{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,1]],"date-time":"2026-04-01T21:36:06Z","timestamp":1775079366854,"version":"3.50.1"},"reference-count":22,"publisher":"Wiley","license":[{"start":{"date-parts":[[2021,4,15]],"date-time":"2021-04-15T00:00:00Z","timestamp":1618444800000},"content-version":"unspecified","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61873112"],"award-info":[{"award-number":["61873112"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Scientific Programming"],"published-print":{"date-parts":[[2021,4,15]]},"abstract":"<jats:p>Aiming at the diversified requirements of network application QoS (Quality of Service) in the terminal equipment of Internet of Vehicles, this paper proposes a distributed congestion control strategy based on harmony search algorithm and the Throughput Evaluation Priority Adjustment Model (TEPAM) to ensure real-time transmission of high-priority data messages related to security applications. Firstly, the channel usage rate is periodically detected and the congestion is judged; then, in order to minimize delay and delay jitter as the goal, harmony search algorithm is utilized to perform global search to obtain a better solution for the transmission range and transmission rate. Secondly, packet priority and the TEPAM are applied to indicate the sending right of each packet. The data message priority and throughput percentage factor are used to express the transmission weight of each data message. Besides, the real-time evaluation of path state in MPTCP is carried out by the batch estimation theory model, which realizes the on-demand dynamic adjustment of the network congestion time window. Finally, SUMO, MOVE, and NS2 tools are used to create a VANET-like environment to evaluate the performance of the proposed congestion control strategy. Experimental results show that the proposed method is superior to other three methods in the four indicators of average delay time, average transmission rate, number of retransmissions, and packet loss rate compared with other advanced methods.<\/jats:p>","DOI":"10.1155\/2021\/5519492","type":"journal-article","created":{"date-parts":[[2021,4,15]],"date-time":"2021-04-15T21:01:29Z","timestamp":1618520489000},"page":"1-9","source":"Crossref","is-referenced-by-count":5,"title":["A Distributed Congestion Control Strategy Using Harmonic Search Algorithm in Internet of Vehicles"],"prefix":"10.1155","volume":"2021","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-0945-2826","authenticated-orcid":true,"given":"Meiyu","family":"Pang","sequence":"first","affiliation":[{"name":"School of Internet of Things Engineering, Wuxi Taihu University, Wuxi, Jiangsu 214064, China"},{"name":"Jiangsu Key Construction Laboratory of IoT Application Technology, Wuxi, Jiangsu 214064, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4050-0299","authenticated-orcid":true,"given":"Jianing","family":"Shen","sequence":"additional","affiliation":[{"name":"School of Internet of Things Engineering, Wuxi Taihu University, Wuxi, Jiangsu 214064, China"},{"name":"Jiangsu Key Construction Laboratory of IoT Application Technology, Wuxi, Jiangsu 214064, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6137-4821","authenticated-orcid":true,"given":"Lixiu","family":"Wu","sequence":"additional","affiliation":[{"name":"School of Internet of Things Engineering, Wuxi Taihu University, Wuxi, Jiangsu 214064, China"},{"name":"Jiangsu Key Construction Laboratory of IoT Application Technology, Wuxi, Jiangsu 214064, China"}]}],"member":"311","reference":[{"key":"1","doi-asserted-by":"publisher","DOI":"10.1049\/iet-net.2017.0225"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2015.07.009"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.3390\/electronics8050540"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1007\/s11235-011-9428-1"},{"key":"5","first-page":"1","article-title":"Performance analysis of a time headway based rate control algorithm for VANET safety applications","author":"M. Javed"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2009.2017545"},{"issue":"3","key":"7","first-page":"276","article-title":"The RSU access problem based on evolutionary game theory for VANET","volume":"30","author":"D. Wu","year":"2013","journal-title":"International Journal of Distributed Sensor Networks"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1080\/15389588.2017.1303682"},{"issue":"5","key":"9","first-page":"1","article-title":"Lane density optimisation of automated vehicles for highway congestion control","volume":"77","author":"M. Ramezani","year":"2019","journal-title":"Transportmetrica B: Transport Dynamics"},{"issue":"11","key":"10","first-page":"1","article-title":"Adaptive offloading with MPTCP for unmanned aerial vehicle surveillance system","volume":"46","author":"W. S. Jung","year":"2018","journal-title":"Annals of Telecommunications"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1016\/j.ymssp.2016.03.004"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1109\/LCOMM.2017.2762686"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1109\/MCOMSTD.2017.1700014"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1002\/ett.3296"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1007\/s11276-016-1364-2"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1016\/S1005-8885(17)60231-0"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2014.09.005"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1109\/jsyst.2014.2375314"},{"key":"19","doi-asserted-by":"publisher","DOI":"10.1166\/jctn.2017.6738"},{"issue":"1","key":"20","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/0169-7552(89)90019-6","article-title":"Analysis of the increase and decrease algorithms for congestion avoidance in computer networks","volume":"17","author":"D. M. Chiu","year":"2018","journal-title":"Computer Networks & ISDN Systems"},{"key":"21","doi-asserted-by":"publisher","DOI":"10.1109\/MITS.2017.2743202"},{"key":"22","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2018.2886699"}],"container-title":["Scientific Programming"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/downloads.hindawi.com\/journals\/sp\/2021\/5519492.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/sp\/2021\/5519492.xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/sp\/2021\/5519492.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,15]],"date-time":"2021-04-15T21:01:37Z","timestamp":1618520497000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.hindawi.com\/journals\/sp\/2021\/5519492\/"}},"subtitle":[],"editor":[{"given":"Chenxi","family":"Huang","sequence":"additional","affiliation":[]}],"short-title":[],"issued":{"date-parts":[[2021,4,15]]},"references-count":22,"alternative-id":["5519492","5519492"],"URL":"https:\/\/doi.org\/10.1155\/2021\/5519492","relation":{},"ISSN":["1875-919X","1058-9244"],"issn-type":[{"value":"1875-919X","type":"electronic"},{"value":"1058-9244","type":"print"}],"subject":[],"published":{"date-parts":[[2021,4,15]]}}}