Implementation of MIMO Technique in Vehicular Adhoc Network for Different Mobility Patterns
Journal Title: International Journal of Research in Computer and Communication Technology - Year 2013, Vol 2, Issue 12
Abstract
VANETs (Vehicular ad-hoc network) is a special type if intelligent system used for road safety which is characterized by a very dynamic topology with partial infrastructure support, patterned mobility, and mobile nodes with sufficient resources, intermittent connectivity and varied channel behaviour. It also enable the promising challenges for prevention of road accident and enhance a driver safety. For that purpose, they usually make use of the location information that vehicles share among them through periodical messages that are transmitted across a VANET. In addition to communication among the vehicles, VANET interface with communication points provided by on road infrastructure. Thus in this paper we propose that the design of city environment VANET network with Wimax by using AOMDV routing protocol with two key strategies which are multiple input & multiple output technology (MIMO) and adaptive modulation coding (AMC) which by combining gives the significantly enhanced data rate & maximum throughput with high efficiency in wireless network.
Authors and Affiliations
Harsha R. Tembhekar, Prof. Prabhakar D. Dorge, Sanjay S. Dorle
Concert demonstrable data self-control for Integrity Verification in Multi-Cloud Storage
The Provable data possession (PDP) is a technique for ensure the integrity of data in storage out sourcing. In this paper we addresses the construction of an efficient PDP scheme for distribute cloud data storage to...
A Study on Security Advances for LEACH in WSN
Wireless Sensor Network consist of several autonomous sensor nodes that are capable of some sort of sensing power. Since the sensor nodes are placed in harsh environments, WSN is vulnerable to various types of attacks....
Implementation of Symmetric Stream Cipher for Text Encryption Using Key Sequence of Cyclic Elliptical Curve Points Based on PRNG
In this paper, cyclic elliptic curves of the form y2 = x 3 + ax + b mod p € E(Fp) with order N is considered in the design of a symmetric key text Encryption Scheme with Key Sequence derived from random sequence of...
Sprinkling Data Prevents From Intruders
The habitual communication of delay-tolerantnetwork (DTN) model is having partial infrastructural model for prevailing mobile patronsfor instance Bluetooth and Wi-Fi Direct. Mobile ad hoc network is an anthology of mo...
Equivalent Entity Mining Commencing On Relative Uncertainty
Contrast entities are an significant part of decision making progression. To assist judgment making it is useful to evaluate entities that share widespread utility but have distinguishing peripheral characteristics....