Towards efficient data collection mechanisms in the vehicular ad hoc networks
B Pourghebleh… - International Journal of …, 2019 - Wiley Online Library
Recently, the fast growth of communication technology has led to the design and
implementation of different types of networks in different environments. One of these …
implementation of different types of networks in different environments. One of these …
[PDF][PDF] Multi layer perception type artificial neural network based traffic control
JM Rizwan, PN Krishnan, R Karthikeyan… - Indian Journal of …, 2016 - researchgate.net
Real time traffic control is a main criteria of the urban traffic signal control system, and giving
viable ongoing traffic signal control for a substantial complex traffic system is a testing issue …
viable ongoing traffic signal control for a substantial complex traffic system is a testing issue …
[PDF][PDF] A survey on routing protocols for vehicular ad-hoc networks
B Marzak, H Toumi… - Indian Journal …, 2016 - sciresol.s3.us-east-2.amazonaws …
Objectives: To analyze the performance and to determine the most suitable routing type, to
ensure the best efficiency in the VANET. Methods/Statistical analysis: Vehicular Ad Hoc …
ensure the best efficiency in the VANET. Methods/Statistical analysis: Vehicular Ad Hoc …
Improved Soar's Intelligent Agents
NK Malik, D Saxena, VR Singh - Proceedings of the International …, 2016 - dl.acm.org
Cognitive Architectures provide infrastructure and framework for design of Intelligent Agents
in manner similar to human beings. Soar is one of the popular cognitive architecture …
in manner similar to human beings. Soar is one of the popular cognitive architecture …
[PDF][PDF] Geo-Reactive: An efficient and reliable hybrid routing protocol for VANETs
PS Darisini, NS Kumari - Indian Journal …, 2015 - sciresol.s3.us-east-2.amazonaws …
Objective: The main objective of this paper is to find an efficient and reliable path for routing
data packets in vehicular ad hoc networks using hybrid routing. The hybrid routing protocol …
data packets in vehicular ad hoc networks using hybrid routing. The hybrid routing protocol …
The Effect of Vehicles Speed on the Performance of VANET Protocol
OA Qasim, DM Mahdi, MS Noori, RR Ali… - 2023 1st …, 2023 - ieeexplore.ieee.org
At present, ad hoc networks are getting a lot of attention, because they have many features
that differ from the rest of the networks and because they are technically advanced. In …
that differ from the rest of the networks and because they are technically advanced. In …
A conceptual framework for improving the software security of self-driven vehicles
Self-driven vehicles are becoming popular, attacker are trying exploit the weakness of the
upcoming technologies which effects the people interest into this growing industries as there …
upcoming technologies which effects the people interest into this growing industries as there …
[PDF][PDF] Cluster Head Selection Procedure using Priority based Technique in VANET
A Upadhyay, M Sindhwani - Indian Journal of Science and …, 2016 - academia.edu
Objectives: To improve in the MAC protocol channel sensing mechanism for data
transmission from source to destination to improve the throughput and overcome the delay …
transmission from source to destination to improve the throughput and overcome the delay …
[PDF][PDF] Reputation based proposed scheme to ensure reliable decision by fusion centre
RLI Batra - Indian Journal of Science and …, 2016 - sciresol.s3.us-east-2.amazonaws …
Objectives: Dynamic spectrum access is the promising feature of Cognitive Radio (CR).
When Spectrum sensing is executed in a cooperative manner, shadowing and fading get …
When Spectrum sensing is executed in a cooperative manner, shadowing and fading get …
[PDF][PDF] Signature based Authentication Scheme for Vehicle Ad-hoc Network
A Aravind, WR Helen - Indian Journal …, 2016 - sciresol.s3.us-east-2.amazonaws …
Objectives: To embed security inVehicle Ad-Hoc Network (VANET). Methods: Anonymous
authentication is achieved using group signature. The current authentication scheme …
authentication is achieved using group signature. The current authentication scheme …