a novel method for vanet improvement using cloud computing

Authors

saied raeeszadeh

reza sabbaghi-nadooshan

abstract

in this paper, we present a novel algorithm for vanet using cloud computing. we accomplish processing, routing and traffic control in a centralized and parallel way by adding one or more server to the network. each car or node is considered a client, in such a manner that routing, traffic control, getting information from client and data processing and storing are performed by one or more server in different bases. the procedure is about each client that receives its situation by gps system and sends it online to the concerned server via gprs networks. in order to perform routing and displaying data, each client sends a request to server. all processes and operations will be executable by the software which is inside the server. finally, we propose an algorithm to work in server and make decision on route selection on the basis of three priorities of traffic, safety and shortest route. this algorithm is represented for the first time. the results indicate that by using this method vanet network is improved. by using this algorithm, we can communicate generally, not regionally, and improvement of processing and accurate statistics is achieved. in fact, the processing in the server is fuzzy. it means that these priorities are fuzzy.

Upgrade to premium to download articles

Sign up to access the full text

Already have an account?login

similar resources

A Novel Method for VANET Improvement using Cloud Computing

In this paper, we present a novel algorithm for VANET using cloud computing. We accomplish processing, routing and traffic control in a centralized and parallel way by adding one or more server to the network. Each car or node is considered a Client, in such a manner that routing, traffic control, getting information from client and data processing and storing are performed by one or more serve...

full text

A novel method for locating the local terrestrial laser scans in a global aerial point cloud

In addition to the heterogeneity of aerial and terrestrial views, the small scale terrestrial point clouds are hardly comparable with large scale and overhead aerial point clouds. A hierarchical method is proposed for automatic locating of terrestrial scans in aerial point cloud. The proposed method begins with detecting the candidate positions for the deployment of the terrestrial laser scanne...

full text

Cloud Computing; A New Approach to Learning and Learning

Introduction: The cloud computing and services, as a technological solution for developing educational services, can accelerate the provision and expansion of these highly useful services. This study intended to provide an overall picture of practical areas of learning services based on cloud computing teaching and learning equipment. Methods: This was a theoretical hybrid research study in whi...

full text

A Cloud Computing Implementation of XML Indexing Method Using Hadoop

With the increasing of data at an incredible rate, the development of cloud computing technologies is of critical importance to the advances of researches. The Apache Hadoop has become a widely used open source cloud computing framework that provides a distributed file system for large scale data processing. In this paper, we present a cloud computing implementation of an XML indexing method ca...

full text

Efficient Data Mining with Evolutionary Algorithms for Cloud Computing Application

With the rapid development of the internet, the amount of information and data which are produced, are extremely massive. Hence, client will be confused with huge amount of data, and it is difficult to understand which ones are useful. Data mining can overcome this problem. While data mining is using on cloud computing, it is reducing time of processing, energy usage and costs. As the speed of ...

full text

Assessment Methodology for Anomaly-Based Intrusion Detection in Cloud Computing

Cloud computing has become an attractive target for attackers as the mainstream technologies in the cloud, such as the virtualization and multitenancy, permit multiple users to utilize the same physical resource, thereby posing the so-called problem of internal facing security. Moreover, the traditional network-based intrusion detection systems (IDSs) are ineffective to be deployed in the cloud...

full text

My Resources

Save resource for easier access later


Journal title:
international journal of smart electrical engineering

Publisher: islamic azad university,central tehran branch

ISSN 2251-9246

volume 02

issue 1 2013

Hosted on Doprax cloud platform doprax.com

copyright © 2015-2023