Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (58)
  • Open Access

    ARTICLE

    Adaptive Resource Allocation Algorithm for 5G Vehicular Cloud Communication

    Huanhuan Li1,2,*, Hongchang Wei2, Zheliang Chen2, Yue Xu3

    CMC-Computers, Materials & Continua, Vol.80, No.2, pp. 2199-2219, 2024, DOI:10.32604/cmc.2024.052155

    Abstract The current resource allocation in 5G vehicular networks for mobile cloud communication faces several challenges, such as low user utilization, unbalanced resource allocation, and extended adaptive allocation time. We propose an adaptive allocation algorithm for mobile cloud communication resources in 5G vehicular networks to address these issues. This study analyzes the components of the 5G vehicular network architecture to determine the performance of different components. It is ascertained that the communication modes in 5G vehicular networks for mobile cloud communication include in-band and out-of-band modes. Furthermore, this study analyzes the single-hop and multi-hop modes in… More >

  • Open Access

    ARTICLE

    Dynamic Offloading and Scheduling Strategy for Telematics Tasks Based on Latency Minimization

    Yu Zhou1, Yun Zhang1, Guowei Li1, Hang Yang1, Wei Zhang1, Ting Lyu2, Yueqiang Xu2,*

    CMC-Computers, Materials & Continua, Vol.80, No.2, pp. 1809-1829, 2024, DOI:10.32604/cmc.2024.050975

    Abstract In current research on task offloading and resource scheduling in vehicular networks, vehicles are commonly assumed to maintain constant speed or relatively stationary states, and the impact of speed variations on task offloading is often overlooked. It is frequently assumed that vehicles can be accurately modeled during actual motion processes. However, in vehicular dynamic environments, both the tasks generated by the vehicles and the vehicles’ surroundings are constantly changing, making it difficult to achieve real-time modeling for actual dynamic vehicular network scenarios. Taking into account the actual dynamic vehicular scenarios, this paper considers the real-time… More >

  • Open Access

    REVIEW

    Caching Strategies in NDN Based Wireless Ad Hoc Network: A Survey

    Ahmed Khalid1, Rana Asif Rehman1, Byung-Seo Kim2,*

    CMC-Computers, Materials & Continua, Vol.80, No.1, pp. 61-103, 2024, DOI:10.32604/cmc.2024.049981

    Abstract Wireless Ad Hoc Networks consist of devices that are wirelessly connected. Mobile Ad Hoc Networks (MANETs), Internet of Things (IoT), and Vehicular Ad Hoc Networks (VANETs) are the main domains of wireless ad hoc network. Internet is used in wireless ad hoc network. Internet is based on Transmission Control Protocol (TCP)/Internet Protocol (IP) network where clients and servers interact with each other with the help of IP in a pre-defined environment. Internet fetches data from a fixed location. Data redundancy, mobility, and location dependency are the main issues of the IP network paradigm. All these… More >

  • Open Access

    ARTICLE

    Trusted Certified Auditor Using Cryptography for Secure Data Outsourcing and Privacy Preservation in Fog-Enabled VANETs

    Nagaraju Pacharla, K. Srinivasa Reddy*

    CMC-Computers, Materials & Continua, Vol.79, No.2, pp. 3089-3110, 2024, DOI:10.32604/cmc.2024.048133

    Abstract With the recent technological developments, massive vehicular ad hoc networks (VANETs) have been established, enabling numerous vehicles and their respective Road Side Unit (RSU) components to communicate with one another. The best way to enhance traffic flow for vehicles and traffic management departments is to share the data they receive. There needs to be more protection for the VANET systems. An effective and safe method of outsourcing is suggested, which reduces computation costs by achieving data security using a homomorphic mapping based on the conjugate operation of matrices. This research proposes a VANET-based data outsourcing… More >

  • Open Access

    ARTICLE

    Falcon Optimization Algorithm-Based Energy Efficient Communication Protocol for Cluster-Based Vehicular Networks

    Youseef Alotaibi1, B. Rajasekar2, R. Jayalakshmi3, Surendran Rajendran4,*

    CMC-Computers, Materials & Continua, Vol.78, No.3, pp. 4243-4262, 2024, DOI:10.32604/cmc.2024.047608

    Abstract Rapid development in Information Technology (IT) has allowed several novel application regions like large outdoor vehicular networks for Vehicle-to-Vehicle (V2V) transmission. Vehicular networks give a safe and more effective driving experience by presenting time-sensitive and location-aware data. The communication occurs directly between V2V and Base Station (BS) units such as the Road Side Unit (RSU), named as a Vehicle to Infrastructure (V2I). However, the frequent topology alterations in VANETs generate several problems with data transmission as the vehicle velocity differs with time. Therefore, the scheme of an effectual routing protocol for reliable and stable communications… More >

  • Open Access

    REVIEW

    A Review on the Recent Trends of Image Steganography for VANET Applications

    Arshiya S. Ansari*

    CMC-Computers, Materials & Continua, Vol.78, No.3, pp. 2865-2892, 2024, DOI:10.32604/cmc.2024.045908

    Abstract Image steganography is a technique of concealing confidential information within an image without dramatically changing its outside look. Whereas vehicular ad hoc networks (VANETs), which enable vehicles to communicate with one another and with roadside infrastructure to enhance safety and traffic flow provide a range of value-added services, as they are an essential component of modern smart transportation systems. VANETs steganography has been suggested by many authors for secure, reliable message transfer between terminal/hope to terminal/hope and also to secure it from attack for privacy protection. This paper aims to determine whether using steganography is… More >

  • Open Access

    ARTICLE

    Secure and Reliable Routing in the Internet of Vehicles Network: AODV-RL with BHA Attack Defense

    Nadeem Ahmed1,*, Khalid Mohammadani2, Ali Kashif Bashir3,4,5, Marwan Omar6, Angel Jones7, Fayaz Hassan1

    CMES-Computer Modeling in Engineering & Sciences, Vol.139, No.1, pp. 633-659, 2024, DOI:10.32604/cmes.2023.031342

    Abstract Wireless technology is transforming the future of transportation through the development of the Internet of Vehicles (IoV). However, intricate security challenges are intertwined with technological progress: Vehicular ad hoc Networks (VANETs), a core component of IoV, face security issues, particularly the Black Hole Attack (BHA). This malicious attack disrupts the seamless flow of data and threatens the network’s overall reliability; also, BHA strategically disrupts communication pathways by dropping data packets from legitimate nodes altogether. Recognizing the importance of this challenge, we have introduced a new solution called ad hoc On-Demand Distance Vector-Reputation-based mechanism Local Outlier… More >

  • Open Access

    ARTICLE

    Examining the Use of Scott’s Formula and Link Expiration Time Metric for Vehicular Clustering

    Fady Samann1,2,*, Shavan Askar3

    CMES-Computer Modeling in Engineering & Sciences, Vol.138, No.3, pp. 2421-2444, 2024, DOI:10.32604/cmes.2023.031265

    Abstract Implementing machine learning algorithms in the non-conducive environment of the vehicular network requires some adaptations due to the high computational complexity of these algorithms. K-clustering algorithms are simplistic, with fast performance and relative accuracy. However, their implementation depends on the initial selection of clusters number (K), the initial clusters’ centers, and the clustering metric. This paper investigated using Scott’s histogram formula to estimate the K number and the Link Expiration Time (LET) as a clustering metric. Realistic traffic flows were considered for three maps, namely Highway, Traffic Light junction, and Roundabout junction, to study the… More >

  • Open Access

    ARTICLE

    Traffic Control Based on Integrated Kalman Filtering and Adaptive Quantized Q-Learning Framework for Internet of Vehicles

    Othman S. Al-Heety1,*, Zahriladha Zakaria1,*, Ahmed Abu-Khadrah2, Mahamod Ismail3, Sarmad Nozad Mahmood4, Mohammed Mudhafar Shakir5, Sameer Alani6, Hussein Alsariera1

    CMES-Computer Modeling in Engineering & Sciences, Vol.138, No.3, pp. 2103-2127, 2024, DOI:10.32604/cmes.2023.029509

    Abstract Intelligent traffic control requires accurate estimation of the road states and incorporation of adaptive or dynamically adjusted intelligent algorithms for making the decision. In this article, these issues are handled by proposing a novel framework for traffic control using vehicular communications and Internet of Things data. The framework integrates Kalman filtering and Q-learning. Unlike smoothing Kalman filtering, our data fusion Kalman filter incorporates a process-aware model which makes it superior in terms of the prediction error. Unlike traditional Q-learning, our Q-learning algorithm enables adaptive state quantization by changing the threshold of separating low traffic from… More >

  • Open Access

    ARTICLE

    Mitigating Blackhole and Greyhole Routing Attacks in Vehicular Ad Hoc Networks Using Blockchain Based Smart Contracts

    Abdulatif Alabdulatif1,*, Mada Alharbi1, Abir Mchergui2, Tarek Moulahi3,4

    CMES-Computer Modeling in Engineering & Sciences, Vol.138, No.2, pp. 2005-2022, 2024, DOI:10.32604/cmes.2023.029769

    Abstract The rapid increase in vehicle traffic volume in modern societies has raised the need to develop innovative solutions to reduce traffic congestion and enhance traffic management efficiency. Revolutionary advanced technology, such as Intelligent Transportation Systems (ITS), enables improved traffic management, helps eliminate congestion, and supports a safer environment. ITS provides real-time information on vehicle traffic and transportation systems that can improve decision-making for road users. However, ITS suffers from routing issues at the network layer when utilising Vehicular Ad Hoc Networks (VANETs). This is because each vehicle plays the role of a router in this… More >

Displaying 1-10 on page 1 of 58. Per Page