Log In
Or create an account -> 
Imperial Library
  • Home
  • About
  • News
  • Upload
  • Forum
  • Help
  • Login/SignUp

Index
Cover Title Page Copyright Page Book Series
Mission Coverage
Preface Chapter 1: Directional Location Verification and Routing in Vehicular Ad-Hoc Network
ABSTRACT INTRODUCTION LITERATURE SURVEY DIRECTIONAL LOCATION VERIFICATION AND ROUTING (DLVR) SIMULATION AND RESULT ANALYSIS CONCLUSION FUTURE SCOPE REFERENCES
Chapter 2: Towards the Development of Vehicular Ad-Hoc Networks (VANETs)
ABSTRACT INTRODUCTION AD-HOC VEHICLE NETWORKS (VANETS) ISSUES AND CHALLENGES OF VANETS ADVANTAGES AND CONSTRAINTS OF VANETS CONCLUSION REFERENCES
Chapter 3: Relative Position Estimation in Vehicle Ad-Hoc Network
ABSTRACT INTRODUCTION: BACKGROUND OF RANGE BASED MEASUREMENTS BACKGROUND OF COOPERATIVE LOCALIZATION ALGORITHMS RELATED WORKS FUTURE RESEARCH DIRECTIONS CONCLUSION REFERENCES KEY TERMS AND DEFINITIONS
Chapter 4: Intelligent Transportation System
ABSTRACT INTRODUCTION HISTORY OF ITS APPLICATIONS IN THE WORLD NEED FOR ITS LITERATURE SURVEY WORKING OF INTELLIGENT TRANSPORTATION SYSTEMS APPLICATIONS OF INTELLIGENT TRANSPORTATION SYSTEMS ENABLING TECHNOLOGIES OF ITS BENEFITS OF ITS ISSUES AND SOLUTIONS OF ITS FUTURE OF ITS CONCLUSION REFERENCES
Chapter 5: Novel Congestion Control Model for Maintaining Quality of Service in MANET
ABSTRACT INTRODUCTION TO MOBILE AD HOC NETWORKS BACKGROUND NOVEL CONGESTION CONTROL SCHEME EXPERIMENTAL RESULTS AND DISCUSSION CONCLUSION REFERENCES
Chapter 6: Open Threads-Enabled Mesh Networks in Vehicles for Real-Time Traffic Monitoring
ABSTRACT INTRODUCTION VANETs TO MANGE TRAFFIC CONGESTION NEED FOR OPEN THREADS WITH VANETS A TYPICAL THREAD NETWORK THREAD DOMAINS THREAD ROLES OVERVIEW THREAD STACK IEEE 802.15.4 ROUTING SECURITY FRAMEWORK FOR DEPLOYMENT OF MESH NETWORK IN VEHICLES THROUGH OPEN THREAD CONCLUSION REFERENCES
Chapter 7: A Review on the Role and Importance of Congestion Control for Traffic Optimization in Vehicular Ad-Hoc Networks
ABSTRACT INTRODUCTION RELATED WORKS PROBLEM FORMULATION PROPOSED WORK METHODOLOGY REFERENCES
Chapter 8: A Relative Study About Mobile Ad-Hoc Network (MANET)
ABSTRACT INTRODUCTION APPLICATIONS OF MANET ROUTING PROTOCOLS MANET ARCHITECTURE ATTACKS IN MANET COMPARATIVE STUDY CONCLUSION AND FUTURE SCOPE REFERENCES
Chapter 9: A Taxonomy of Sybil Attacks in Vehicular Ad-Hoc Network (VANET)
ABSTRACT INTRODUCTION PRIVACY AND CONFIDENTIALITY AUTHENTICATION AND PRIVACY METHODS TO DETECT SYBIL ATTACK SUMMARY CONCLUSION REFERENCES
Chapter 10: Data Science in Vehicular Ad-Hoc Networks
ABSTRACT INTRODUCTION VEHICULAR AD-HOC NETWORKS TYPES OF VEHICLE COMMUNICATION DATA SCIENCE NEED FOR BIG DATA IN VANET VANET THZ CHANNEL MODELING VEHICULAR THZ WAVE CHANNEL SIMULATION USING NYUSIM SIMULATOR VEHICLE TRAFFIC BIG DATA DEEP LEARNING ALGORITHM: STACKING DILATED CONVOLUTIONAL AUTOENCODERS TIMING DIAGRAM CONCLUSION REFERENCES
Chapter 11: Efficient Encryption Techniques for Data Transmission Through the Internet of Things Devices
ABSTRACT COMMUNICATION IN THE INTERNET OF THINGS ENVIRONMENT (INTRODUCTION) TRADITIONAL COMPUTING AND INTERNET OF THINGS (KEY CHALLENGES) CRYPTOGRAPHY IN ITS LIGHTWEIGHT VERSION POSSIBLE ATTACKS ON SECURE THINGS AND THEIR COUNTERMEASURE APPLICATION AREAS OF INTERNET OF THINGS CONCLUSIVE REMARK FUTURE RESEARCH DIRECTIONS REFERENCES
Chapter 12: Energy-Efficient Rotation Technique of Cluster-Head Method for Wireless Sensor Networks
ABSTRACT INTRODUCTION RELATED WORK RADIO PROPAGATION MODEL ENERGY-EFFICIENT ROTATION TECHNIQUE OF CLUSTER HEAD (EERTCH) EXPERIMENTAL SETUP PERFORMANCE ASSESSMENT CONCLUSION AND FUTURE WORKS REFERENCES
Chapter 13: Performance Investigation of Topology-Based Routing Protocols in Flying Ad-Hoc Networks Using NS-2
ABSTRACT 1. INTRODUCTION CHARECTERISTICS APPLICATIONS CHALLENGES LITERATURE REVIEW ROUTING FOR FLYING AD HOC NETWORKS SIMULATION RESULTS AND ANALYSIS CONCLUSION REFERENCES
Chapter 14: Vehicular Cloud and Fog Computing Architecture, Applications, Services, and Challenges
ABSTRACT 1. INTRODUCTION VEHICULAR CLOUD COMPUTING (VCC) FOG COMPUTING VEHICULAR FOG COMPUTING (VFC) VCC VS VFC SERVICES PROVIDED THROUGH VANET USING FOG SECURITY AND FORENSIC PROPERTIES OF VEHICULAR FOG COMPUTING CHALLENGES AND OPEN PROBLEMS CONCLUSION REFERENCES
Compilation of References About the Contributors
  • ← Prev
  • Back
  • Next →
  • ← Prev
  • Back
  • Next →

Chief Librarian: Las Zenow <zenow@riseup.net>
Fork the source code from gitlab
.

This is a mirror of the Tor onion service:
http://kx5thpx2olielkihfyo4jgjqfb7zx7wxr3sd4xzt26ochei4m6f7tayd.onion