Log In
Or create an account ->
Imperial Library
Home
About
News
Upload
Forum
Help
Login/SignUp
Index
Cover
Title Page
Copyright Page
Book Series
Mission
Coverage
Preface
Chapter 1: Directional Location Verification and Routing in Vehicular Ad-Hoc Network
ABSTRACT
INTRODUCTION
LITERATURE SURVEY
DIRECTIONAL LOCATION VERIFICATION AND ROUTING (DLVR)
SIMULATION AND RESULT ANALYSIS
CONCLUSION
FUTURE SCOPE
REFERENCES
Chapter 2: Towards the Development of Vehicular Ad-Hoc Networks (VANETs)
ABSTRACT
INTRODUCTION
AD-HOC VEHICLE NETWORKS (VANETS)
ISSUES AND CHALLENGES OF VANETS
ADVANTAGES AND CONSTRAINTS OF VANETS
CONCLUSION
REFERENCES
Chapter 3: Relative Position Estimation in Vehicle Ad-Hoc Network
ABSTRACT
INTRODUCTION:
BACKGROUND OF RANGE BASED MEASUREMENTS
BACKGROUND OF COOPERATIVE LOCALIZATION ALGORITHMS
RELATED WORKS
FUTURE RESEARCH DIRECTIONS
CONCLUSION
REFERENCES
KEY TERMS AND DEFINITIONS
Chapter 4: Intelligent Transportation System
ABSTRACT
INTRODUCTION
HISTORY OF ITS APPLICATIONS IN THE WORLD
NEED FOR ITS
LITERATURE SURVEY
WORKING OF INTELLIGENT TRANSPORTATION SYSTEMS
APPLICATIONS OF INTELLIGENT TRANSPORTATION SYSTEMS
ENABLING TECHNOLOGIES OF ITS
BENEFITS OF ITS
ISSUES AND SOLUTIONS OF ITS
FUTURE OF ITS
CONCLUSION
REFERENCES
Chapter 5: Novel Congestion Control Model for Maintaining Quality of Service in MANET
ABSTRACT
INTRODUCTION TO MOBILE AD HOC NETWORKS
BACKGROUND
NOVEL CONGESTION CONTROL SCHEME
EXPERIMENTAL RESULTS AND DISCUSSION
CONCLUSION
REFERENCES
Chapter 6: Open Threads-Enabled Mesh Networks in Vehicles for Real-Time Traffic Monitoring
ABSTRACT
INTRODUCTION
VANETs TO MANGE TRAFFIC CONGESTION
NEED FOR OPEN THREADS WITH VANETS
A TYPICAL THREAD NETWORK
THREAD DOMAINS
THREAD ROLES OVERVIEW
THREAD STACK
IEEE 802.15.4
ROUTING
SECURITY
FRAMEWORK FOR DEPLOYMENT OF MESH NETWORK IN VEHICLES THROUGH OPEN THREAD
CONCLUSION
REFERENCES
Chapter 7: A Review on the Role and Importance of Congestion Control for Traffic Optimization in Vehicular Ad-Hoc Networks
ABSTRACT
INTRODUCTION
RELATED WORKS
PROBLEM FORMULATION
PROPOSED WORK METHODOLOGY
REFERENCES
Chapter 8: A Relative Study About Mobile Ad-Hoc Network (MANET)
ABSTRACT
INTRODUCTION
APPLICATIONS OF MANET
ROUTING PROTOCOLS
MANET ARCHITECTURE
ATTACKS IN MANET
COMPARATIVE STUDY
CONCLUSION AND FUTURE SCOPE
REFERENCES
Chapter 9: A Taxonomy of Sybil Attacks in Vehicular Ad-Hoc Network (VANET)
ABSTRACT
INTRODUCTION
PRIVACY AND CONFIDENTIALITY
AUTHENTICATION AND PRIVACY
METHODS TO DETECT SYBIL ATTACK
SUMMARY
CONCLUSION
REFERENCES
Chapter 10: Data Science in Vehicular Ad-Hoc Networks
ABSTRACT
INTRODUCTION
VEHICULAR AD-HOC NETWORKS
TYPES OF VEHICLE COMMUNICATION
DATA SCIENCE
NEED FOR BIG DATA IN VANET
VANET THZ CHANNEL MODELING
VEHICULAR THZ WAVE CHANNEL SIMULATION USING NYUSIM SIMULATOR
VEHICLE TRAFFIC BIG DATA
DEEP LEARNING ALGORITHM: STACKING DILATED CONVOLUTIONAL AUTOENCODERS
TIMING DIAGRAM
CONCLUSION
REFERENCES
Chapter 11: Efficient Encryption Techniques for Data Transmission Through the Internet of Things Devices
ABSTRACT
COMMUNICATION IN THE INTERNET OF THINGS ENVIRONMENT (INTRODUCTION)
TRADITIONAL COMPUTING AND INTERNET OF THINGS (KEY CHALLENGES)
CRYPTOGRAPHY IN ITS LIGHTWEIGHT VERSION
POSSIBLE ATTACKS ON SECURE THINGS AND THEIR COUNTERMEASURE
APPLICATION AREAS OF INTERNET OF THINGS
CONCLUSIVE REMARK
FUTURE RESEARCH DIRECTIONS
REFERENCES
Chapter 12: Energy-Efficient Rotation Technique of Cluster-Head Method for Wireless Sensor Networks
ABSTRACT
INTRODUCTION
RELATED WORK
RADIO PROPAGATION MODEL
ENERGY-EFFICIENT ROTATION TECHNIQUE OF CLUSTER HEAD (EERTCH)
EXPERIMENTAL SETUP
PERFORMANCE ASSESSMENT
CONCLUSION AND FUTURE WORKS
REFERENCES
Chapter 13: Performance Investigation of Topology-Based Routing Protocols in Flying Ad-Hoc Networks Using NS-2
ABSTRACT
1. INTRODUCTION
CHARECTERISTICS
APPLICATIONS
CHALLENGES
LITERATURE REVIEW
ROUTING FOR FLYING AD HOC NETWORKS
SIMULATION
RESULTS AND ANALYSIS
CONCLUSION
REFERENCES
Chapter 14: Vehicular Cloud and Fog Computing Architecture, Applications, Services, and Challenges
ABSTRACT
1. INTRODUCTION
VEHICULAR CLOUD COMPUTING (VCC)
FOG COMPUTING
VEHICULAR FOG COMPUTING (VFC)
VCC VS VFC
SERVICES PROVIDED THROUGH VANET USING FOG
SECURITY AND FORENSIC PROPERTIES OF VEHICULAR FOG COMPUTING
CHALLENGES AND OPEN PROBLEMS
CONCLUSION
REFERENCES
Compilation of References
About the Contributors
← Prev
Back
Next →
← Prev
Back
Next →