An Approach To Exploit The Hidden Mobility Regularity Of Vehicles To Predict Future Trajectories
Journal Title: International Journal of Research in Computer and Communication Technology - Year 2015, Vol 4, Issue 8
Abstract
Vehicle scan perform as influential sensors and form movable sensor networks. Vehicular networks have a lot of attractive applications, such as driving safety, intelligent transport, infrastructure monitoring and built-up observe. A vehicular network is a system of vehicles which converse with each other by means of short-range wireless communications. Vehicles can consequently communiqué with each other also in a straight line when there get together each other or from side to side multi-hop transmissions. Wellorganized data release is of immense significance, but extremely demanding for vehicular networks since of recurrent network disturbance, fast topological change and mobility doubt. The vehicular route in formation plays an input position in data delivery. Existing algorithms have mainly complete forecast on the route with coarse-grained prototype such as spatial distribution or/and the inter-meeting time allocation, which has guide to deprived data delivery recital.
Authors and Affiliations
K. Ram Kumar, D. Srinivas
Comparative Study of Fractional Order Derivative Based Image Enhancement Techniques
In this paper, image enhancement based on fractional gradient is proposed. The Taylor’s Series is used to obtain a generalized expression for this Fractional order derivative. The Image is differentiated in both x and...
An Approach for Providing Privacy of Microdata Publishing
In recent years, the wide accessibility of personal data has made the problem of privacy preserving data mining an important one. A number of methods have recently been proposed for privacy preserving data mining of...
Reduced Power In Processor Cache Using New Cache Architecture
In recent years, many high-performance microprocessors employ cache write-through policy for performance improvement. Multi-core chips also allow higher performance at lower energy. A multi-core processor implements...
Detecting Network And Application Layer Attacks in Networks
Distributed Denial of Service (DDoS) flooding attacks are launched by attackers disturbing server services as well as Individual users who are active in internet.espicially attackers are targeting network Transport l...
Analytical view of de-noising methods in ECG signals
This paper deals with the study of ECG signals signal energy, information entropy and joint entropy were analyzed to introduce general selective method of wavelet basis function, and these methods was applied in slow...