hash
stringlengths
32
32
doc_id
stringlengths
7
13
section
stringlengths
3
121
content
stringlengths
0
2.2M
1f8ec2f1098b0ca82d74bf3ddd3a9b67
101 568
3.2 Abbreviations
For the purposes of the present document, the following abbreviations apply: ASR Automatic Speech Recognition CAT Computer Aided Translation tool CM Content Management CMS Content Management System CRM Customer Relation Management GCMS Global Content Management System GMS Globalization Management System HTML Hyper Text...
1f8ec2f1098b0ca82d74bf3ddd3a9b67
101 568
4 Localising an interactive application
1f8ec2f1098b0ca82d74bf3ddd3a9b67
101 568
4.1 Localisation vs. translation
As defined, "translation" is the process of taking textual or oral communication elements, in the form of sentences or phrases, from one source language and translating them into a target language. Translation can be done from a well defined and fixed text (official translation of an official document or a book, for in...
1f8ec2f1098b0ca82d74bf3ddd3a9b67
101 568
4.2 Localisation aspects
1f8ec2f1098b0ca82d74bf3ddd3a9b67
101 568
4.2.1 Localisation and language complexity
The grammatical complexity of languages is endless, and the examples provided in this clause are only giving a quick flavour of problem. A more in-depth presentation of the most common complexity elements of different languages is provided in Annex A. Cultural and social aspects are adding to this "technical" complexit...
1f8ec2f1098b0ca82d74bf3ddd3a9b67
101 568
4.2.2 Grammatical aspects
• The basic grammatical specificities in languages such as gender, number, cases, plurals: e.g. French has four types of definite article for the English "the" ("le", "la", "l'" or "les"), and adjectives agree with gender and number; Russian has two plural forms Finnish has 14 different groups into which you can sort a...
1f8ec2f1098b0ca82d74bf3ddd3a9b67
101 568
4.2.3 Social aspects
• The use of formal addressing: in some cultures, it is appropriate to address the user using formal language ("Vous", "Sie", "U", etc.), while in others an informal addressing ("Tu", "Du", "Jij", etc.) may be expected (e.g. French, Spanish or Italian) while other languages would expect the informal form (e.g. German o...
1f8ec2f1098b0ca82d74bf3ddd3a9b67
101 568
4.2.4 Cultural aspects
• Humour expressed in words (or in illustrations) is highly cultural, since some topics may be offensive in some cultures: e.g. comparing a man with a dog is the highest offense in Arabic countries. Some applications can just avoid using it or at least employing it with care: Mobile terminals and services (as mentioned...
1f8ec2f1098b0ca82d74bf3ddd3a9b67
101 568
4.3 Localisation of context dependent applications: games
1f8ec2f1098b0ca82d74bf3ddd3a9b67
101 568
4.3.1 Flavour of the game localisation problem
Most applications now require real-time textual or oral interactivity with the user in a complex, accurate and natural-sounding language. This is clearly demonstrated with video games and in particular to MMORPGs (Massive Multiplayer's Online Role Playing Game), in which players of all nationalities become fully immers...
1f8ec2f1098b0ca82d74bf3ddd3a9b67
101 568
4.3.2 Variable and modifier: Example of interactivity script
Creation of the sentence in English The designer of a new game is writing interactivity scripts in English. He wants to communicate a range of context- dependent sentences to the player: "Take the red key !" "Take the green rope !" "Take the yellow coins !" He then creates 1 variable (%item) that depends on the user an...
1f8ec2f1098b0ca82d74bf3ddd3a9b67
101 568
4.4 Localisation of all context dependent applications
A focus has been given on the specific case of game applications for explaining the rationale and the issues of localisation of context-dependent interactive applications. Many other applications are facing the same problem, but games are the most complex applications in terms of context dependency and infinite possibi...
1f8ec2f1098b0ca82d74bf3ddd3a9b67
101 568
4.4.1 Sectors sensitive to context-dependent applications localisation
Several industrial sectors are developing highly interactive applications handling user context dependency using variables, the resulting generated phrases and interactivity dialogue being nearly infinite. Therefore, localisation cannot be handled as for traditional less interactive applications for which all possible ...
1f8ec2f1098b0ca82d74bf3ddd3a9b67
101 568
4.4.2 Example of interactivity script: 1-to-1 real-estate sector
This is a real life example, which has been proposed to a leading localisation services company by a real estate on line client. The real estate on-line global application is offering property description in a formatted way, but it intends to use language as close to reality as possible and with no language mistake. Th...
1f8ec2f1098b0ca82d74bf3ddd3a9b67
101 568
4.5 Impact on interactive applications
1f8ec2f1098b0ca82d74bf3ddd3a9b67
101 568
4.5.1 Localisation process
In most cases, the "developer/designer" creates the English (or Asian) version of the game using an English-oriented "engine" and the "publisher" is responsible for funding the "localisation " process (i.e. translation into the language of the target country). This renders the entire production chain particularly compl...
1f8ec2f1098b0ca82d74bf3ddd3a9b67
101 568
4.5.2 Localisation impact on the economical world
The success of such an initiative will provide important economic, technical and scientific benefits to all stakeholders: • It has an impact on the technical and economic aspects of these applications, enabling them to be developed by introducing the idea of context variable-based localisation and multilingualism at a ...
1f8ec2f1098b0ca82d74bf3ddd3a9b67
101 568
4.5.3 Localisation impact on the society
Beyond the obvious economical impact, the success of this initiative will provide a powerful inclusion tool within our society: • It would allow localise applications and services in minority or other non-supported languages at no or low cost. The EU has a proactive policy towards the protection and the promotion of re...
1f8ec2f1098b0ca82d74bf3ddd3a9b67
101 568
5 Localisation sensitive sectors
As explained in the introduction, the purpose of the present study is to set the scene of the problem, by explaining what type of applications are facing it and why providing a standardized solutions is demanded by all the localisation sensitive industries. The purpose is NOT to provide all the answers, which will be t...
1f8ec2f1098b0ca82d74bf3ddd3a9b67
101 568
5.1 Context dependent application industry
1f8ec2f1098b0ca82d74bf3ddd3a9b67
101 568
5.1.1 Differences in industry size not sector
Innovative solutions for the localisation of context dependent application are today quite limited since either developers and publishers are working on internal proprietary solutions and procedures of script encoding, or their handle localisation by working around the problems. For the middle-size companies, the choic...
1f8ec2f1098b0ca82d74bf3ddd3a9b67
101 568
5.1.2 Technical limitations of existing solutions
In variable-based application localisation, as explained above, there are very few advanced techniques. The promising techniques are actually coming from other applications using innovative components such as machine translation (not used at all for games, see analysis below), translation memories and so forth. Therefo...
1f8ec2f1098b0ca82d74bf3ddd3a9b67
101 568
5.1.3 Existing technologies for interactive application localisation
Several technologies and perspectives exist in the localisation and translation industry and are used in other applications beyond games: Translation Memory Translation memory allows for re-use of what has been translated previously by a professional translator. The importance of terminology is huge. At present transla...
1f8ec2f1098b0ca82d74bf3ddd3a9b67
101 568
5.1.4 Existing proprietary solutions for interactive application localisation
As explained above, several large companies have developed their own internal solution or/and process. Several of them have agreed to release some of their internal information to the limit of proprietary and protected information – (available upon request). In the game industry, we can take the real-life example of a ...
1f8ec2f1098b0ca82d74bf3ddd3a9b67
101 568
5.2 Limitations of traditional ICT localisation rules
The reference document EG 202 417 [i.1] provides recommendations to ensure good localisation of mobile terminals and services. Some are general enough to be applied in context dependent interactive applications, but many are not; they however help to detect missing parts for our study and therefore the need for additio...
1f8ec2f1098b0ca82d74bf3ddd3a9b67
101 568
5.2.1 Optimized source texts
Initial recommendations, when relevant, are in italic, followed by the related comment and analysis. • Source text should be written as clear and short as possible (short and full sentences, use the active voice, do not use too many preposition and use standard phrases). There are controlled language tools that help mo...
1f8ec2f1098b0ca82d74bf3ddd3a9b67
101 568
5.2.2 ICT localisation guidelines
Some localisation guidelines already exist in the field of ICT (see reference [i.1]. The present clause does not try to start providing localisation guidelines for the sector addressed in the present document (which will be the objective of a potential future work), but it intends to briefly analyse the existing ones i...
1f8ec2f1098b0ca82d74bf3ddd3a9b67
101 568
5.2.3 Missing localisation aspects
NOTE: Headings only are given here - See clause 4.2 "Localisation aspects" for details of each aspect mentioned. As a short summary, here is a non-exhaustive check list of the localisation aspects that have been identified in this study, but for which there is neither study nor ICT-related recommendations as today, bas...
1f8ec2f1098b0ca82d74bf3ddd3a9b67
101 568
6 Language technologies' state-of-art
NOTE: As mentioned in the Scope, the present study focuses on text-based interactivity, since this is the core of all communications, even audio ones. Indeed, applications are either explicitly text based (messages are displayed to the user or taken from him through keyboard) or they add an audio interface, as input or...
1f8ec2f1098b0ca82d74bf3ddd3a9b67
101 568
6.1 Machine translation (MT)
1f8ec2f1098b0ca82d74bf3ddd3a9b67
101 568
6.1.1 General
One of the main sources of innovation is also the components issued from Machine Translation. Machine Translation (MT) is a technology that was created more than 40 years ago, at the initiative of government intelligence agencies. Nowadays, the technology is mature and widely used for a great number of applications. Ho...
1f8ec2f1098b0ca82d74bf3ddd3a9b67
101 568
6.1.2 MT technologies
Rule-based, statistical and hybrid machine translation The first systems that were developed were relying on rules describing the languages and dictionaries. The process consists in analyzing the source sentence, transfer it to a target language and build a new sentence applying grammar rules. The statistical technique...
1f8ec2f1098b0ca82d74bf3ddd3a9b67
101 568
6.1.3 Advanced terminology management technologies
There is the need for a new technology handling the management of multilingual dictionaries. Those dictionaries are not only the correspondence of terms between various languages, it is also the management of the grammar category (e.g. verbs, nouns, adjectives, etc.) and other attributes such as the domains of use. Sou...
1f8ec2f1098b0ca82d74bf3ddd3a9b67
101 568
6.2 Multilingual dialogue systems
1f8ec2f1098b0ca82d74bf3ddd3a9b67
101 568
6.2.1 General
There are very few multilingual dialogue systems today, and most of them (actually all) rely on direct translation. However, people communicating through machine translators cannot easily tell what the purpose of their communication is or what other people's intentions are because of the poor quality of translation, es...
1f8ec2f1098b0ca82d74bf3ddd3a9b67
101 568
6.2.2 Human-computer dialogue
Deployed, operational spoken dialogue systems' conversational capabilities are often restricted to pre-scripted, fully system-driven models. Practical task-oriented dialogues, e.g. information seeking dialogue systems or voice-operated device control, based on such models have been around for a while. The complexity of...
1f8ec2f1098b0ca82d74bf3ddd3a9b67
101 568
6.2.3 Multiparty dialogue
A typical setup addressed in spoken dialogue systems is that a given dialogue agent addresses one speaker (user) at a time. While multi-party dialogue has been receiving much attention in the dialogue research and conversation analysis communities lately, both in the context of focused tasks (http://www.amiproject.org/...
1f8ec2f1098b0ca82d74bf3ddd3a9b67
101 568
6.2.4 Current limitation of Multilingual Dialogue Systems
As a summary of the above technical presentation, the limitations of the existing technologies for Multilingual Dialogue Systems are as follows: • Simple, restricted (pre-scripted) multiparty dialogue systems • Mono-or multi-lingual grammar-based speech understanding ETSI ETSI TR 101 568 V1.1.1 (2012-02) 38 • Dialogue ...
1f8ec2f1098b0ca82d74bf3ddd3a9b67
101 568
7 Generic analysis
1f8ec2f1098b0ca82d74bf3ddd3a9b67
101 568
7.1 Localisation requirements of the industry
As explained in the introduction part of the present report, the purpose of this study is to set the scene of the problem, explains what type of applications are facing it and why providing a standardized solutions is demanded by all the localisation sensitive industries. The present study has been based on numerous di...
1f8ec2f1098b0ca82d74bf3ddd3a9b67
101 568
7.1.1 Necessity for absolute correctness for all languages
The technical study has shown that the industry requirements are more and more increasing in two directions: more and more languages and an absolute correctness in localisation results. Both directions can only be handled by industries and applications providers by offering a stable environment to both developers and t...
1f8ec2f1098b0ca82d74bf3ddd3a9b67
101 568
7.1.2 Key localisation success factors
The situation is more or less the same in every industry, when facing variable-based context dependent content. But this is today highly critical for the game and eLearning industries because they are the ones handling today the largest amount of such context variables. However, many industries are about to reach the s...
1f8ec2f1098b0ca82d74bf3ddd3a9b67
101 568
7.2 Localisation environment architecture requirements
The description of the few existing localisation systems handling context variables (only proprietary so far) as well as the deep analysis of the technical and performance requirements for such a system are leading to propose a localisation environment that is able to address the 6 key success factors described above. ...
1f8ec2f1098b0ca82d74bf3ddd3a9b67
101 568
7.2.1 Localisation environment principles
As it has been established in the analysis of the different case studies above, as well as from direct discussions with engine and middleware providers, future localisation systems should always be based on the same technical principles, when willing to resolve the problem of context variables: • A clear separation is ...
1f8ec2f1098b0ca82d74bf3ddd3a9b67
101 568
7.2.2 Localisation result for the application end-users
Once the application is released and localised using the localisation and development environments below, the end-user will never see the mechanism but should get 100 % correct sentences and words whatever the situation and the context variables he is generating and using. • At run time, the embedded application engine...
1f8ec2f1098b0ca82d74bf3ddd3a9b67
101 568
7.2.3 Localisation environment for the application developer
From the application developer (and potentially the engine developer if different) point of view, the localisation environment should then be architectured as shown in figure 15. Appli. Design APPLICATION USER Figure 15: Localisation environment for the application designer • The application designer is describing the ...
1f8ec2f1098b0ca82d74bf3ddd3a9b67
101 568
7.2.4 Localisation environment for the localisers/translators
From the localiser point of view, the localisation environment should be architectured as shown in the figure below. Appli. APPLICATION USER Localisation tools APPLICATION running SOURCE TRANSLATION MEMORY and DATA GRAMMATICAL central ENGINE TARGET UPDATES Figure 16: Localisation environment for the localiser • The loc...
1f8ec2f1098b0ca82d74bf3ddd3a9b67
101 568
7.2.5 Localisation environment for the society
Finally, it is quite interesting to analyse what will be the impact of such a localisation environment for the Society. It actually offers new opportunities for the society and in particular non or less-supported languages including minorities: Appli. TRANSLATION MEMORY and DATA GRAMMATICAL central ENGINE APPLICATION r...
1f8ec2f1098b0ca82d74bf3ddd3a9b67
101 568
8 Conclusions and recommendations
As mentioned above, in clause 4.5.1, the strategic conclusion of the technical study is the following: All context-dependent interactive application industries stakeholders (see NOTE), beyond the sector of games and eLearning, are seeking recommendations and possibly, a standardized way to handle the problem, if necess...
0275f956739678ab7d2902a82613d6a6
101 612
1 Scope
The present document provides a preliminary technical overview of the cross-layer decentralized congestion control (DCC) architecture to be implemented in the ITS-S. It describes DCC functions and testable DCC limits and includes initial performance evaluation results based on simulations. In addition, reference scenar...
0275f956739678ab7d2902a82613d6a6
101 612
2 References
References are either specific (identified by date of publication and/or edition number or version number) or non-specific. For specific references, only the cited version applies. For non-specific references, the latest version of the reference document (including any amendments) applies. Referenced documents which ar...
0275f956739678ab7d2902a82613d6a6
101 612
2.1 Normative references
The following referenced documents are necessary for the application of the present document. Not applicable.
0275f956739678ab7d2902a82613d6a6
101 612
2.2 Informative references
The following referenced documents are not necessary for the application of the present document but they assist the user with regard to a particular subject area. [i.1] IEEE 802.11-2012: "IEEE Wireless Local Access Network - Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications". [i...
0275f956739678ab7d2902a82613d6a6
101 612
3 Definitions, symbols and abbreviations
0275f956739678ab7d2902a82613d6a6
101 612
3.1 Definitions
For the purposes of the present document, the terms and definitions given in IEEE 802.11-2012 [i.1], ETSI EN 302 665 [i.10], ETSI EN 302 663 [i.11], ETSI EN 302 571 [i.12] and the following apply: adaptability: performance characteristic, which indicates that a system is capable of adjusting its parameters to maintain ...
0275f956739678ab7d2902a82613d6a6
101 612
3.2 Symbols
For the purposes of the present document, the following symbols apply: CRlimit Channel Resources Limit CBRlimit Channel Busy Ratio Limit CBRtarget Target Channel Busy Ratio NSta Number of ITS-Ss PTX Transmit Power Rlimit Message Rate Limit Rtx Transmit Rate RM Message Rate ETSI ETSI TR 101 612 V1.1.1 (2014-09) 10 Toff ...
0275f956739678ab7d2902a82613d6a6
101 612
3.3 Abbreviations
For the purposes of the present document, the following abbreviations apply: ACC-XDCC DCC_CROSS_Access AI Adaptive Increase AIMD Additive Increase Multiplicative Decrease ANPI Average Noise Power Indicator C2X Car-to-X communication system CAM Cooperative Awareness Message CAT Channel Access Time CBR Channel Busy Ratio...
0275f956739678ab7d2902a82613d6a6
101 612
4 Introduction
The DCC functionality is part of the ITS station (ITS-S) reference architecture given in ETSI EN 302 665 [i.10]. A schematic description including interfaces is displayed in Figure 1. It consists of the following DCC components: • DCC_ACC located in the Access as specified in ETSI TS 102 687 [i.2]; • DCC_NET located in...
0275f956739678ab7d2902a82613d6a6
101 612
5 Architecture
0275f956739678ab7d2902a82613d6a6
101 612
5.1 Introduction
The primary objective for the DCC algorithm in the ITS-S is to calculate based on input parameters the currently allowed channel resource limit. Four different configurations of the DCC architecture have been identified depending on if the ITS-S is operating on a single channel or multiple channels and if only local or...
0275f956739678ab7d2902a82613d6a6
101 612
5.2 Configurations of the DCC architecture
5.2.1 DCC configuration 1 In DCC configuration 1, single channel and local DCC input parameters are present. The calculation of available resources of the channel is only based on local CL measurements, transformed to internal DCC parameters and distributed to the DCC_CROSS_Facilities and DCC_CROSS_Access functions. Th...
0275f956739678ab7d2902a82613d6a6
101 612
5.3 Communication stack
0275f956739678ab7d2902a82613d6a6
101 612
5.3.1 Facilities layer
The facilities layer DCC functions (DCC_FAC), included in the facilities depicted in Figure 6, control the load generated by facilities service messages (e.g. CAM and DENM) per channel. The message rate is either controlled by indicating the maximum rate to the facilities/applications, or by dropping packets that overl...
0275f956739678ab7d2902a82613d6a6
101 612
5.3.2 Networking and transport layer
The role of the networking and transport layer DCC functions (DCC_NET), depicted in Figure 7, is to provide global DCC parameters and to disseminate the local DCC parameters to other ITS-S. These DCC functions also enable multichannel operation. The networking and transport layer DCC functions are described in Table 3....
0275f956739678ab7d2902a82613d6a6
101 612
5.3.3 Access layer
0275f956739678ab7d2902a82613d6a6
101 612
5.3.3.1 Gatekeeper architecture
A DCC gatekeeper component (DCC_ACC) is located at the access layer. It performs traffic shaping and restricts the access to a particular channel based on the output from the DCC algorithm. An overview is shown in Figure 8 and details are given Table 4 and shown in Figure 9. Figure 8: Access Layer DCC interactions Figu...
0275f956739678ab7d2902a82613d6a6
101 612
5.3.3.2 Traffic class prioritization
The role of the traffic class prioritization is to select the DCC queues according to the traffic class per channel. The TC corresponding to the highest EDCA access class will be mapped to the highest priority DCC queue, so that it is dequeued by the DCC flow control first. More details are provided in Figure 10 and in...
0275f956739678ab7d2902a82613d6a6
101 612
5.3.3.3 DCC queues
If the needed channel resources exceed the available resources messages are queued. If the queuing time of the message exceeds its lifetime, the message is dropped and an indication including the queue from which the message was removed may be given to the management entity. This information can be used to inform the f...
0275f956739678ab7d2902a82613d6a6
101 612
5.3.3.4 DCC power control
The DCC power control function determines the output power level of the transmitter, based on the values provided by the DCC_CROSS_Access function and by the interference mitigation techniques described in ETSI TS 102 792 [i.14]. Details are provided in Figure 12 and in Table 7. Packets leaving the DCC queues according...
0275f956739678ab7d2902a82613d6a6
101 612
5.3.3.5 DCC flow control
The DCC flow control function performs data traffic shaping as specified in ETSI TS 102 687 [i.2] based on the inter frame space parameter Toff provided by the DCC_CROSS_Access function and the interference mitigation function respectively (ETSI TS 102 792 [i.14]). When Toff times out, the next message starting from th...
0275f956739678ab7d2902a82613d6a6
101 612
5.3.3.6 ITS-G5 radio
The ITS-G5 radio represents the functionalities of the IEEE 802.11-2012 as specified in [i.1], it is the interface to the ITS-G5 wireless medium. More details are provided in Figure 13 and in Table 9. Figure 13: ITS-G5 radio Table 9: ITS-G5 radio functionality ITS-G5 radio functionality Type Name from and to Descriptio...
0275f956739678ab7d2902a82613d6a6
101 612
5.3.4 Management plane
0275f956739678ab7d2902a82613d6a6
101 612
5.3.4.1 DCC_CROSS component
The DCC_CROSS component is located in the management plane as shown in Figure 1. This component provides the following functions (see also Figure 5): • DCC_CROSS_Facilities (see clause 5.3.4.2), • DCC_CROSS_Net&Tr (see clause 5.3.4.3), • DCC parameter evaluation (see clause 5.3.4.4), • DCC_CROSS_Access (see clause 5.3....
0275f956739678ab7d2902a82613d6a6
101 612
5.3.4.2 DCC_CROSS_Facilities
The role of the DCC_CROSS_Facilities function is to indicate the availability of the radio resources to the registered applications (running various subsequent application-level services) and all required facilities services. Based on the output from the DCC parameter evaluation function and the DCC_CROSS_Net&Tr functi...
0275f956739678ab7d2902a82613d6a6
101 612
5.3.4.3 DCC_CROSS_Net&Tr
The role of the DCC_CROSS_Net&Tr is to provide DCC parameters measured by neighbouring ITS-S to the DCC parameter evaluation function. Additionally, the DCC_CROSS_Net&Tr influences data offloading to other radio channels based on the internal DCC parameters. More details are provided in Figure 15 and in Table 11. Figur...
0275f956739678ab7d2902a82613d6a6
101 612
5.3.4.4 DCC parameter evaluation
The DCC parameter evaluation function determines the channel resources available for one ITS-S based on local and global DCC parameters. It provides this information subsequently to all DCC_CROSS functions and it also provides global DCC TX parameters to be disseminated to neighbouring ITS-S. More details are provided ...
0275f956739678ab7d2902a82613d6a6
101 612
5.3.4.5 DCC_CROSS_Access
The DCC_CROSS_Access function determines the message rate limit. It takes the internal DCC parameters as well as the length of the message as input and adjusts the flow control parameter Toff. Optionally, it can also reduce the TX power level to shorten the radio range in road traffic scenarios with very high vehicle d...
0275f956739678ab7d2902a82613d6a6
101 612
5.3.4.6 CBR evaluation
The CBR evaluation function is in charge of harmonize the CL values obtained from diffe CBR according to ETSI TS 102 687 [i.2]. Mo Figur ETSI ETSI TR 101 6 27 Accordingly, a separate rule is necessary to avoid a con CC flow control. The DCC_CROSS_Facilities function of multiple transmissions of such high priority messa...
0275f956739678ab7d2902a82613d6a6
101 612
5.4 Channel load limits
0275f956739678ab7d2902a82613d6a6
101 612
5.4.1 Basic system level assumptions
The present document does not aim at specifying a specific DCC algorithm, but rather designs guidelines to be fulfilled by any DCC algorithm to allocate channel resources efficiently and fairly to each ITS-S. From a system level point of view the objective of DCC is to allow as many ITS-S as possible to reliably exchan...
0275f956739678ab7d2902a82613d6a6
101 612
5.4.2 Test procedure concept
The behaviour of a DCC implementation can be tested by a RF black-box test procedure. An ITS-S implementing a typical DCC algorithm is subject to a given CL and reacts by adjusting its TX parameters. In such test, the appropriate CL is reproduced by one or multiple ITS-S sending modulated RF signals (emulating data pac...
0275f956739678ab7d2902a82613d6a6
101 612
6 Evaluation metrics
0275f956739678ab7d2902a82613d6a6
101 612
6.1 Introduction
Standardized evaluation metrics are critical for a fair and comparable evaluation of the performance of a system. The performance of DCC algorithms for ITS-S using ITS-G5 may be evaluated with communication, networking or application-level metrics. Most of the metrics are transmitter-centric and represents the impact o...
0275f956739678ab7d2902a82613d6a6
101 612
6.2 Metrics measurement
The previously described metrics may be measured according to the methodology described in Table 15. 0,0 200,0 400,0 600,0 800,0 1000,0 1200,0 0,50 0,52 0,54 0,56 0,58 0,60 0,62 0,64 0,66 0,68 0,70 0,72 0,74 0,76 0,78 0,80 0,82 0,84 ToffLim it[m s] CBRLimit Ton = 0,4 ms Ton = 0,5 ms Ton = 0,6 ms Ton = 0,7 ms Ton = 0,8 ...
0275f956739678ab7d2902a82613d6a6
101 612
7 Simulation scenarios & parameters
0275f956739678ab7d2902a82613d6a6
101 612
7.1 Scenarios definition
The present clause describes the link between input parameters, mobility scenarios, DCC algorithms and output metrics. The aim of the present clause is to provide high level description of the objectives of the simulation evaluations. The scenarios are classified in four categories, each aiming at evaluating one testin...
0275f956739678ab7d2902a82613d6a6
101 612
7.3 Mobility scenarios
7.3.1 Homogeneous ITS-S 7.3.1.1 General As illustrated in Table 16, the objective of thi algorithms. The described scenarios are there assumed to be static. In this category of scena not impact any DCC algorithm. Scalability requires a high density of vehicles agnostic, a generic scenario for scalability ev corresponds...
0275f956739678ab7d2902a82613d6a6
101 612
7.3.2 Heterogeneous scenarios
0275f956739678ab7d2902a82613d6a6
101 612
7.3.2.1 Heterogeneous highway
In this scenario, the same average density classes as indicated in Table 18 are kept as much as possible. But as vehicles move, a limited heterogeneity in the local vehicular density may be observed. It corresponds to a real highway environment and is illustrated in Figure 27, where the specific configuration parameter...
0275f956739678ab7d2902a82613d6a6
101 612
7.3.2.2 Heterogeneous clustered highway
This scenario aims at testing DCC responsiveness (i.e. how quickly DCC algorithms may response and re-converge after sudden changes in CL conditions). It extends the highway scenario, keeps the contra-flow as sparse, but introduces clusters/platoons of vehicles on the direct flow. DCC algorithms are evaluated on the co...
0275f956739678ab7d2902a82613d6a6
101 612
7.3.2.3 Heterogeneous elevated highway
The elevated highway scenario is in configuration very similar to the heterogeneous highway. It corresponds to one highway configured to be dense and a second highway crossing over the first that is configured to be sparse. Parameters from Table 20 are used by considering 3 lanes and 2 directions each per highway.
0275f956739678ab7d2902a82613d6a6
101 612
7.3.3 Weak LOS scenarios
0275f956739678ab7d2902a82613d6a6
101 612
7.3.3.1 Blind intersection (static obstacles)
The objective of this scenario is to test the resilience of the DCC algorithms to static NLOS scenario. In particular, it tests if the NLOS conditions do not lead any DCC algorithms to violate safety conditions, such as reducing the TX power too low and detecting an approaching vehicle too late. Weak LOS conditions are...
0275f956739678ab7d2902a82613d6a6
101 612
7.3.3.2 Blind highway (mobile obstacles)
The objective of this scenario is to test the resilience of the DCC mechanisms in mobile NLOS situation with significant hidden node conditions. This scenario can be adapted to the homogeneous or heterogeneous highway scenarios. The scenario aims at evaluating the impact of mobile NLOS situations created by vehicles sh...
0275f956739678ab7d2902a82613d6a6
101 612
7.5 General functions
The present clause describes controllable and measurable DCC reactions, when a DCC algorithm is subject to a particular trigger. Triggers are related to particular application-related contexts and are listed in Table 25, unless a particular placeholder for application-based DCC function is defined. Table 25: General DC...
0275f956739678ab7d2902a82613d6a6
101 612
7.6 Key Performance Indicators
The DCC algorithms implemented according to the specifications of the present document may have different behaviour and be difficult to compare. Accordingly, the DCC algorithms are evaluated on their capabilities to fulfil Key Performance Indicators (KPIs). DCC KPIs are specific for each layer of the ETSI ITS architect...
0275f956739678ab7d2902a82613d6a6
101 612
8 Initial simulation results
8.1 Introduction The present clause evaluates different DCC implementations fulfilling the guidelines identified in the present document to fit the minimum DCC KPI. ETSI ETSI TR 101 612 V1.1.1 (2014-09) 44 8.2 Performance evaluation of reactive and linear adaptive DCC mechanisms 8.2.1 General As described in Annex A, D...
0275f956739678ab7d2902a82613d6a6
101 612
8.2.3 Performance evaluation results
The performance results of the reactive and the linear adaptive DCC are shown separately in two figures. Figure 31 illustrates the CL as function of the simulation time. Although vehicles are static, noise in the CL measurement (imperfections) as well as instability and chain reactions on the DCC state transitions migh...
567bd1d7aafa8c6253f90e5b28379e56
101 611
1 Scope
The present document is the validation report of the FNTP, FSAP and IICP conformance tests and it provides statistics of executed and validated FNTP, FSAP and IICP conformance tests. The information provided has been produced by validation against two prototype implementations from industry. Furthermore, identified iss...
567bd1d7aafa8c6253f90e5b28379e56
101 611
2 References
References are either specific (identified by date of publication and/or edition number or version number) or non-specific. For specific references,only the cited version applies. For non-specific references, the latest version of the referenced document (including any amendments) applies. Referenced documents which ar...