Results 61 to 70 of about 51,839 (288)

An Efficient Services Placement for Optimizing the Energy Consumption in Volunteer Cloud Computing

open access: yesConcurrency and Computation: Practice and Experience, Volume 37, Issue 3, 1 February 2025.
ABSTRACT Volunteer Cloud computing, like traditional Cloud computing, has gained significant importance due to its ability to harness resources from individual personal machines, contributed voluntarily by their owners. In this paradigm, personal machine resources are shared voluntarily by their owners.
Omar Ben Maaouia   +3 more
wiley   +1 more source

Performance Analysis of DSR and TORA Model Routing Protocols In Vehicular Ad Hoc Network

open access: yesInternational Journal of Electrical, Energy and Power System Engineering, 2020
Pekanbaru city is a large area, therefore traffic congestion often occurs due to the density of society’s vehicles. From this problem, it is needed a technology that can exchange information between vehicles.
Linna Oktaviana Sari   +3 more
doaj   +1 more source

Detection of malicious data in vehicular ad-hoc networks for traffic signal control applications

open access: yes, 2016
Effective applications of vehicular ad hoc networks in traffic signal control require new methods for detection of malicious data. Injection of malicious data can result in significantly decreased performance of such applications, increased vehicle ...
Bernas, Marcin, Placzek, Bartlomiej
core   +1 more source

SAI: safety application identifier algorithm at MAC layer for vehicular safety message dissemination over LTE VANET networks [PDF]

open access: yes, 2018
Vehicular safety applications have much significance in preventing road accidents and fatalities. Among others, cellular networks have been under investigation for the procurement of these applications subject to stringent requirements for latency ...
Ansari, Shuja   +5 more
core   +4 more sources

Multihop-Cluster-Based IEEE 802.11p and LTE Hybrid Architecture for VANET Safety Message Dissemination [PDF]

open access: yesIEEE Transactions on Vehicular Technology, 2016
Several vehicular ad hoc network (VANET) studies have focused on communication methods based on IEEE 802.11p, which forms the standard for wireless access for vehicular environments.
Seyhan Uçar, S. Ergen, Öznur Özkasap
semanticscholar   +1 more source

Classifications and Analysis of Caching Strategies in Information‐Centric Networking for Modern Communication Systems

open access: yesEngineering Reports, Volume 7, Issue 2, February 2025.
The graphical abstract illustrates an in‐depth discussion of ICN features, architectures, and naming schemes. It presents the categories of caching, followed by an examination of existing caching strategies, and explores the role of caching in diverse applications, including IoT, IoV, mobility, edge computing, and fog computing.
Firdous Qaiser   +6 more
wiley   +1 more source

A Secure Enhanced Non-Cooperative Cognitive Division Multiple Access for Vehicle-to-Vehicle Communication

open access: yesSensors, 2020
The growth of the Internet has led to the increasing usage of smart infotainment applications on the vehicular ad-hoc network (VANET). Preserving privacy and security regarding the provision of smart infotainment applications while on the go is most ...
Mohammed Abdulhakim Al-Absi   +2 more
doaj   +1 more source

On the efficiency of secure beaconing in VANETs [PDF]

open access: yesProceedings of the third ACM conference on Wireless network security, 2010
Direct inter-vehicle communication enables numerous safety applications like intersection collision warning. Beacons - periodic one-hop link-layer broadcast messages containing, e.g., location, heading, and speed - are the basis for many such applications. For security, current work often requires all messages to be signed and to carry a certificate to
Schoch, Elmar, Kargl, Frank
openaire   +2 more sources

Dynamic mobility and handover management in software‐defined networking‐based fifth‐generation heterogeneous networks

open access: yesInternational Journal of Network Management, Volume 35, Issue 1, January/February 2025.
This article proposes an optimal next cell selection technique for users in the software‐defined heterogeneous network to tackle the challenges of handover and mobility management. The technique uses linear programming (LP) to facilitate optimal cell selection and reduce the number of user handovers based on multiple parameters, including user ...
Adil Khan   +5 more
wiley   +1 more source

A Review of Existence Intrusions Detection-Based Machine Learning Datasets of Future Generation Networks

open access: yesNTU Journal of Engineering and Technology
"Innovative technologies of future generation networks such as Cyber-Physical System (CPS), Mobile Ad Hoc Network (MANET), Vehicular Ad-Hoc Network (VANET), Internet of Things (IOT), and Wireless network commonly known as Wi-Fi have emerged, which ...
Nora Najem, Razan Abdulhammed
doaj   +1 more source

Home - About - Disclaimer - Privacy