TDB Based Optimistic RSUs Deployment in VANETs
Journal Title: International Journal of Computer Science & Engineering Technology - Year 2013, Vol 4, Issue 6
Abstract
Now–a–days Vehicular Ad Hoc Networks (VANETs) has attracted the attention of both the industry and academia. Roadside units (RSUs) are one of the fundamental components of Vehicular ad hoc network (VANET). VANET comprises of moving vehicles communicating with each other. During the initial stages of VANET, it is not possible to deploy more and more number of RSUs; it is so because of the lack of market penetration and/or due to the sky-high deployment costs of the RSUs. Thus, there is a need to optimally place a limited number of RSUs in a given region or road in order to achieve maximum performance. In this paper, we present a so-called scalable TDB based RSUs deployment algorithm with a goal of minimizing the parallel time taken to place roadside units in given area and to attain high efficiency and cover maximum area. The performance of the proposed algorithm and optimization strategy is assessed by evaluating different parameters like efficiency, power consumption, serial elapsed time, parallel elapsed time, speedup and overheads incurred in running the algorithm in parallel.
Authors and Affiliations
Ramneek kaur
Named Entity Recognition in Punjabi Using Hidden Markov Model
Named Entity Recognition (NER) is a task to discover the Named Entities (NEs) in a document and then categorize these NEs into diverse Named Entity classes such as Name of Person, Location, River, Organization etc. Since...
Comparative evaluation of Recursive Dimensional Cutting Packet Classification, DimCut, with Analysis
an infinitely expanding number of network appliances are utilising packet classifiers to fulfil Quality of Service, security, and traffic engineering tasks. Packet classification is an important role of firewalls and rou...
Stegocrypto - A Review Of Steganography Techniques Using Cryptography
The information security has become essential part of today’s world due to extensive use of internet. The privacy of secret data can be achieved with two classical methods of data security namely Cryptography and Stegano...
Identity-Based Localization Attacks in Wireless Networks
Wireless networks are helpless to identity based attacks, as well as spoofing and Sybil attacks, which allow for many other form of attacks on the networks. Even though the identity of a node can be confirmed through cry...
Effect of Different Modulation on PAPR and Its Reduction
As the technology grow in wireless communication, the concept of multicarrier modulation come into picture. Orthogonal Frequency Division Multiplex(OFDM) prove itself invaluable for multicarrier modulation.OFDM subcarrie...