A DATA DISSEMINATION MODEL FOR VEHICULAR ADHOC NETWORK
Journal Title: INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY - Year 2012, Vol 2, Issue 2
Abstract
Vehicular adhoc network (VANET) is an emerging network which is depend on the communication of data through vehicular network via data pushing. Data pushing in between the vehicles was done by the data pushing communication model. In this paper, we present a formal model of data dissemination in between the vehicles by the mobility of vehicles and describe also the affects of data dissemination and study their characteristics which define the mobility if data dissemination in bidirectional mobility, we also study the data push model in the context of Traffic View, a system that we have implemented to disseminate information about the vehicles on the road. Traffic data could be disseminated using the cars moving on the same direction, cars moving in the opposite direction, or cars moving in both directions.
Authors and Affiliations
Anshu Garg, Prof. (Dr. ) Sanjeev Bansal
The Usage of CIDOS and Social Network Sites in Teaching and Learning Processes at Malaysian Polytechnics
In 21st century learning, students use educational technologies to apply knowledge to new situations, analyse information, collaborate, solve problems, and make decisions. Utilising emerging technologies, to provide ex...
Ontology Mapping using Fuzzy Decision Tree and Formal Concept Analysis
An ontology describes and defines the terms used to describe and represent an area of knowledge. Different people or organizations come up with their own ontology; having their own view of the domain. So, for systems to...
A Digital Watermarking Algorithm Based on Wavelet Packet Transform and RBF Neural Network
Digital water marking technique suffered some problem of geometrical and some other attack. The process of attack deformed the quality of digital image and violet the rule of copyright protection low. For the roughness o...
CRYPTOGRAPHY
To prevent the dissemination of sensitive information from the database to unauthorized users or outside competitive or hostile agents, an organization must establish effective security policies. The art of protecting in...
UNDERSTANDING THE DEVELOPER PARTICIPATION IN BUG FIX PROCESS
Prediction of the bug fix time in open source softwares is a challenging job. A software bug consists of many attributes that define the characteristics of the bug. Some of the attributes get filled at the time of report...