Design and Application of a Resource Allocation Method for CAEVs Internet of Things Based on Swarm Intelligence Computing

نویسندگان

چکیده

The Internet of Things (IoT) faces significant challenges in the requirements sensitive task latency, reasonable resource allocation and reliability for transactions. This paper introduces a novel method road IoT context connected autonomous electric vehicles (CAEVs). proposed algorithm leverages ant colony (ACA) to effectively allocate coordinate resources within groups CAEVs. By considering energy consumption pheromone volatilization, coordination process are optimized. To improve linear packet loss RED, we adopt advanced ACA CRED NS2 platform. experimental results demonstrate that outperforms RED rate delay time, significantly enhancing system efficiency performance. Furthermore, combination successfully mitigates short-term congestion identifies optimized paths with minimal delay.

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

application of upfc based on svpwm for power quality improvement

در سالهای اخیر،اختلالات کیفیت توان مهمترین موضوع می باشد که محققان زیادی را برای پیدا کردن راه حلی برای حل آن علاقه مند ساخته است.امروزه کیفیت توان در سیستم قدرت برای مراکز صنعتی،تجاری وکاربردهای بیمارستانی مسئله مهمی می باشد.مشکل ولتاژمثل شرایط افت ولتاژواضافه جریان ناشی از اتصال کوتاه مدار یا وقوع خطا در سیستم بیشتر مورد توجه می باشد. برای مطالعه افت ولتاژ واضافه جریان،محققان زیادی کار کرده ...

15 صفحه اول

Swarm Intelligence for Perception Layer Design of Internet of Things

Internet of Things is the extension and expansion of Internet from the virtual world to the real world, in which a large number of resource-constrained devices are used to collaborative perception, and it identifies objects and gathers information in the case of no centralized control, no global model. However, the swarm intelligence can take advantage of many simple autonomous individuals to e...

متن کامل

A Mutual Authentication Method for Internet of Things

Today, we are witnessing the expansion of various Internet of Things (IoT) applications and services such as surveillance and health. These services are delivered to users via smart devices anywhere and anytime. Forecasts show that the IoT, which is controlled online in the user environment, will reach 25 billion devices worldwide by 2020. Data security is one of the main concerns in the IoT. ...

متن کامل

investigating the feasibility of a proposed model for geometric design of deployable arch structures

deployable scissor type structures are composed of the so-called scissor-like elements (sles), which are connected to each other at an intermediate point through a pivotal connection and allow them to be folded into a compact bundle for storage or transport. several sles are connected to each other in order to form units with regular polygonal plan views. the sides and radii of the polygons are...

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Electronics

سال: 2023

ISSN: ['2079-9292']

DOI: https://doi.org/10.3390/electronics12132997