An Approach To Exploit The Hidden Mobility Regularity Of Vehicles To Predict Future Trajectories

Abstract

Vehicle scan perform as influential sensors and form movable sensor networks. Vehicular networks have a lot of attractive applications, such as driving safety, intelligent transport, infrastructure monitoring and built-up observe. A vehicular network is a system of vehicles which converse with each other by means of short-range wireless communications. Vehicles can consequently communiqué with each other also in a straight line when there get together each other or from side to side multi-hop transmissions. Wellorganized data release is of immense significance, but extremely demanding for vehicular networks since of recurrent network disturbance, fast topological change and mobility doubt. The vehicular route in formation plays an input position in data delivery. Existing algorithms have mainly complete forecast on the route with coarse-grained prototype such as spatial distribution or/and the inter-meeting time allocation, which has guide to deprived data delivery recital.

Authors and Affiliations

K. Ram Kumar, D. Srinivas

Keywords

Related Articles

Comparative Study of Fractional Order Derivative Based Image Enhancement Techniques

In this paper, image enhancement based on fractional gradient is proposed. The Taylor’s Series is used to obtain a generalized expression for this Fractional order derivative. The Image is differentiated in both x and...

An Approach for Providing Privacy of Microdata Publishing

In recent years, the wide accessibility of personal data has made the problem of privacy preserving data mining an important one. A number of methods have recently been proposed for privacy preserving data mining of...

Reduced Power In Processor Cache Using New Cache Architecture

In recent years, many high-performance microprocessors employ cache write-through policy for performance improvement. Multi-core chips also allow higher performance at lower energy. A multi-core processor implements...

Detecting Network And Application Layer Attacks in Networks

Distributed Denial of Service (DDoS) flooding attacks are launched by attackers disturbing server services as well as Individual users who are active in internet.espicially attackers are targeting network Transport l...

Analytical view of de-noising methods in ECG signals

This paper deals with the study of ECG signals signal energy, information entropy and joint entropy were analyzed to introduce general selective method of wavelet basis function, and these methods was applied in slow...

Download PDF file
  • EP ID EP28229
  • DOI -
  • Views 253
  • Downloads 2

How To Cite

K. Ram Kumar, D. Srinivas (2015). An Approach To Exploit The Hidden Mobility Regularity Of Vehicles To Predict Future Trajectories. International Journal of Research in Computer and Communication Technology, 4(8), -. https://europub.co.uk/articles/-A-28229