|
books
| book details |
Vehicular Ad-Hoc Networks: Applications and Technology
Edited by G. G. Md. Nawaz Ali
|
| on special |
normal price: R 6,882.95
Price: R 6,538.95
|
| book description |
From the past decade vehicular ad hoc networks got tremendous attention from the industry, academia and research community. According to US National Highway Traffic Safety Administration (NHTSA), there are more than 30 thousands fatalities caused by the vehicle accidents in the U.S. each year, which worth around $250 billion economic cost annually. Research shows that 82% of these accidents can be reduced by the successful deployment of vehicular networks, because nearly 75% percent of vehicular crashes are caused by inattentive drivers. Literally, vehicular ad hoc networks means a network forms by the vehicles. But it has been evolved to network with the infrastructure as well due to the inherent intermittent nature of vehicle-to-vehicle (V2V) connection. The high mobility of vehicles, wireless communication loss and range constraints are the main reason for this intermittent V2V connection. So, now vehicular networks means communication between vehicle-to-vehicle (V2V) and vehicle-to-infrastructure (V2I). There are billions of dollars invested to research, deployment and testing of vehicular networks. For the emerging connected and autonomous vehicle (CAV), a stable vehicular networks is the foremost requirement. It is now very much visible that CAV will be the future of Intelligent Transportation System (ITS). The book is dedicated to discuss for the techniques, applications and relevant technologies of vehicular ad hoc networks and its challenges. The first chapter discuss about the routing protocols of vehicular networks. It focuses on different position-based routing protocols and their mechanisms for the successful use of vehicular networks for different applications. The second chapter discusses on the security and privacy issues on vehicular networks. A well-known security technique called Elliptic Curve Cryptography (ECC) is discussed to secure vehicular data from various tampering attacks. The third chapter discusses on the on-demand wireless broadcasting mechanism for improving data dissemination performance in terms of data delivery ratio and response time. A network-coding based approach has been investigated for improving the overall performance of existing classical data broadcast algorithms. The fourth chapter describes how to get a dependable system in the lossy communication medium. This chapter discusses on a number of fault diagnosis techniques, their strengths and weaknesses, and it reviews their implementations in mobile wireless networks. The fifth chapter discusses the basics of Blockchain technology, applications, research challenges and opportunities in the field. Finally, chapter six discuss about the identification and mitigation of the faulty nodes in the wireless network.
| product details |
Normally shipped |
Publisher | Nova Science Publishers Inc
Published date | 30 Jul 2020
Language |
Format | Hardback
Pages | 276
Dimensions | 0 x 0 x 0mm (L x W x H)
Weight | 506g
ISBN | 978-1-5361-8038-1
Readership Age |
BISAC | computers / networking / general
| other options |
|
|
|
To view the items in your trolley please sign in.
| sign in |
|
|
| specials |
|
|
André Alexis
Paperback / softback
176 pages
was: R 280.95
now: R 252.95
|
A pack of dogs are granted the power of human thought - but what will it do to them? A surprising and insightful look at the beauty and perils of consciousness.
|
|
Carl Morrow
Paperback / softback
160 pages
was: R 320.95
now: R 288.95
|
In this uniquely Southern African book, Carl Morrow and Keith Kirsten guide readers step by step into the magical realms of bonsai as a hobby, horticultural practice and art form.
|
Our moment has seen the resurgence of an anarchist sensibility, from the uprisings in Seattle in 1999 to the Occupy movement of 2011.
|
|
|
|