A Novel Method for VANET Improvement using Cloud Computing
Authors
Abstract:
In this paper, we present a novel algorithm for VANET using cloud computing. We accomplish processing, routing and traffic control in a centralized and parallel way by adding one or more server to the network. Each car or node is considered a Client, in such a manner that routing, traffic control, getting information from client and data processing and storing are performed by one or more server in different bases. The procedure is about each client that receives its situation by GPS system and sends it online to the concerned server via GPRS networks. In order to perform routing and displaying data, each client sends a request to server. All processes and operations will be executable by the software which is inside the server. Finally, we propose an algorithm to work in server and make decision on route selection on the basis of three priorities of traffic, safety and shortest route. This algorithm is represented for the first time. The results indicate that by using this method VANET network is improved. By using this algorithm, we can communicate generally, not regionally, and improvement of processing and accurate statistics is achieved. In fact, the processing in the server is Fuzzy. It means that these priorities are Fuzzy.
similar resources
a novel method for vanet improvement using cloud computing
in this paper, we present a novel algorithm for vanet using cloud computing. we accomplish processing, routing and traffic control in a centralized and parallel way by adding one or more server to the network. each car or node is considered a client, in such a manner that routing, traffic control, getting information from client and data processing and storing are performed by one or more serve...
full textA novel method for locating the local terrestrial laser scans in a global aerial point cloud
In addition to the heterogeneity of aerial and terrestrial views, the small scale terrestrial point clouds are hardly comparable with large scale and overhead aerial point clouds. A hierarchical method is proposed for automatic locating of terrestrial scans in aerial point cloud. The proposed method begins with detecting the candidate positions for the deployment of the terrestrial laser scanne...
full textCloud Computing; A New Approach to Learning and Learning
Introduction: The cloud computing and services, as a technological solution for developing educational services, can accelerate the provision and expansion of these highly useful services. This study intended to provide an overall picture of practical areas of learning services based on cloud computing teaching and learning equipment. Methods: This was a theoretical hybrid research study in whi...
full textA Cloud Computing Implementation of XML Indexing Method Using Hadoop
With the increasing of data at an incredible rate, the development of cloud computing technologies is of critical importance to the advances of researches. The Apache Hadoop has become a widely used open source cloud computing framework that provides a distributed file system for large scale data processing. In this paper, we present a cloud computing implementation of an XML indexing method ca...
full textEfficient Data Mining with Evolutionary Algorithms for Cloud Computing Application
With the rapid development of the internet, the amount of information and data which are produced, are extremely massive. Hence, client will be confused with huge amount of data, and it is difficult to understand which ones are useful. Data mining can overcome this problem. While data mining is using on cloud computing, it is reducing time of processing, energy usage and costs. As the speed of ...
full textAssessment Methodology for Anomaly-Based Intrusion Detection in Cloud Computing
Cloud computing has become an attractive target for attackers as the mainstream technologies in the cloud, such as the virtualization and multitenancy, permit multiple users to utilize the same physical resource, thereby posing the so-called problem of internal facing security. Moreover, the traditional network-based intrusion detection systems (IDSs) are ineffective to be deployed in the cloud...
full textMy Resources
Journal title
volume 02 issue 1
pages 39- 44
publication date 2013-12-01
By following a journal you will be notified via email when a new issue of this journal is published.
Keywords
Hosted on Doprax cloud platform doprax.com
copyright © 2015-2023