Advanced Mathematics and Numerical Modeling of IoT
proposed an algorithm that controls the probability of for- warding RREQ packets according to the residual energy of the node, s ...
0 50 100 150 200 250 300 0 5 10 15 20 25 30 35 40 45 Distance (m) ETX Figure 1: ETX metric via distance. define the residual ene ...
Request Request Request Request RequestRequest Reque S 1 2 3 4 5 Request ETXS,1 ETXS,2 Figure 3: Example of the EEPR algorithm. ...
Table 1: Factors used in the simulation. Simulation factor Value Topology 1000 m by 1000 m grid random Number of nodes^50 Path l ...
EEPR AODV 100 90 80 70 60 50 Routing success probability ( % ) 91.7647 93.5335 Figure 9: Routing success probability. algorithms ...
[11] M. Yoon, “An energy-efficient routing protocol using message success rate in wireless sensor networks,”KITCS/FTRA Journal o ...
Research Article Usability Analysis of Collision Avoidance System in Vehicle-to-Vehicle Communication Environment Hong Cho, Gyou ...
Vehicle-mounted Radar Camera Common parts Infra Driving and communication environment Neighborhood vehicle Vehicle state V2V ...
Camera sensor Positioning system Wireless communication module Kalman filter In-vehicle sensor Lane information Position, headin ...
-axis of ego’s lateral -axis of ego’s lateral -axis of ego’s longitudinal -axis of ego’s longitudinal 90 ∘E 0 ∘N 270 ∘W 180 ∘S ( ...
Table 2: Vehicle-mounted sensors’ specifications. Parameter Camera sensor Focallength(mm) 6 FoV (∘) Azimuth:±20.5 Elevation:±13. ...
(a) Simulation viewer 0 2 4 6 8 1012141618 0.0 0.2 0.4 0.6 0.8 1.0 Collision detection (b) Collision detection flag Time (s) 024 ...
after comparing the current location information of the user vehicle and nearby vehicles received through intervehicle communica ...
0.0 0.2 0.4 0.6 0.8 1.0 0.0 0.2 0.4 0.6 0.8 1.0 Time (s) (a) Simulation viewer 0 2 4 6 8 10 12 14 16 18 0 2 4 6 8 10 12 14 16 18 ...
024681012141618 2 3 4 5 6 7 Warning zone Time (s) 1 Vehicle 1 Vehicle 2 Vehicle 3 Figure 13: Warning zone change during simulati ...
[4] Verma, V. Jain, and R. Gumber, “Simple fuzzy rule-based edge detection,”Journal of Information Processing Systems,vol.9,no. ...
Research Article An Efficient and Securem-IPS Scheme of Mobile Devices for Human-Centric Computing Young-Sik Jeong,^1 Jae Dong L ...
Table 1: Characteristics of MAC, DAC, and RBAC. MAC DAC RBAC Access authority System Owner Central authority Criteria of access ...
3. Wireless Security Threats and Requirements In this chapter, wireless security threats and requirements are discussed in detai ...
end values (ET), and repeating cycles (퐶). The cycles are divided into days, weeks, and months 푇={푡1,푡2,...,푡푛} 푡=(ST,ET,C) ST,E ...
«
7
8
9
10
11
12
13
14
15
16
»
Free download pdf