Connection Time Estimation between Nodes in VDTN
Journal Title: International Journal of Advanced Computer Science & Applications - Year 2019, Vol 10, Issue 1
Abstract
Vehicular delay tolerant network (VDTN) is a widely used communication standard for the scenarios where no end to end path is available between nodes. Data is sent from one node to another node using routing protocols of VDTN. These routing protocols use different decision metrics. Based on these metrics, it is chosen whether to send data to connected node or find another suitable candidate. These metrices are Time to live (TTL), geographical information, destination utility, relay utility, meeting prediction, total and remaining buffer size and many other. Different routing protocols use a different combination of metrics. In this paper, a metric called “estimation-time” is introduced. The “estimation-time” is assessed at the encounter of two nodes. Nodes may decide based on that whether to send data or not. This metric can be used in routing decisions. The simulations results are above 88% which proves “estimation-time” metric is calculated correctly.
Authors and Affiliations
Adnan Ali, Muhammad Shakil, Hamaad Rafique, Sehrish Munawar Cheema
Internet of Things and Healthcare Analytics for Better Healthcare Solution: Applications and Challenges
The total number of population in the world will keep on increasing. This will eventually pose challenges towards quality of life for example issues related to healthcare. Hence, a proper solution needs to be devised in...
Agent-Based Co-Modeling of Information Society and Wealth Distribution
With empirical studies suggesting that information technology influence wealth distribution in different ways, and with economic interactions and information technology adoption being two complex phenomena, there is a ne...
Link Prediction Schemes Contra Weisfeiler-Leman Models
Link prediction is of particular interest to the data mining and machine learning communities. Until recently all approaches to the problem used embedding-based methods which leverage either node similarities or latent g...
Web Anomaly Misuse Intrusion Detection Framework for SQL Injection Detection
Databases at the background of e-commerce applications are vulnerable to SQL injection attack which is considered as one of the most dangerous web attacks. In this paper we propose a framework based on misuse and a...
Reducing Shared Cache Misses via dynamic Grouping and Scheduling on Multicores
Multicore technology enables the system to perform more tasks with higher overall system performance.However, this performance can’t be exploited well due to the high miss rate in the second level shared cache among the...