Description |
1 online resource (278 p.) |
Series |
Computer Science, Technology and Applications Ser |
|
Computer Science, Technology and Applications Ser
|
Contents |
Intro -- Contents -- Preface -- Chapter 1 -- Role of Position-Based Routing Protocols for Different Applications of VANET -- Abstract -- 1. Introduction -- 2. Communication Model for Vanet -- 3. Routing Protocol for Vanet -- 3.1. Topology Based Routing Protocol -- 3.1.1. Proactive Routing Protocols -- 3.1.2. Reactive Routing Protocols -- 3.1.3. Hybrid Routing Protocols -- 3.2. Position-Based Routing Protocols -- 3.3. Cluster-Based Routing Protocols -- 3.4. Geo Cast Based Routing Protocols -- 3.5. Broadcast Based Routing Protocols -- 4. Position-Based VANET Routing Protocol |
|
4.1. Non-Delay Tolerant Network -- 4.1.1. Beacon Based Position-Based Routing Protocol -- 4.1.1.1. Greedy Perimeter Stateless Routing (GPSR) -- 4.1.1.2. Geographic Source Routing (GSR) -- 4.1.1.3. Anchor Based Street and Traffic-Aware Routing (A-STAR) -- 4.1.1.4. Greedy Perimeter Coordinator Routing (GPCR) -- 4.1.1.5. Connectivity Aware Routing protocol (CAR) -- 4.1.2. Non-Beacon Based Position-Based Routing Protocol -- 4.1.2.1. Contention Based Forwarding (CBF) -- 4.1.3. Hybrid Routing Protocol -- 4.1.3.1. Topology Assist Geo Opportunistic Routing (TO-GO) -- 4.2. Delay Tolerant Network |
|
4.2.1. Vehicle Assisted Data Delivery (VADD) -- 4.2.2. Reactive Pseudo-Suboptimal-Path Selection Routing (RPS) -- 4.3. Hybrid Network -- 4.3.1. GeoDTN + NAV -- 4.3.2. Connectivity Aware Minimum Delay Geographic Routing Protocol (CMGR) -- Conclusion and Future Scope -- References -- Chapter 2 -- Elliptic Curve Cryptography in Intelligent Transport Systems -- Abstract -- Introduction -- ITS Applications and Security -- Security in ITS -- Elliptic Curve Cryptography -- Elliptic Curve -- Domain Parameters of the Elliptic Curve -- Point Addition and Point Multiplication |
|
Different Multiplication Techniques -- Proposed Architecture -- Endomorphism -- Efficient Usage of Endomorphism in ECDSA -- Calculations Using Endomorphism -- Point Adder -- Point Multiplier -- LUT Main -- Proposed Architecture for ≤ -- Total Delay -- Architecture for ≤ -- U1-k Module -- Results -- Validation Results -- Computational Time Analysis -- Memory Utilization -- Comparison with Other Implementations -- Discussion -- Conclusion and Future Work -- References -- Chapter 3 -- Exploitation of Network Coding in On-Demand Wireless Data Broadcast -- Chapter 4 |
|
Fault Diagnosis Techniques for Mobile Wireless Networks -- Abstract -- Introduction -- Unreliable Wireless Connections -- Dynamic and Arbitrary Network Topology -- Resource Limitations -- Minimum Bandwidth Usage -- Distributed Diagnosis -- Adaptable -- Scalability -- Heterogeneous -- Self-Diagnosis -- Dependability: Attributes, Threats, and Means -- Availability -- Reliability -- Safety -- Integrity -- Maintainability -- Fault Prevention Techniques -- Fault Tolerance Techniques -- Fault Removal Techniques -- Fault Forecasting Techniques -- Fault Diagnosis -- Fault Diagnosis Techniques |
Notes |
Description based upon print version of record |
|
Test-Based Techniques |
Subject |
Wireless communication systems.
|
|
Wireless power transmission.
|
|
Wireless communication systems
|
|
Wireless power transmission
|
Form |
Electronic book
|
Author |
Nawaz Ali, G. G. Md., editor
|
|
Noor-A-Rahim, Md., editor
|
|
Kar, Pushpendu, editor
|
ISBN |
1536180394 |
|
9781536180398 |
|