Results 71 to 80 of about 50,518 (236)

Multi‐Objective Energy‐Efficient Clustering Protocol for Wireless Sensor Networks: An Approach Based on Metaheuristic Algorithms

open access: yesIET Wireless Sensor Systems, Volume 15, Issue 1, January/December 2025.
This paper proposes a novel hybrid clustering protocol to address the challenges arising from the resource‐constrained nature of sensor nodes in wireless sensor networks (WSNs). The primary objective of this study is to optimise energy consumption, thereby extending network lifetime and enhancing scalability.
Mohamadhosein Behzadi   +3 more
wiley   +1 more source

Stimulating Cooperation in Self-Organized Vehicular Networks

open access: yes, 2010
A Vehicular Ad-hoc NETwork (VANET) is a special form of Mobile Ad-hoc Network designed to provide communications among nearby vehicles and between vehicles and nearby fixed roadside equipment. Its main goal is to improve safety and comfort for passengers,
Caballero-Gil, C.   +3 more
core   +1 more source

Prediction Based Efficient Multi-hop Clustering Approach with Adaptive Relay Node Selection for VANET

open access: yesJournal of Communications, 2020
In recent years to improve the conventional vehicular ad-hoc network performance an intelligent incorporated vehicle are introduced. Designing of prediction based multi-hop clustering approach for VANET is a major challenge due to the dynamic change of ...
S. Rashid   +3 more
semanticscholar   +1 more source

Fuzzy logic‐based trusted routing protocol using vehicular cloud networks for smart cities

open access: yesExpert Systems, Volume 42, Issue 1, January 2025.
Abstract Due to the characteristics of vehicular ad hoc networks, the increased mobility of nodes and the inconsistency of wireless communication connections pose significant challenges for routing. As a result, researchers find it to be a fascinating topic to study.
Ramesh Kait   +5 more
wiley   +1 more source

DDoS Detection Mechanism Using Trust-Based Evaluation System in VANET

open access: yesIEEE Access, 2019
It is essential for Vehicular Ad-hoc networks (VANETs) to have reliable vehicles for communication with vehicles. VANET is dynamical network where the vehicles frequently alter their place.
M. Poongodi   +4 more
semanticscholar   +1 more source

Customized Generative Adversarial Imitation Learning for Driving Behavior Modeling in Traffic Simulation

open access: yesJournal of Advanced Transportation, Volume 2025, Issue 1, 2025.
Driving behavior modeling is a crucial yet challenging task in the development of traffic simulation systems. Advances in machine learning and data‐driven vehicle trajectory extraction technologies have significantly advanced research in this area.
Zhongyuan Zhu   +7 more
wiley   +1 more source

A Comprehensive Survey on VANET Security Services in Traffic Management System

open access: yesWireless Communications and Mobile Computing, 2019
Recently, vehicular ad hoc networks (VANETs) embark a great deal of attention in the area of wireless and communication technology and are becoming one of the prominent research areas in the intelligent transportation system (ITS) because they provide ...
Muhammad Sameer Sheikh, Jun Liang
semanticscholar   +1 more source

A Novel Multimodal Collaborative Drone-Assisted VANET Networking Model

open access: yesIEEE Transactions on Wireless Communications, 2020
Drones can be used for many assistance roles in complex communication scenarios and play as the aerial relays to support terrestrial communications. Although a great deal of emphasis has been placed on the drone-assisted networks, existing work focuses ...
Na Lin   +5 more
semanticscholar   +1 more source

Proactive Distributed Emergency Response With Heterogeneous Tasks Allocation

open access: yesInternational Journal of Distributed Sensor Networks, Volume 2025, Issue 1, 2025.
Traditionally, traffic incident management (TIM) programs coordinate the deployment of emergency resources to immediate incident requests without accommodating the interdependencies on incident evolutions in the environment. However, ignoring these inherent interdependencies while making current deployment decisions is shortsighted, and the resulting ...
Justice Darko   +2 more
wiley   +1 more source

A Contribution to Secure the Routing Protocol "Greedy Perimeter Stateless Routing" Using a Symmetric Signature-Based AES and MD5 Hash

open access: yes, 2011
This work presents a contribution to secure the routing protocol GPSR (Greedy Perimeter Stateless Routing) for vehicular ad hoc networks, we examine the possible attacks against GPSR and security solutions proposed by different research teams working on ...
Erritali, Mohammed   +2 more
core   +1 more source

Home - About - Disclaimer - Privacy