground surface from the propagation delay of digital terrestrial broadcasting waves. A real-time delay measurement system with a software-defined radio technique is developed and tested. The data obtained using digital terrestrial broadcasting waves show good agreement with those obtained by ground-based meteorological observation. The main features of this observation are, no need for transmitters (receiving only), applicable wherever digital terrestrial broadcasting is available and its high time resolution. This study shows a possibility to estimate water vapor using digital terrestrial broadcasting waves. In the future, we will investigate the impact of these data toward numerical weather forecast through data assimilation. Developing a system that monitors water vapor near the ground surface with time and space resolutions of 30 s and several kilometers would improve the accuracy of the numerical weather forecast of localized severe weather phenomena.

  2. Obstacles to broadcasting for national integration in Nigeria.

    Science.gov (United States)

    Amienyi, O P

    1989-01-01

    In Nigeria, the media is the major government vehicle to achieve national integration. The problems arise from the approximately 250 ethnic groups speaking many languages. Television and radio have caused disintegration by emphasizing alienation and polarization rather than unity. With more than 178 languages there are major problems for radio and television. The government leaders have promoted a strong interest in creating a unified society through broadcasting, but at the same time have allowed media managers to operate towards goals of ethnic protection. Religion is also a factor that hinders broadcasting for national unity, since there are Hausa and Muslim in the north, Catholic in the south-east, and in the south-west there are many African ethnic religions. More than 60% of the local programming on television is keyed to local religious subjects. Illiteracy is also a problem in the use of broadcasting in the goal of national integration. Only through education of a socially conscious people can the religious fanaticism, ethnocentrism, and tribalism be overcome to form a united nation. Broadcasting can play an important role consistent with the needs of society as a whole. Managers in broadcasting must be well educated, well trained and understand the needs and ambitions of society. They need to support these needs and ambitions, and be constructively critical when necessary for the betterment of society.

  3. Effect Through Broadcasting System Access Point For Video Transmission

    Directory of Open Access Journals (Sweden)

    Leni Marlina

    2015-08-01

    Full Text Available Most universities are already implementing wired and wireless network that is used to access integrated information systems and the Internet. At present it is important to do research on the influence of the broadcasting system through the access point for video transmitter learning in the university area. At every university computer network through the access point must also use the cable in its implementation. These networks require cables that will connect and transmit data from one computer to another computer. While wireless networks of computers connected through radio waves. This research will be a test or assessment of how the influence of the network using the WLAN access point for video broadcasting means learning from the server to the client. Instructional video broadcasting from the server to the client via the access point will be used for video broadcasting means of learning. This study aims to understand how to build a wireless network by using an access point. It also builds a computer server as instructional videos supporting software that can be used for video server that will be emitted by broadcasting via the access point and establish a system of transmitting video from the server to the client via the access point.

  4. TV Recommendation and Personalization Systems: Integrating Broadcast and Video On demand Services

    Directory of Open Access Journals (Sweden)

    SOARES, M.

    2014-02-01

    Full Text Available The expansion of Digital Television and the convergence between conventional broadcasting and television over IP contributed to the gradual increase of the number of available channels and on demand video content. Moreover, the dissemination of the use of mobile devices like laptops, smartphones and tablets on everyday activities resulted in a shift of the traditional television viewing paradigm from the couch to everywhere, anytime from any device. Although this new scenario enables a great improvement in viewing experiences, it also brings new challenges given the overload of information that the viewer faces. Recommendation systems stand out as a possible solution to help a watcher on the selection of the content that best fits his/her preferences. This paper describes a web based system that helps the user navigating on broadcasted and online television content by implementing recommendations based on collaborative and content based filtering. The algorithms developed estimate the similarity between items and users and predict the rating that a user would assign to a particular item (television program, movie, etc.. To enable interoperability between different systems, programs? characteristics (title, genre, actors, etc. are stored according to the TV-Anytime standard. The set of recommendations produced are presented through a Web Application that allows the user to interact with the system based on the obtained recommendations.

  5. Ad-Me: A Context-Sensitive Advertising System

    OpenAIRE

    Hristova, Nataliya; O'Hare, G. M. P. (Greg M. P.)

    2001-01-01

    The mobile commerce sector and in particular the context sensitive advertising will represent a high yield revenue stream. This paper introduces the Ad-me (Advertising for the Mobile E-commerce user) system. The Ad-me is a mobile tourist guide that proactively delivers advertisements to users based upon perceived individual user needs together with their location. A Multi-Agent Systems (MAS) design philosophy is adopted. In order to achieve maximum content diffusion a range of presentation...

  6. Mobile marketing for mobile games

    OpenAIRE

    Vu, Giang

    2016-01-01

    Highly developed mobile technology and devices enable the rise of mobile game industry and mobile marketing. Hence mobile marketing for mobile game is an essential key for a mobile game success. Even though there are many articles on marketing for mobile games, there is a need of highly understanding mobile marketing strategies, how to launch a mobile campaign for a mobile game. Besides that, it is essential to understand the relationship between mobile advertising and users behaviours. There...

  7. Characteristics of hybrid broadcast broadband television (HbbTV

    Directory of Open Access Journals (Sweden)

    Jakšić Branimir

    2017-01-01

    Full Text Available This paper describes the working principle of hybrid broadcast-broadband TV (Hybrid Broadcast Broadband TV - HbbTV. The architecture of HbbTV system is given, the principle of its operation, as well as an overview of HbbTV specification standards that are in use, with their basic characteristics. Here are described the services provided by Hybrid TV. It is also provided an overview of the distribution of HbbTV services in Europe in terms of the number of TV channels that HbbTV services offer, the number of active hybrid TV devices, HbbTV standards which are in use and models of broadcast networks used to distribute HbbTV service.

  8. Mobility2.0: co-operative ITS systems for enhanced electric vehicle mobility

    NARCIS (Netherlands)

    Unknown, [Unknown; Dimitrova, D.C.; Brogle, M.; Braun, T.; Heijenk, Gerhard J.

    Mobility2.0 will develop and test an in-vehicle commuting assistant for FEV mobility, resulting in more reliable and energy-efficient electro-mobility. In order to achieve a maximum impact, Mobility2.0 takes an integrated approach of ad- dressing the main bottlenecks of urban FEV mobility: range

  9. Generating Ideas for New Mobile TV Services

    DEFF Research Database (Denmark)

    Sørensen, Lene Tolstrup; Nicolajsen, Hanne Westh

    2010-01-01

    Mobile TV is still in its infancy in respect to identifying new services/content, which deploy the technology convergence of broadcasting, Internet and radio while satisfying the user with respect to interactivity, sociability and content, and at the same time fit the small screen of a mobile phone....... This paper reports on a semi-field trial performed with a group of young, IT literate users provided with handheld devices and the possibility of watching mobile TV as a basis for creation of ideas for more advanced services. The results shows that this group of users looks for personalized services...

  10. Admission and Preventive Load Control for Delivery of Multicast and Broadcast Services via S-UMTS

    Science.gov (United States)

    Angelou, E.; Koutsokeras, N.; Andrikopoulos, I.; Mertzanis, I.; Karaliopoulos, M.; Henrio, P.

    2003-07-01

    An Admission Control strategy is proposed for unidirectional satellite systems delivering multicast and broadcast services to mobile users. In such systems, both the radio interface and the targeted services impose particular requirements on the RRM task. We briefly discuss the RRM requirements that stem from the services point of view and from the features of the SATIN access scheme that differentiate it from the conventional T-UMTS radio interface. The main functional entities of RRM and the alternative modes of operation are outlined and the proposed Admission Control algorithm is described in detail. The results from the simulation study that demonstrate its performance for a number of different scenarios are finally presented and conclusions derived.

  11. Broadcasting football rights in Brazil: the case of Globo and "Club of 13" in the antitrust perspective

    Directory of Open Access Journals (Sweden)

    César Mattos

    2012-06-01

    Full Text Available In 2010, the Brazilian Antitrust Authority -CADE- concluded an agreeement with Globo and the "Club of 13" on a three-year deal for the exclusive broadcasting rights to all Brazilian Football League (BFL games spanning the five principal media platforms: free-to-air TV, pay TV, Pay per View, Internet and Mobile. The deal eliminates competition in broadcasting of Brazilian League games (primarily other networks, including Record, SBT, ESPN, etc., reducing "competition in the market." However, it is plausible to assume that exclusivity can bring efficiencies to the market by ensuring a return on investments. In addition, the sale of broadcasting rights accounts for nearly 40% of the revenues of Brazilian clubs. Banning exclusivity will likely reduce revenues and dampen sector efficiency. However, the contract included a preference clause for Globo that adversely affected "competition for the market." Globo abandoned the preference clause under the agreement. Another important provision of the agreement was the requirement that the Club of 13 auction the five media platforms separately. This article examines the economic rationale of the agreement and provides a brief analysis of the main lessons arising from the fragmentation of negotiations in 2011.

  12. Current status of AdS instability

    CERN Multimedia

    CERN. Geneva

    2016-01-01

    arXiv:1403.6471 and thoroughly developed in arXiv:1407.6273. On the other hand the negative cosmological constant allows for the existence of stable, time-periodic, asymptotically AdS solutions of Einstein equations [arXiv:1303.3186].

  13. AdS. Klein-Gordon equation

    OpenAIRE

    Bel, Ll.

    2014-01-01

    I propose a generalization of the Klein-Gordon equation in the framework of AdS space-time and exhibit a four parameter family of solutions among which there is a two parameter family of time-dependent bound states.

  14. Resource allocation for multichannel broadcasting visible light communication

    Science.gov (United States)

    Le, Nam-Tuan; Jang, Yeong Min

    2015-11-01

    Visible light communication (VLC), which offers the possibility of using light sources for both illumination and data communications simultaneously, will be a promising incorporation technique with lighting applications. However, it still remains some challenges especially coverage because of field-of-view limitation. In this paper, we focus on this issue by suggesting a resource allocation scheme for VLC broadcasting system. By using frame synchronization and a network calculus QoS approximation, as well as diversity technology, the proposed VLC architecture and QoS resource allocation for the multichannel-broadcasting MAC (medium access control) protocol can solve the coverage limitation problem and the link switching problem of exhibition service.

  15. Effect of ADS-B Characteristics on Airborne Conflict Detection and Resolution

    NARCIS (Netherlands)

    Langejan, T.P.; Sunil, E.; Ellerbroek, J.; Hoekstra, J.M.

    2016-01-01

    Most Free-Flight concepts rely on self-separation by means of airborne Conflict Detection and Resolution (CD&R) algorithms. A key enabling technology for airborne CD&R is the Automatic Dependent Surveillance-Broadcast (ADS-B) system, which is used for direct state information exchange

  16. Quasi-ADS-B Based UAV Conflict Detection and Resolution to Manned Aircraft

    Directory of Open Access Journals (Sweden)

    Chin E. Lin

    2015-01-01

    Full Text Available A Conflict Detection and Resolution (CD&R system for manned/unmanned aerial vehicle (UAV based on Automatic Dependent Surveillance-Broadcast (ADS-B concept is designed and verified in this paper. The 900 MHz XBee-Pro is selected as data transponder to broadcast flight information among participating aircraft in omnirange. Standard Compact Position Report (CPR format packet data are automatically broadcasted by ID sequencing under Quasi-ADS-B mechanism. Time Division Multiple Access (TDMA monitoring checks the designated time slot and reallocates the conflict ID. This mechanism allows the transponder to effectively share data with multiple aircraft in near airspace. The STM32f103 microprocessor is designed to handle RF, GPS, and flight data with Windows application on manned aircraft and ground control station simultaneously. Different conflict detection and collision avoidance algorithms can be implemented into the system to ensure flight safety. The proposed UAV/CD&R using Quasi-ADS-B transceiver is tested using ultralight aircraft flying at 100–120 km/hr speed in small airspace for mission simulation. The proposed hardware is also useful to additional applications to mountain hikers for emergency search and rescue. The fundamental function by the proposed UAV/CD&R using Quasi-ADS-B is verified with effective signal broadcasting for surveillance and efficient collision alert and avoidance performance to low altitude flights.

  17. Ad Hoc Access Gateway Selection Algorithm

    Science.gov (United States)

    Jie, Liu

    With the continuous development of mobile communication technology, Ad Hoc access network has become a hot research, Ad Hoc access network nodes can be used to expand capacity of multi-hop communication range of mobile communication system, even business adjacent to the community, improve edge data rates. For mobile nodes in Ad Hoc network to internet, internet communications in the peer nodes must be achieved through the gateway. Therefore, the key Ad Hoc Access Networks will focus on the discovery gateway, as well as gateway selection in the case of multi-gateway and handover problems between different gateways. This paper considers the mobile node and the gateway, based on the average number of hops from an average access time and the stability of routes, improved gateway selection algorithm were proposed. An improved gateway selection algorithm, which mainly considers the algorithm can improve the access time of Ad Hoc nodes and the continuity of communication between the gateways, were proposed. This can improve the quality of communication across the network.

  18. Research of Ad Hoc Networks Access Algorithm

    Science.gov (United States)

    Xiang, Ma

    With the continuous development of mobile communication technology, Ad Hoc access network has become a hot research, Ad Hoc access network nodes can be used to expand capacity of multi-hop communication range of mobile communication system, even business adjacent to the community, improve edge data rates. When the ad hoc network is the access network of the internet, the gateway discovery protocol is very important to choose the most appropriate gateway to guarantee the connectivity between ad hoc network and IP based fixed networks. The paper proposes a QoS gateway discovery protocol which uses the time delay and stable route to the gateway selection conditions. And according to the gateway discovery protocol, it also proposes a fast handover scheme which can decrease the handover time and improve the handover efficiency.

  19. Lorentzian AdS, Wormholes and Holography

    CERN Document Server

    Arias, Raul E; Silva, Guillermo A

    2011-01-01

    We investigate the structure of two point functions for the QFT dual to an asymptotically Lorentzian AdS-wormhole. The bulk geometry is a solution of 5-dimensional second order Einstein Gauss Bonnet gravity and causally connects two asymptotically AdS space times. We revisit the GKPW prescription for computing two-point correlation functions for dual QFT operators O in Lorentzian signature and we propose to express the bulk fields in terms of the independent boundary values phi_0^\\pm at each of the two asymptotic AdS regions, along the way we exhibit how the ambiguity of normalizable modes in the bulk, related to initial and final states, show up in the computations. The independent boundary values are interpreted as sources for dual operators O^\\pm and we argue that, apart from the possibility of entanglement, there exists a coupling between the degrees of freedom leaving at each boundary. The AdS_(1+1) geometry is also discussed in view of its similar boundary structure. Based on the analysis, we propose a ...

  20. Architecture and Design of IP Broadcasting System Using Passive Optical Network

    Science.gov (United States)

    Ikeda, Hiroki; Sugawa, Jun; Ashi, Yoshihiro; Sakamoto, Kenichi

    We propose an IP broadcasting system architecture using passive optical networks (PON) utilizing the optical broadcast links of a PON with a downstream bandwidth allocation algorithm to provide a multi-channel IP broadcasting service to home subscribers on single broadband IP network infrastructures. We introduce the design and adaptation of the optical broadcast links to effectively broadcast video contents to home subscribers. We present a performance analysis that includes the downstream bandwidth utilization efficiency of the broadcast link and the bandwidth control of the IP broadcasting and Internet data. Our analysis and simulation results show that the proposed system can provide 100 HDTV channels to every user over fiber lines. We also propose an IPTV channel selection mechanism in an ONT by selecting a broadcast stream. We developed and evaluated a prototype that can achieve a 15-msec IPTV channel selection speed.

  1. An Efficient Live TV Scheduling System for 4G LTE Broadcast

    KAUST Repository

    Lau, Chun Pong; Alabbasi, AbdulRahman; Shihada, Basem

    2016-01-01

    Traditional live television (TV) broadcasting systems are proven to be spectrum inefficient. Therefore, researchers propose to provide TV services on fourth-generation (4G) long-term evolution (LTE) networks. However, static broadcast, a typical

  2. 76 FR 12292 - Radio Broadcasting Services; Kualapuu, HI

    Science.gov (United States)

    2011-03-07

    ... FEDERAL COMMUNICATIONS COMMISSION 47 CFR Part 73 [DA 11-323; MB Docket No. 09-189; RM-11564] Radio Broadcasting Services; Kualapuu, HI AGENCY: Federal Communications Commission. ACTION: Final rule. SUMMARY: The Audio Division, at the request of Kemp Communications, Inc., allots FM Channel 296C2 at Kualapuu, Hawaii...

  3. Using the interactive distance learning broadcast format for international audiences

    International Nuclear Information System (INIS)

    Callan, C.; Hylko, J.M.

    1997-01-01

    Since 1989, the National Environmental Technology Network (NETN) has been broadcasting interactive presentations on topics of national and international concern. Each interactive presentation covers such topics as decommissioning, environmental risk management, radioactive waste management, waste minimization, and total quality management. Course materials are provided to the attendees which feature case studies, legal and regulatory issues, and the application of existing and new technologies. The interactive presentations are broadcast by satellite and videotaped, allowing employees to participate who do not have convenient access to traditional classroom training resources. Over 8,000 professionals and students in the United States and several foreign countries have participated in the distance learning broadcast format, thus providing a proven and cost-effective method for managing educational and facility resources effectively. A case study is presented depicting why training, if neglected, can result in costly errors, and how the distance learning broadcast format can be expanded to assist regulatory officials, and even the local populace, in making cost-effective decisions. (author)

  4. Audience Research in American Broadcasting: The Early Years.

    Science.gov (United States)

    Hurwitz, Donald

    The basic arrangements and practices of American broadcast audience research and measurement were established during the first decade (1920-29) of the field's existence, and were motivated by commercial and competing institutional concerns within the broader context of evolving forms of imagination and expression. A review of the evidence found in…

  5. 76 FR 56657 - Unlicensed Operation in the TV Broadcast Bands

    Science.gov (United States)

    2011-09-14

    ...-174] Unlicensed Operation in the TV Broadcast Bands AGENCY: Federal Communications Commission. ACTION... collection requirements contained in the regulations for issues relating to the unlicensed use of the TV bands (TV White Space). The information collection requirements were approved on September 7, 2011 by...

  6. Northern goshawk broadcast surveys: Hawk response variables and survey cost

    Science.gov (United States)

    Suzanne M. Joy; Richard T. Reynolds; Douglas G. Leslie

    1994-01-01

    We examined responses of Northern Goshawks (Accipter gentilis) to taped broadcast calls of conspecifics in tree-harvest areas and around alternate goshawk nests on Kaibab National Forest, Arizona, in 1991 and 1992. Forest areas totaling 476 km2 were systematically surveyed for goshawks. Ninety responses by adult and juvenile goshawks were elicited...

  7. Retrieving relevant and interesting tweets during live television broadcasts

    NARCIS (Netherlands)

    Kaptein, R.; Zhu, Y.; Koot, G.; Redi, J.; Niamut, O.

    2015-01-01

    The use of social TV applications to enhance the experience of live event broadcasts has become an increasingly common practice. An event profile, defined as a set of keywords relevant to an event, can help to track messages related to these events on social networks. We propose an event profiler

  8. Resource development and experiments in automatic SA broadcast news transcription

    CSIR Research Space (South Africa)

    Kamper, H

    2012-05-01

    Full Text Available development purposes: a 20 hour corpus of South African English (SAE) broadcast news, a 109M word corpus of South African newspaper text collected for language modelling purposes, and a 60k word SAE pronunciation dictionary. The development of our system...

  9. How to Write News for Broadcast and Print Media.

    Science.gov (United States)

    Dary, David

    This book is a primer on the techniques of news writing and the application of those principles to print and broadcast journalism. Chapters include: "The News Media," which presents a brief history of journalism and the foundations on which it is based; "What Is News?"; "Gathering News," which discusses news beats, reporters' qualifications, and…

  10. 76 FR 5521 - Innovation in the Broadcast Television Bands

    Science.gov (United States)

    2011-02-01

    ... broadcasters serving minority, foreign language and niche interests that might have smaller audiences and lower... signals, including those not specifically raised in this NPRM. Improving Reception of VHF TV Service 34... band that can cause interference, and reception of VHF signals requires physically larger antennas that...

  11. Broadcasting in Iceland: Cultural Protectionism and U.S. Influence.

    Science.gov (United States)

    Hudson, Tim

    Icelanders are a highly literate people, their culture tied together by perhaps the most complete written tradition of any modern nation. No wonder, then, that the tiny island country seemed in no rush to develop a television broadcasting system. Indeed, it is questionable whether television would have been in demand at all if not for outside…

  12. 76 FR 62642 - Digital Broadcast Television Redistribution Control; Corrections

    Science.gov (United States)

    2011-10-11

    ... Characteristic,'' (July 6, 2010), as listed below: (i) A/53, Part 1:2007, ``Digital Television System'' (January... FEDERAL COMMUNICATIONS COMMISSION 47 CFR Part 73 [DA 11-1432] Digital Broadcast Television..., Radio, Television. Accordingly, 47 CFR part 73 is corrected by making the following correcting...

  13. Unsupervised Speaker Change Detection for Broadcast News Segmentation

    DEFF Research Database (Denmark)

    Jørgensen, Kasper Winther; Mølgaard, Lasse Lohilahti; Hansen, Lars Kai

    2006-01-01

    This paper presents a speaker change detection system for news broadcast segmentation based on a vector quantization (VQ) approach. The system does not make any assumption about the number of speakers or speaker identity. The system uses mel frequency cepstral coefficients and change detection...

  14. 75 FR 76294 - Radio Broadcasting Services: Pacific Junction, IA

    Science.gov (United States)

    2010-12-08

    ... FEDERAL COMMUNICATIONS COMMISSION 47 CFR Part 73 [DA 10-2236; MB Docket No. 10-108] Radio Broadcasting Services: Pacific Junction, IA AGENCY: Federal Communications Commission. ACTION: Final rule. SUMMARY: The staff deletes FM Channel 299C2 at Pacific Junction, Iowa, because the record in this...

  15. Using Digital Watermarking for Securing Next Generation Media Broadcasts

    Science.gov (United States)

    Birk, Dominik; Gaines, Seán

    The Internet presents a problem for the protection of intellectual property. Those who create content must be adequately compensated for the use of their works. Rights agencies who monitor the use of these works exist in many jurisdictions. In the traditional broadcast environment this monitoring is a difficult task. With Internet Protocol Television (IPTV) and Next Generation Networks (NGN) this situation is further complicated.

  16. 76 FR 67397 - Radio Broadcasting Services; Llano, Texas

    Science.gov (United States)

    2011-11-01

    ...] Radio Broadcasting Services; Llano, Texas AGENCY: Federal Communications Commission. ACTION: Proposed... substituting Channel 242C3 for vacant Channel 293C3, at Llano, Texas. The proposal is part of a contingently... required for the allotment of Channel 242C3 at Llano, Texas, because the proposed allotment is located...

  17. 78 FR 27342 - Radio Broadcasting Services; Moran, Texas

    Science.gov (United States)

    2013-05-10

    ... Broadcasting Services; Moran, Texas AGENCY: Federal Communications Commission. ACTION: Proposed rule. SUMMARY... service at Moran, Texas. Channel 281A can be allotted at Moran, Texas, in compliance with the Commission's... parties should serve petitioner as follows: Katherine Pyeatt, 215 Cedar Springs Rd., 1605, Dallas, Texas...

  18. 78 FR 42700 - Radio Broadcasting Services; Matagorda, Texas

    Science.gov (United States)

    2013-07-17

    ... Broadcasting Services; Matagorda, Texas AGENCY: Federal Communications Commission. ACTION: Final rule. SUMMARY... FM Channel 252A at Matagorda, Texas. This allotment change is part of a hybrid rule making and FM... 291A at Matagorda, Texas, is located within 320 kilometers (199 miles) of the U.S.-Mexican border...

  19. 77 FR 2242 - Radio Broadcasting Services; Pike Road, AL

    Science.gov (United States)

    2012-01-17

    ...] Radio Broadcasting Services; Pike Road, AL AGENCY: Federal Communications Commission. ACTION: Proposed... Corporation, Inc., proposing the allotment of Channel 228A at Pike Road, Alabama, as its second local service. A staff engineering analysis indicates that Channel 228A can be allotted to Pike Road consistent...

  20. 77 FR 64792 - Radio Broadcasting Services; Pike Road, AL

    Science.gov (United States)

    2012-10-23

    ...] Radio Broadcasting Services; Pike Road, AL AGENCY: Federal Communications Commission. ACTION: Proposed... Corporation, Inc., proposing the allotment of Channel 228A at Pike Road, Alabama, as the community's second local service. A staff engineering analysis indicates that Channel 228A can be allotted to Pike Road...

  1. 77 FR 38761 - Radio Broadcasting Services; Pike Road, AL

    Science.gov (United States)

    2012-06-29

    ... Broadcasting Services; Pike Road, AL AGENCY: Federal Communications Commission. ACTION: Proposal rule..., Inc., proposing the allotment of Channel 228A at Pike Road, Alabama, as the community's second local... Pike Road allotment. It is the Commission's policy to refrain from making an allotment to a community...

  2. 75 FR 3641 - Television Broadcasting Services; Anchorage, AK

    Science.gov (United States)

    2010-01-22

    ... FEDERAL COMMUNICATIONS COMMISSION 47 CFR Part 73 [DA 10-40; MB Docket No. 09-210; RM-11583] Television Broadcasting Services; Anchorage, AK AGENCY: Federal Communications Commission. ACTION: Final rule... review Act, see 5 U.S.C. 801(a)(1)(A). List of Subjects in 47 CFR Part 73 Television, Television...

  3. 47 CFR 76.66 - Satellite broadcast signal carriage.

    Science.gov (United States)

    2010-10-01

    ... carriers are required to carry digital-only stations upon request in markets in which the satellite carrier... digital signals of each television broadcast station that is located in a local market in Alaska or Hawaii... retransmits a local television station signal back into the local market of that television station for...

  4. 47 CFR 73.1211 - Broadcast of lottery information.

    Science.gov (United States)

    2010-10-01

    ... paragraph (c) of this section, shall broadcast any advertisement of or information concerning any lottery... section shall not apply to an advertisement, list of prizes or other information concerning: (1) A lottery... and ancillary to the primary business of that organization. (18 U.S.C. 1307(a); 102 Stat. 3205). (d)(1...

  5. Surveillance discourse in UK broadcasting since the Snowden revelations

    OpenAIRE

    Lischka, Juliane A

    2015-01-01

    The surveillance discourse in British broadcast news since the Snowden revelations covers justifications and challenges. Justification focuses on authorisation and rationalisation strategies stating terror threats explicitly, which are often expressed by governmental actors. Delegitimation strategies predominantly use moralising and mythopoetic arguments of civil liberties and are expressed by Snowden himself, politicians, rarely by journalists, non-governmental organisations, and very rarely...

  6. Will broadcasters survive in the online and digital domain?

    NARCIS (Netherlands)

    Leurdijk, A.

    2007-01-01

    Digital television and the internet are fundamentally changing media markets. Consumers have access to an increasing amount of news, information and entertainment. In addition to traditional media companies such as publishers and broadcasters new players enter the market as content producers,

  7. Reinventing public service broadcasting in Europe: prospects, promises and problems

    NARCIS (Netherlands)

    Bardoel, J.L.H.; d'Haenens, L.S.J.

    2008-01-01

    New information technologies, liberalizing policies and rapidly changing societies – from mono- to multicultural – entail serious consequences for the prospects of European public service broadcasters in a network society. The European concept of PSB as a comprehensive and universal service is

  8. The Status of Broadcast Education in Institutions of Higher Learning.

    Science.gov (United States)

    Elmore, Garland C.

    1983-01-01

    Surveyed different departments that offer undergraduate degrees in radio-television-film. Compared (1) philosophies; (2) semester hours offered and required in radio-television-film; (3) faculty qualifications; (4) dollars invested in equipment and training facilities; and (5) student enrollment degree data. Departments included broadcasting,…

  9. 76 FR 49697 - Television Broadcasting Services; Eau Claire, WI

    Science.gov (United States)

    2011-08-11

    ...] Television Broadcasting Services; Eau Claire, WI AGENCY: Federal Communications Commission. ACTION: Final rule. SUMMARY: The Commission has before it a petition for rulemaking filed by Gray Television Licensee... the Congressional review Act, see 5 U.S.C. 801(a)(1)(A). List of Subjects in 47 CFR Part 73 Television...

  10. 78 FR 58470 - Television Broadcasting Services; Cedar Rapids, Iowa

    Science.gov (United States)

    2013-09-24

    ... FEDERAL COMMUNICATIONS COMMISSION 47 CFR Part 73 [MB Docket No. 13-182; RM-11701; DA 13-1882] Television Broadcasting Services; Cedar Rapids, Iowa AGENCY: Federal Communications Commission. ACTION: Final... CFR Part 73 Television. Federal Communications Commission. Barbara A. Kreisman, Chief, Video Division...

  11. 76 FR 33656 - Television Broadcasting Services; Nashville, TN

    Science.gov (United States)

    2011-06-09

    ... FEDERAL COMMUNICATIONS COMMISSION 47 CFR Part 73 [MB Docket No. 11-29; RM-11622, DA 11-949] Television Broadcasting Services; Nashville, TN AGENCY: Federal Communications Commission. ACTION: Final rule... Part 73 Television. Federal Communications Commission. Barbara A. Kreisman, Chief, Video Division...

  12. 76 FR 19275 - Television Broadcasting Services; Jackson, MS

    Science.gov (United States)

    2011-04-07

    ... FEDERAL COMMUNICATIONS COMMISSION 47 CFR Part 73 [MB Docket No. 11-8; RM-11618, DA 11-516] Television Broadcasting Services; Jackson, MS AGENCY: Federal Communications Commission. ACTION: Final rule... review Act, see 5 U.S.C. 801(a)(1)(A). List of Subjects in 47 CFR Part 73 Television. Federal...

  13. 75 FR 13681 - Television Broadcasting Services; Atlantic City, NJ

    Science.gov (United States)

    2010-03-23

    ...] Television Broadcasting Services; Atlantic City, NJ AGENCY: Federal Communications Commission. ACTION: Final... not less than one very high frequency commercial television channel to each State, if technically... Review Act, see 5 U.S.C. 801(a)(1)(A). List of Subjects in 47 CFR Part 73 Television, Television...

  14. 76 FR 18415 - Television Broadcasting Services; New Haven, CT

    Science.gov (United States)

    2011-04-04

    ... FEDERAL COMMUNICATIONS COMMISSION 47 CFR Part 73 [MB Docket No. 09-123; RM-11546, DA 11-501] Television Broadcasting Services; New Haven, CT AGENCY: Federal Communications Commission. ACTION: Final rule... CFR Part 73 Television. Federal Communications Commission. Barbara A. Kreisman, Chief, Video Division...

  15. 76 FR 19276 - Television Broadcasting Services; El Paso, TX

    Science.gov (United States)

    2011-04-07

    ... FEDERAL COMMUNICATIONS COMMISSION 47 CFR Part 73 [MB Docket No. 11-4; RM-11616, DA 11-530] Television Broadcasting Services; El Paso, TX AGENCY: Federal Communications Commission. ACTION: Final rule... Part 73 Television. Federal Communications Commission. Barbara A. Kreisman, Chief, Video Division...

  16. 77 FR 33997 - Television Broadcasting Services; Greenville, NC

    Science.gov (United States)

    2012-06-08

    ...] Television Broadcasting Services; Greenville, NC AGENCY: Federal Communications Commission. ACTION: Proposed... freeze on the acceptance of rulemaking petitions by full power television stations requesting channel... filed by full power television stations seeking to relocate from channel 51 pursuant to a voluntary...

  17. 76 FR 20248 - Television Broadcasting Services; Decatur, IL

    Science.gov (United States)

    2011-04-12

    ... FEDERAL COMMUNICATIONS COMMISSION 47 CFR Part 73 [MB Docket No. 10-264; RM-11615, DA 11-572] Television Broadcasting Services; Decatur, IL AGENCY: Federal Communications Commission. ACTION: Final rule... CFR Part 73 Television. Federal Communications Commission. Barbara A. Kreisman, Chief, Video Division...

  18. 76 FR 68124 - Television Broadcasting Services; Fond du Lac, WI

    Science.gov (United States)

    2011-11-03

    ... FEDERAL COMMUNICATIONS COMMISSION 47 CFR Part 73 [MB Docket No. 09-115, RM-11543; DA 11-1502] Television Broadcasting Services; Fond du Lac, WI AGENCY: Federal Communications Commission. ACTION: Proposed rule. SUMMARY: In this document, the Commission denies a petition for reconsideration of an August 12...

  19. 75 FR 19907 - Television Broadcasting Services; Beaumont, TX

    Science.gov (United States)

    2010-04-16

    ... FEDERAL COMMUNICATIONS COMMISSION 47 CFR Part 73 [DA 10-606; MB Docket No. 10-49; RM-11593] Television Broadcasting Services; Beaumont, TX AGENCY: Federal Communications Commission. ACTION: Final rule... Congressional review Act, see 5 U.S.C. 801(a)(1)(A). List of Subjects in 47 CFR Part 73 Television, Television...

  20. 76 FR 71909 - Television Broadcasting Services; Montgomery, AL

    Science.gov (United States)

    2011-11-21

    ... FEDERAL COMMUNICATIONS COMMISSION 47 CFR Part 73 [MB Docket No. 11-137; RM-11637, DA 11-1863] Television Broadcasting Services; Montgomery, AL AGENCY: Federal Communications Commission. ACTION: Final... CFR Part 73 Television. Federal Communications Commission. Barbara A. Kreisman, Chief, Video Division...