Search Results - (( mobile detection method algorithm ) OR ( vanet communication issues algorithm ))

Refine Results
  1. 1

    Cluster optimization in VANET using MFO algorithm and K-Means clustering by Ramlee, Sham Rizal, Hasan, Sazlinah, K. Subramaniam, Shamala

    Published 2023
    “…First issue in VANET clustering is the Cluster Head (CH) selection since the CH has critical role in data routing and responsible for coordinating both inter and intra cluster communication. …”
    Get full text
    Get full text
    Conference or Workshop Item
  2. 2
  3. 3

    VANET SECURITY FRAMEWORK FOR LOW LATENCY SAFETY APPLICATIONS by WAGAN, ASIF ALI

    Published 2012
    “…Vehicular Ad hoc Network (VANET) is a communication network for vehicles on the road. …”
    Get full text
    Get full text
    Thesis
  4. 4

    Efficient and stable routing algorithm based on user mobility and node density in urban vehicular network by Al-Mayouf, Y.R.B., Ismail, M., Abdullah, N.F., Wahab, A.W.A., Mahdi, O.A., Khan, S., Choo, R.K.K.

    Published 2016
    “…An appropriate, efficient, and stable routing algorithm must be developed for various VANET applications to address the issues of dynamic topology and intermittent connectivity. …”
    Get full text
    Get full text
    Article
  5. 5

    Evaluation of efficient vehicular ad hoc networks based on a maximum distance routing algorithm by Al-Mayouf, Y.R.B., Abdullah, N.F., Ismail, M., Al-Qaraawi, S.M., Mahdi, O.A., Khan, S.

    Published 2016
    “…To address these issues, a new dependable routing algorithm is proposed, which utilizes a wireless communication system between vehicles in urban vehicular networks. …”
    Get full text
    Get full text
    Article
  6. 6

    A lightweight and secure online/offline cross-domain authentication scheme for VANET systems in Industrial IoT by Khalid, Haqi, Hashim, Shaiful Jahari, Syed Ahmad, Sharifah Mumtazah, Hashim, Fazirulhisyam, Chaudhary, Muhammad Akmal

    Published 2021
    “…Thus, to solve the above issues, we propose an online/offline lightweight authentication scheme for the VANET cross-domain system in IIoT to improve the security and efficiency of the VANET. …”
    Get full text
    Get full text
    Article
  7. 7

    Geographical and maximum distance on-demand routing algorithm G-MDORA by Mohammed D., Bin Mansor M., Hock G.C.

    Published 2024
    “…VANET allows vehicles in the network to communicate wirelessly with roadside units (RSUs) or between vehicles within a coverage area. …”
    Article
  8. 8

    Security framework for low latency vanet applications by Wagan, A.A., Jung, L.T.

    Published 2014
    “…Vehicular Ad hoc Network (VANET) is a communication network for vehicles on the highway. …”
    Get full text
    Get full text
    Conference or Workshop Item
  9. 9

    Implement routing protocols for VANET in a one-way environment by Mohammed D., Mansor M.B., Hock G.C.

    Published 2024
    “…One of the key issues in a VANET is designing a routing protocol, which aids in the delivery of reliable and efficient packets from node to node. …”
    Conference Paper
  10. 10

    Clustering Based Affinity Propagation In Vanets : Taxonomy And Opportunity Of Research by Talib, Mohammed Saad, Hassan, Aslinda, Abal Abas, Zuraida, Hassan, Ali Abdul Hussian, Ali, Mohanad Faeq, Al-Araji, Zaid Jasim

    Published 2019
    “…Vehicular Adhoc Networks (VANETs) represents a developed type of an effective communication technology to facilitate the process of information dissemination among vehicles. …”
    Get full text
    Get full text
    Get full text
    Article
  11. 11

    Cooperative spectrum sensing based on machine learning in cognitive radio vehicular network / Mohammad Asif Hossain by Mohammad Asif , Hossain

    Published 2022
    “…To solve the above-mentioned issues and problems, this thesis presents a novel segment-based CR-VANET (Seg-CR-VANET) cooperative spectrum sensing (CSS) framework. …”
    Get full text
    Get full text
    Get full text
    Thesis
  12. 12

    Enhanced weight-based clustering algorithm to provide reliable delivery for VANET safety applications by Bello Tambawal, Abubakar, Noor, Rafidah Md, Salleh, Rosli, Chembe, Christopher, Oche, Michael

    Published 2019
    “…Nevertheless, research has shown that most of the existing clustering algorithms focus on cluster head (CH) election with very few addressing other critical issues such as cluster formation and maintenance. …”
    Get full text
    Get full text
    Article
  13. 13

    Reliable Path Selection Packet Forwarding Routing Protocol for Vehicular Adhoc Networks by Irshad Ahmed, Abbasi

    Published 2019
    “…One of the crucial issues comprise of the design of scalable routing algorithms that are robust to rapid topology changes and frequent link disconnections caused by high mobility of vehicles. …”
    Get full text
    Get full text
    Get full text
    Thesis
  14. 14

    Mobile robot path planning using hybrid genetic algorithm and traversability vectors method by Loo, C.K., Rajeswari, M., Wong, E.K., RaoTask, M.V.C.

    Published 2004
    “…In all experiments, the GA has successfully detected the near-optimal feasible traveling path for mobile. …”
    Get full text
    Get full text
    Get full text
    Article
  15. 15

    Dynamic intrusion detection method for mobile ad hoc network using CPDOD algorithm by Abdel-Fatah, Farhan, Md Dahalin, Zulkhairi, Jusoh, Shaidah

    Published 2010
    “…In this paper, we propose a novel intrusion detection method by combining two anomaly methods Conformal Predictor k-nearest neighbor and Distancebased Outlier Detection (CPDOD) algorithm. …”
    Get full text
    Get full text
    Get full text
    Article
  16. 16

    Mobile banking Trojan detection using Naive Bayes / Anis Athirah Masmuhallim by Masmuhallim, Anis Athirah

    Published 2024
    “…This research presents a mobile malware static detection method based on Naive Bayes. …”
    Get full text
    Get full text
    Thesis
  17. 17

    Wormhole attack detection mechanism in mobile ad hoc network using neighborhood information and path tracing algorithm by Enshaei, Mehdi

    Published 2015
    “…Path Tracing (PT) Algorithm was proposed to detect and prevent exposed wormhole attacks in MANET. …”
    Get full text
    Get full text
    Thesis
  18. 18

    Automated feature selection using boruta algorithm to detect mobile malware by Che Akmal, Che Yahaya, Ahmad Firdaus, Zainal Abidin, Salwana, Mohamad, Ernawan, Ferda, Mohd Faizal, Ab Razak

    Published 2020
    “…This research proposed automated feature selection using Boruta algorithm to detect the malware. The proposed method adopts machine learning prediction and optimizes the selecting features in order to reduce the model of machine learning complexity. …”
    Get full text
    Get full text
    Get full text
    Article
  19. 19

    Intrusion Detection in Mobile Ad Hoc Networks Using Transductive Machine Learning Techniques by Farhan, Farhan Abdel-Fattah Ahmad

    Published 2011
    “…In the past decades, machine learning methods have been successfully used in several intrusion detection methods because of their ability to discover and detect novel attacks. …”
    Get full text
    Get full text
    Get full text
    Thesis
  20. 20