Search Results - (( based evaluation tree algorithm ) OR ( vanet communication from algorithm ))
Search alternatives:
- vanet communication »
- communication from »
- based evaluation »
- evaluation tree »
- tree algorithm »
- from algorithm »
-
1
Enhancing a cluster-based TDMA MAC protocol for vehicle-to-vehicle communications / Abubakar Bello Tambawal
Published 2020“…A dynamic time slot allocation strategy using a binary tree algorithm has been proposed to prevent vehicles from the adjacent clusters to reserve the same time slot. …”
Get full text
Get full text
Get full text
Thesis -
2
Secure communication in Vehicular ad hoc network using modified ad hoc on demand distance vector
Published 2018“…Since AODV has no security mechanisms, malicious nodes can perform many attacks just by not behaving according to the AODV rules, so that our framework can provide secure communication in VANET via modifying AODV. Our framework categorises the requirements for the VANET protection design via modifying AODV into three: Insure the Availability of VANET and its Services Algorithm (IAVSA), Protect Data Dissemination Algorithm (PDDA), and Secure Vehicles Authentication Algorithm (SVAA). …”
Get full text
Get full text
Get full text
Thesis -
3
LI-AODV: lifetime improving AODV routing for detecting and removing black-hole attack from VANET
Published 2017“…To prevent the network from Black hole attack we propose a new security algorithm called HMAC-SHA3-384 which is a combination of SHA3-384 and HMAC. …”
Get full text
Get full text
Get full text
Article -
4
Enhanced multi-hop mechanism in vehicular communication system using swarm algorithm
Published 2021“…In VANET, communication occurs between vehicles and the infrastructures. …”
Get full text
Get full text
Get full text
Get full text
Proceedings -
5
Adaptive manet OLSR routing protocol for optimal route selection in high dynamic network
Published 2020“…To provide the necessary robustness, a new Cluster-based Adoptive Cooperative Algorithm (CACA) for VANET is introduced to improve the scalability of the network and reduce control overhead. …”
Get full text
Get full text
Thesis -
6
Efficient and stable routing algorithm based on user mobility and node density in urban vehicular network
Published 2016“…Simulation results reveal that the proposed ESRA-MD algorithm shows remarkable improvement in terms of delivery ratio, delivery delay, and communication overhead.…”
Get full text
Get full text
Article -
7
Hybrid LTE-VANETs Based Optimal Radio Access Selection
Published 2018“…Hence, the selection of access to any radio access technology (RAT) from a variety of RATs by a user for onward association has been intensively investigated by vehicular ad hoc network (VANET). …”
Get full text
Get full text
Get full text
Book Chapter -
8
A lightweight and secure online/offline cross-domain authentication scheme for VANET systems in Industrial IoT
Published 2021“…However, in various domains, such as industrial wireless scenarios, small cell domains, and vehicular ad hoc networks, an efficient and stable authentication algorithm is required (VANET). Specifically, IoT vehicles deal with vast amounts of data transmitted between VANET entities in different domains in such a large-scale environment. …”
Get full text
Get full text
Article -
9
Evaluation of efficient vehicular ad hoc networks based on a maximum distance routing algorithm
Published 2016“…To address these issues, a new dependable routing algorithm is proposed, which utilizes a wireless communication system between vehicles in urban vehicular networks. …”
Get full text
Get full text
Article -
10
Implement routing protocols for VANET in a one-way environment
Published 2024“…One of the key issues in a VANET is designing a routing protocol, which aids in the delivery of reliable and efficient packets from node to node. …”
Conference Paper -
11
Clustering Based Affinity Propagation In Vanets : Taxonomy And Opportunity Of Research
Published 2019“…Vehicular Adhoc Networks (VANETs) represents a developed type of an effective communication technology to facilitate the process of information dissemination among vehicles. …”
Get full text
Get full text
Get full text
Article -
12
Tree-based contrast subspace mining method
Published 2020“…The research works involve first preparing the real world numerical and categorical data sets. Then, the tree-based method, the genetic algorithm based parameter values identification of tree-based method, and followed by the genetic algorithm based tree-based method, for numerical data sets are developed and evaluated. …”
Get full text
Get full text
Get full text
Thesis -
13
-
14
Reliable Path Selection Packet Forwarding Routing Protocol for Vehicular Adhoc Networks
Published 2019“…Vehicular Adhoc Networks (VANETs) have earned a gigantic consideration in the recent era. …”
Get full text
Get full text
Get full text
Thesis -
15
Laptop price prediction using decision tree algorithm / Nurnazifah Abd Mokti
Published 2024“…The project involves data collection, data preparation, and the implementation of the decision tree algorithm for price prediction. The decision tree's effectiveness and accuracy in predicting laptop prices are evaluated through rigorous testing and validation. …”
Get full text
Get full text
Thesis -
16
A coalition model for efficient indexing in wireless sensor network with random mobility / Hazem Jihad Ali Badarneh
Published 2021“…The second and third scenarios evaluate the performance of Coalition-Based Index-Tree by examining the effects of Dynamic-Coalition framework and Static-Coalition algorithm on Coalition-Based Index-Tree framework. …”
Get full text
Get full text
Get full text
Thesis -
17
Case Slicing Technique for Feature Selection
Published 2004“…This technique with k = 10 has been used in this thesis to evaluate the proposed approach. CST was compared to other selected classification methods based on feature subset selection such as Induction of Decision Tree Algorithm (ID3), Base Learning Algorithm K-Nearest Nighbour Algorithm (k-NN) and NaYve Bay~sA lgorithm (NB). …”
Get full text
Get full text
Thesis -
18
Performance evaluation for different intrusion detection system algorithms using machine learning
Published 2018“…The objectives of this project is to evaluate the performance of various intrusion detection algorithms based on machine learning. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
19
Visualisasi pohon sintaksis berasaskan model dan algoritma sintaks ayat bahasa Melayu
Published 2018“…These results proved that the algorithm and model, for syntactic tree output enhancement, are generalisable enough to be tested on other languages. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
20
