Results 71 to 80 of about 1,132 (190)

Comparing the Use of Simu5G and 5G‐Sim‐V2I/N Modules When Analysing the Edge Computing Resource Management Efficiency

open access: yesModelling and Simulation in Engineering, Volume 2025, Issue 1, 2025.
Performance analysis of smart edge computing orchestration algorithms should be done using a realistic urban simulation environment wherein mobile users are accessing their edge services using a readily available 5G network. In this paper, we investigate the influence of using two different 5G simulation frameworks, which are provided as readily ...
Cristina Bernad   +6 more
wiley   +1 more source

Disseminating a Fair Emergency Message With V2V Communication Technology in VANET

open access: yesSecurity and Communication Networks, Volume 2025, Issue 1, 2025.
Vehicular ad hoc networks (VANETs) are nodes moving at a high speed compared to mobile ad hoc networks (MANETs). Network‐connected nodes can exchange safety or nonsafety messages within themselves or other infrastructures, such as vehicle‐to‐vehicle (V2V) or vehicle‐to‐everything (V2X).
Nega Firdissa   +6 more
wiley   +1 more source

DSRC versus 4G-LTE for Connected Vehicle Applications: A Study on Field Experiments of Vehicular Communication Performance

open access: yesJournal of Advanced Transportation, 2017
Dedicated short-range communication (DSRC) and 4G-LTE are two widely used candidate schemes for Connected Vehicle (CV) applications. It is thus of great necessity to compare these two most viable communication standards and clarify which one can meet the
Zhigang Xu   +4 more
doaj   +1 more source

Design and development of multiband PIFA antenna for vehicular LTE/5G and V2X communication

open access: yesEURASIP Journal on Wireless Communications and Networking, 2023
This paper aims to introduce a custom-designed multiband planar inverted-F antenna (PIFA) suitable for automotive applications in LTE/5G schemes operating under 6 GHz, as well as Vehicle-to-Everything (V2X) communications.
Amruta A. Nikam, Rupali B. Patil
doaj   +1 more source

A literature review on V2X communications security: Foundation, solutions, status, and future

open access: yesIET Communications, Volume 18, Issue 20, Page 1683-1715, December 2024.
The article first introduces the development history of the past Internet of Vehicles(IoV), summarizes some common V2X security threats, describes the development and application of the SM commercial algorithm in recent years, and finally, statistics and introduces the part of the development process of the security protocols currently used in IoV ...
Zuobin Ying   +3 more
wiley   +1 more source

Dynamic and efficient device collaborations in 5G‐advanced and 6G networks

open access: yesIET Communications, Volume 18, Issue 19, Page 1437-1450, December 2024.
Collaborative transmission, comprising multiple devices owned by a single user, is progressively evolving into an essential strategy to meet the stringent demands of burgeoning collaborative scenarios in 5G‐advanced and 6G networks. This paper proposes three novel use cases for device collaboration, namely data duplication, data splitting and wireless ...
Xianghui Han   +5 more
wiley   +1 more source

QoE-Based Resource Allocation for Heterogeneous Multi-Radio Communication in Software-Defined Vehicle Networks

open access: yesIEEE Access, 2018
Recently, vehicle to everything (V2X) communications have drawn a significant amount of attention. Emerging V2X applications demand the efficient utilization of heterogeneous access technologies, such as long-term evolution (LTE), Wi-Fi, and dedicated ...
Wei Huang   +5 more
doaj   +1 more source

Dynamic hierarchical intrusion detection system for internet of vehicle on edge computing platform

open access: yesIET Communications, Volume 18, Issue 20, Page 1778-1794, December 2024.
Classical intrusion detection systems struggle with the dynamic nature and resource limitations of the internet of vehicles (IoV). The dynamic hierarchical intrusion detection framework uses hierarchical clustering and edge computing for better protection and localized danger assessment in IoV.
Syed Sabir Mohamed S   +3 more
wiley   +1 more source

Performance of Sensing-Based Semi-Persistent Scheduling (SPS) in LTE-V2X Release 14 Distributed Mode [PDF]

open access: yes, 2019
This project will study the different possibilities of access technologies based on LTE in order to provide communications V2V and V2I. This evaluation will be performed by developing a simulator and studying its main communication parameters.The initial
Lopez, Leandro Miguel Wong
core  

Risk‐based maximum speed advisory system for driving safety of connected and automated bus

open access: yesIET Intelligent Transport Systems, Volume 18, Issue S1, Page 2896-2920, December 2024.
This study proposes risk‐based maximum speed advisory system, which provides the maximum advisory speed of connected and automated bus to reduce its potential risk, based on a cloud‐based traffic management centre with cooperative intelligent transportation systems. An evaluation study is conducted by comparing the performance of the proposed system to
Sehyun Tak, Sari Kim, Donghoun Lee
wiley   +1 more source

Home - About - Disclaimer - Privacy