Enviar pesquisa
Carregar
Signature seeking drive for incentive based ad dissemination
•
0 gostou
•
245 visualizações
IAEME Publication
Seguir
Tecnologia
Negócios
Denunciar
Compartilhar
Denunciar
Compartilhar
1 de 9
Recomendados
ANET: Technical and Future Challenges with a Real Time Vehicular Traffic Simu...
ANET: Technical and Future Challenges with a Real Time Vehicular Traffic Simu...
IJERA Editor
Autonomous driving
Autonomous driving
tangolima
Implementing Secured and Comport Transportation using Vehicular Ad-Hoc Networ...
Implementing Secured and Comport Transportation using Vehicular Ad-Hoc Networ...
ijtsrd
[IJET-V1I5P11]Authors: Medhavi Malik, Rupika Dureja
[IJET-V1I5P11]Authors: Medhavi Malik, Rupika Dureja
IJET - International Journal of Engineering and Techniques
Connected Vehicle 101 - US Department of Transportation
Connected Vehicle 101 - US Department of Transportation
Andy Palanisamy
Vehicular network-project-fin
Vehicular network-project-fin
ASMA HADELI
Way to green intelligent traffic control with vanet
Way to green intelligent traffic control with vanet
IAEME Publication
Co Car Project Germany - Brochure M2M
Co Car Project Germany - Brochure M2M
Geeks and Com'
Recomendados
ANET: Technical and Future Challenges with a Real Time Vehicular Traffic Simu...
ANET: Technical and Future Challenges with a Real Time Vehicular Traffic Simu...
IJERA Editor
Autonomous driving
Autonomous driving
tangolima
Implementing Secured and Comport Transportation using Vehicular Ad-Hoc Networ...
Implementing Secured and Comport Transportation using Vehicular Ad-Hoc Networ...
ijtsrd
[IJET-V1I5P11]Authors: Medhavi Malik, Rupika Dureja
[IJET-V1I5P11]Authors: Medhavi Malik, Rupika Dureja
IJET - International Journal of Engineering and Techniques
Connected Vehicle 101 - US Department of Transportation
Connected Vehicle 101 - US Department of Transportation
Andy Palanisamy
Vehicular network-project-fin
Vehicular network-project-fin
ASMA HADELI
Way to green intelligent traffic control with vanet
Way to green intelligent traffic control with vanet
IAEME Publication
Co Car Project Germany - Brochure M2M
Co Car Project Germany - Brochure M2M
Geeks and Com'
Dynamic Real time taxi ride-sharing android Application
Dynamic Real time taxi ride-sharing android Application
IRJET Journal
Review of Security and Privacy Scheme for Vehicular Ad Hoc Networks (VANETs)
Review of Security and Privacy Scheme for Vehicular Ad Hoc Networks (VANETs)
Dr. Amarjeet Singh
Traffic Congestion Prediction using Deep Reinforcement Learning in Vehicular ...
Traffic Congestion Prediction using Deep Reinforcement Learning in Vehicular ...
IJCNCJournal
Cisco Smart Intersections: IoT insights using video analytics and AI
Cisco Smart Intersections: IoT insights using video analytics and AI
Carl Jackson
Ivc sem doc
Ivc sem doc
Bindu Priya Reddy
03-Event Notification in VANET with Traffic Congestion Detection and Congesti...
03-Event Notification in VANET with Traffic Congestion Detection and Congesti...
Sivaram P
Inter vehicular communication
Inter vehicular communication
MSharathRajan
Vehicle-2-Vehicle Communication Based on Wireless Sensor Network
Vehicle-2-Vehicle Communication Based on Wireless Sensor Network
journalBEEI
Introduction to the connected vehicle imsa 2015 annual conference
Introduction to the connected vehicle imsa 2015 annual conference
Jim Frazer
Ijetr042176
Ijetr042176
Engineering Research Publication
Aodv routing protocol implementation design
Aodv routing protocol implementation design
Prof Ansari
Future mobile networks connected and autonomous cars
Future mobile networks connected and autonomous cars
lammya aa
Connected Cars - Use Cases for Indian Scenario
Connected Cars - Use Cases for Indian Scenario
HCL Technologies
Truck Platooning at TTI
Truck Platooning at TTI
Texas A&M Transportation Institute
The Autonomous Revolution of Vehicles & Transportation 6/12/19
The Autonomous Revolution of Vehicles & Transportation 6/12/19
Mark Goldstein
Smart Card: A study of new invention on bus fare in Dhaka city
Smart Card: A study of new invention on bus fare in Dhaka city
Md. Abdul Munem
Dedicated roads for autonomous vehicles
Dedicated roads for autonomous vehicles
Jeffrey Funk
Connected cars - Internet of Things Mumbai (IoTMUM)
Connected cars - Internet of Things Mumbai (IoTMUM)
Sachin Pukale
Vision-based real-time vehicle detection and vehicle speed measurement using ...
Vision-based real-time vehicle detection and vehicle speed measurement using ...
JANAK TRIVEDI
A Synopsis of Simulation and Mobility Modeling in Vehicular Ad-hoc Networks (...
A Synopsis of Simulation and Mobility Modeling in Vehicular Ad-hoc Networks (...
IOSR Journals
Email Signatures For Business
Email Signatures For Business
Bruce Jones
A survey on secured data outsourcing in cloud computing
A survey on secured data outsourcing in cloud computing
IAEME Publication
Mais conteúdo relacionado
Mais procurados
Dynamic Real time taxi ride-sharing android Application
Dynamic Real time taxi ride-sharing android Application
IRJET Journal
Review of Security and Privacy Scheme for Vehicular Ad Hoc Networks (VANETs)
Review of Security and Privacy Scheme for Vehicular Ad Hoc Networks (VANETs)
Dr. Amarjeet Singh
Traffic Congestion Prediction using Deep Reinforcement Learning in Vehicular ...
Traffic Congestion Prediction using Deep Reinforcement Learning in Vehicular ...
IJCNCJournal
Cisco Smart Intersections: IoT insights using video analytics and AI
Cisco Smart Intersections: IoT insights using video analytics and AI
Carl Jackson
Ivc sem doc
Ivc sem doc
Bindu Priya Reddy
03-Event Notification in VANET with Traffic Congestion Detection and Congesti...
03-Event Notification in VANET with Traffic Congestion Detection and Congesti...
Sivaram P
Inter vehicular communication
Inter vehicular communication
MSharathRajan
Vehicle-2-Vehicle Communication Based on Wireless Sensor Network
Vehicle-2-Vehicle Communication Based on Wireless Sensor Network
journalBEEI
Introduction to the connected vehicle imsa 2015 annual conference
Introduction to the connected vehicle imsa 2015 annual conference
Jim Frazer
Ijetr042176
Ijetr042176
Engineering Research Publication
Aodv routing protocol implementation design
Aodv routing protocol implementation design
Prof Ansari
Future mobile networks connected and autonomous cars
Future mobile networks connected and autonomous cars
lammya aa
Connected Cars - Use Cases for Indian Scenario
Connected Cars - Use Cases for Indian Scenario
HCL Technologies
Truck Platooning at TTI
Truck Platooning at TTI
Texas A&M Transportation Institute
The Autonomous Revolution of Vehicles & Transportation 6/12/19
The Autonomous Revolution of Vehicles & Transportation 6/12/19
Mark Goldstein
Smart Card: A study of new invention on bus fare in Dhaka city
Smart Card: A study of new invention on bus fare in Dhaka city
Md. Abdul Munem
Dedicated roads for autonomous vehicles
Dedicated roads for autonomous vehicles
Jeffrey Funk
Connected cars - Internet of Things Mumbai (IoTMUM)
Connected cars - Internet of Things Mumbai (IoTMUM)
Sachin Pukale
Vision-based real-time vehicle detection and vehicle speed measurement using ...
Vision-based real-time vehicle detection and vehicle speed measurement using ...
JANAK TRIVEDI
A Synopsis of Simulation and Mobility Modeling in Vehicular Ad-hoc Networks (...
A Synopsis of Simulation and Mobility Modeling in Vehicular Ad-hoc Networks (...
IOSR Journals
Mais procurados
(20)
Dynamic Real time taxi ride-sharing android Application
Dynamic Real time taxi ride-sharing android Application
Review of Security and Privacy Scheme for Vehicular Ad Hoc Networks (VANETs)
Review of Security and Privacy Scheme for Vehicular Ad Hoc Networks (VANETs)
Traffic Congestion Prediction using Deep Reinforcement Learning in Vehicular ...
Traffic Congestion Prediction using Deep Reinforcement Learning in Vehicular ...
Cisco Smart Intersections: IoT insights using video analytics and AI
Cisco Smart Intersections: IoT insights using video analytics and AI
Ivc sem doc
Ivc sem doc
03-Event Notification in VANET with Traffic Congestion Detection and Congesti...
03-Event Notification in VANET with Traffic Congestion Detection and Congesti...
Inter vehicular communication
Inter vehicular communication
Vehicle-2-Vehicle Communication Based on Wireless Sensor Network
Vehicle-2-Vehicle Communication Based on Wireless Sensor Network
Introduction to the connected vehicle imsa 2015 annual conference
Introduction to the connected vehicle imsa 2015 annual conference
Ijetr042176
Ijetr042176
Aodv routing protocol implementation design
Aodv routing protocol implementation design
Future mobile networks connected and autonomous cars
Future mobile networks connected and autonomous cars
Connected Cars - Use Cases for Indian Scenario
Connected Cars - Use Cases for Indian Scenario
Truck Platooning at TTI
Truck Platooning at TTI
The Autonomous Revolution of Vehicles & Transportation 6/12/19
The Autonomous Revolution of Vehicles & Transportation 6/12/19
Smart Card: A study of new invention on bus fare in Dhaka city
Smart Card: A study of new invention on bus fare in Dhaka city
Dedicated roads for autonomous vehicles
Dedicated roads for autonomous vehicles
Connected cars - Internet of Things Mumbai (IoTMUM)
Connected cars - Internet of Things Mumbai (IoTMUM)
Vision-based real-time vehicle detection and vehicle speed measurement using ...
Vision-based real-time vehicle detection and vehicle speed measurement using ...
A Synopsis of Simulation and Mobility Modeling in Vehicular Ad-hoc Networks (...
A Synopsis of Simulation and Mobility Modeling in Vehicular Ad-hoc Networks (...
Destaque
Email Signatures For Business
Email Signatures For Business
Bruce Jones
A survey on secured data outsourcing in cloud computing
A survey on secured data outsourcing in cloud computing
IAEME Publication
Implementing eichelay formula in govt. construction projects
Implementing eichelay formula in govt. construction projects
IAEME Publication
Brazil mobile market: an insight by Neomobile
Brazil mobile market: an insight by Neomobile
Neomobile
Brystforstørrelse hos nygart
Brystforstørrelse hos nygart
Nygart
Criando e trabalhando com e mail
Criando e trabalhando com e mail
infoeducativa
Microsoft power point originale
Microsoft power point originale
Glenn Ortega
Destaque
(7)
Email Signatures For Business
Email Signatures For Business
A survey on secured data outsourcing in cloud computing
A survey on secured data outsourcing in cloud computing
Implementing eichelay formula in govt. construction projects
Implementing eichelay formula in govt. construction projects
Brazil mobile market: an insight by Neomobile
Brazil mobile market: an insight by Neomobile
Brystforstørrelse hos nygart
Brystforstørrelse hos nygart
Criando e trabalhando com e mail
Criando e trabalhando com e mail
Microsoft power point originale
Microsoft power point originale
Semelhante a Signature seeking drive for incentive based ad dissemination
Design Approach for Vehicle To Vehicle (V2V) Dissemination of Messages in Veh...
Design Approach for Vehicle To Vehicle (V2V) Dissemination of Messages in Veh...
IJERA Editor
SIMULATION & VANET: TOWARDS A NEW RELIABLE AND OPTIMAL DATA DISSEMINATION MODEL
SIMULATION & VANET: TOWARDS A NEW RELIABLE AND OPTIMAL DATA DISSEMINATION MODEL
pijans
Technical Review on Different Applications, Challenges and Security in VANET
Technical Review on Different Applications, Challenges and Security in VANET
Pallavi Agarwal
T-ITS-12-09-0370.R1.pdf
T-ITS-12-09-0370.R1.pdf
ssusera9ccce1
[IJET-V1I3P19] Authors :Nilesh B Karande , Nagaraju Bogiri.
[IJET-V1I3P19] Authors :Nilesh B Karande , Nagaraju Bogiri.
IJET - International Journal of Engineering and Techniques
The New Route Discovery Technique for Secure Message Delivery in Vehicular Ad...
The New Route Discovery Technique for Secure Message Delivery in Vehicular Ad...
IRJET Journal
Using Computing Methods to Secure VANET
Using Computing Methods to Secure VANET
Dr.Irshad Ahmed Sumra
A Broadcasting Scheme for Message Dissemination in VANET
A Broadcasting Scheme for Message Dissemination in VANET
IJERA Editor
Review of Prevention Schemes for Modification Attack in Vehicular Ad hoc Netw...
Review of Prevention Schemes for Modification Attack in Vehicular Ad hoc Netw...
Dr. Amarjeet Singh
VANET for Security using Cryptography
VANET for Security using Cryptography
Pallavi Agarwal
VCN: Vehicular Cloud Network Using RBMR Protocol for Efficient Link Stability...
VCN: Vehicular Cloud Network Using RBMR Protocol for Efficient Link Stability...
IJLT EMAS
Towards a new approach of data dissemination in vanets networks
Towards a new approach of data dissemination in vanets networks
csandit
TOWARDS A NEW APPROACH OF DATA DISSEMINATION IN VANETS NETWORKS
TOWARDS A NEW APPROACH OF DATA DISSEMINATION IN VANETS NETWORKS
cscpconf
Master thesis on Vehicular Ad hoc Networks (VANET)
Master thesis on Vehicular Ad hoc Networks (VANET)
Prof Ansari
Vehicular adhoc network for communication
Vehicular adhoc network for communication
athirayanpericse
Vehicular Messaging In IOT Using Epidemic Routing
Vehicular Messaging In IOT Using Epidemic Routing
Editor IJCATR
Algorithm for Security in Autonomous Cars
Algorithm for Security in Autonomous Cars
Association of Scientists, Developers and Faculties
VANET: Trust and Hashing
VANET: Trust and Hashing
Pallavi Agarwal
Advanced Driver Assistance System using Vehicle to Vehicle Communication
Advanced Driver Assistance System using Vehicle to Vehicle Communication
IRJET Journal
Advanced Driver Assistance System using Vehicle to Vehicle Communication
Advanced Driver Assistance System using Vehicle to Vehicle Communication
IRJET Journal
Semelhante a Signature seeking drive for incentive based ad dissemination
(20)
Design Approach for Vehicle To Vehicle (V2V) Dissemination of Messages in Veh...
Design Approach for Vehicle To Vehicle (V2V) Dissemination of Messages in Veh...
SIMULATION & VANET: TOWARDS A NEW RELIABLE AND OPTIMAL DATA DISSEMINATION MODEL
SIMULATION & VANET: TOWARDS A NEW RELIABLE AND OPTIMAL DATA DISSEMINATION MODEL
Technical Review on Different Applications, Challenges and Security in VANET
Technical Review on Different Applications, Challenges and Security in VANET
T-ITS-12-09-0370.R1.pdf
T-ITS-12-09-0370.R1.pdf
[IJET-V1I3P19] Authors :Nilesh B Karande , Nagaraju Bogiri.
[IJET-V1I3P19] Authors :Nilesh B Karande , Nagaraju Bogiri.
The New Route Discovery Technique for Secure Message Delivery in Vehicular Ad...
The New Route Discovery Technique for Secure Message Delivery in Vehicular Ad...
Using Computing Methods to Secure VANET
Using Computing Methods to Secure VANET
A Broadcasting Scheme for Message Dissemination in VANET
A Broadcasting Scheme for Message Dissemination in VANET
Review of Prevention Schemes for Modification Attack in Vehicular Ad hoc Netw...
Review of Prevention Schemes for Modification Attack in Vehicular Ad hoc Netw...
VANET for Security using Cryptography
VANET for Security using Cryptography
VCN: Vehicular Cloud Network Using RBMR Protocol for Efficient Link Stability...
VCN: Vehicular Cloud Network Using RBMR Protocol for Efficient Link Stability...
Towards a new approach of data dissemination in vanets networks
Towards a new approach of data dissemination in vanets networks
TOWARDS A NEW APPROACH OF DATA DISSEMINATION IN VANETS NETWORKS
TOWARDS A NEW APPROACH OF DATA DISSEMINATION IN VANETS NETWORKS
Master thesis on Vehicular Ad hoc Networks (VANET)
Master thesis on Vehicular Ad hoc Networks (VANET)
Vehicular adhoc network for communication
Vehicular adhoc network for communication
Vehicular Messaging In IOT Using Epidemic Routing
Vehicular Messaging In IOT Using Epidemic Routing
Algorithm for Security in Autonomous Cars
Algorithm for Security in Autonomous Cars
VANET: Trust and Hashing
VANET: Trust and Hashing
Advanced Driver Assistance System using Vehicle to Vehicle Communication
Advanced Driver Assistance System using Vehicle to Vehicle Communication
Advanced Driver Assistance System using Vehicle to Vehicle Communication
Advanced Driver Assistance System using Vehicle to Vehicle Communication
Mais de IAEME Publication
IAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME Publication
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
IAEME Publication
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
IAEME Publication
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
IAEME Publication
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
IAEME Publication
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
IAEME Publication
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
IAEME Publication
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IAEME Publication
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
IAEME Publication
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
IAEME Publication
GANDHI ON NON-VIOLENT POLICE
GANDHI ON NON-VIOLENT POLICE
IAEME Publication
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
IAEME Publication
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
IAEME Publication
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
IAEME Publication
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
IAEME Publication
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
IAEME Publication
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
IAEME Publication
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
IAEME Publication
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
IAEME Publication
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
IAEME Publication
Mais de IAEME Publication
(20)
IAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME_Publication_Call_for_Paper_September_2022.pdf
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
GANDHI ON NON-VIOLENT POLICE
GANDHI ON NON-VIOLENT POLICE
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
Último
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
Dropbox
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
Product Anonymous
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
sammart93
Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..
Christopher Logan Kennedy
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
apidays
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Orbitshub
presentation ICT roal in 21st century education
presentation ICT roal in 21st century education
jfdjdjcjdnsjd
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
Andrey Devyatkin
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptx
Remote DBA Services
Elevate Developer Efficiency & build GenAI Application with Amazon Q
Elevate Developer Efficiency & build GenAI Application with Amazon Q
Bhuvaneswari Subramani
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
MadyBayot
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Edi Saputra
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
Nanddeep Nachan
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Deepika Singh
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
apidays
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Victor Rentea
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
UiPathCommunity
Último
(20)
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering Developers
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
presentation ICT roal in 21st century education
presentation ICT roal in 21st century education
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptx
Elevate Developer Efficiency & build GenAI Application with Amazon Q
Elevate Developer Efficiency & build GenAI Application with Amazon Q
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
Signature seeking drive for incentive based ad dissemination
1.
International Journal of
Computer Engineering and Technology (IJCET), ISSN 0976- 6367(Print), ISSN 0976 – 6375(Online) Volume 4, Issue 3, May – June (2013), © IAEME 23 SIGNATURE SEEKING DRIVE FOR INCENTIVE BASED AD DISSEMINATION IN VEHICULAR NETWORKS Dr.S.Rajalakshmi1 , S.T.Tharani2 1 Associate Professor, Department of Computer Science and Engineering, Jay Shriram Group of Institutions 2 Assistant Professor, Department of Computer Science and Engineering, Jay Shriram Group of Institutions ABSTRACT This paper explores the concept of vehicular adhoc network (VANET).Here, the communication nodes are vehicles. Each and every vehicle can communicate with each other and also can communicate with infrastructure for some service. This infrastructure is imagined to be presented along the roads. By using this vehicular adhoc network, the users can have more benefits and services. A promising application over vehicular adhoc network is, an advertiser can use this VANET to distribute their ads through vehicle to vehicle communication. Due to the non-cooperative node (Selfish and malicious nodes), this ad system cannot be realized until the correct incentives and security process are in place. The work describes the Signature Seeking Drive which is the secure framework, which performs the cooperative distribution of ad message between vehicular users in secure manner. The Public Key Infrastructure provided incentive to cooperative nodes. Our proposed work also search to develop an incentive system in which an ad provider can provides the rewards directly to the users and pedestrians also distribute their ads through their smart PDAs. Keywords - Vehicular Ad hoc Network (VANET), Ad Dissemination, Incentive, Public Key Infrastructure (PKI). I. INTRODUCTION This work introduced the vehicular ad hoc network, which performs on the road through the smart vehicle consists of computing resources, sensing devices and short range radios for communicating with other vehicles and also roadside infrastructure.Here,the main thing is networks on the road and it gives some services. An ad distribution through vehicle INTERNATIONAL JOURNAL OF COMPUTER ENGINEERING & TECHNOLOGY (IJCET) ISSN 0976 – 6367(Print) ISSN 0976 – 6375(Online) Volume 4, Issue 3, May-June (2013), pp. 23-31 © IAEME: www.iaeme.com/ijcet.asp Journal Impact Factor (2013): 6.1302 (Calculated by GISI) www.jifactor.com IJCET © I A E M E
2.
International Journal of
Computer Engineering and Technology (IJCET), ISSN 0976- 6367(Print), ISSN 0976 – 6375(Online) Volume 4, Issue 3, May – June (2013), © IAEME 24 to vehicle communication is the most truthful application over the networks. By using this system an ads can be distributed through vehicle to roadside communication by ad provider. Then other vehicles start to distribute those ads by forwarding them to another vehicle while moving when it received the information. Similarly each vehicle can forward those ads continuously for a particular time period. In this, the selfish users don’t want to forward the ads whenever it received the ads. The network by sending out dummy ads, without correct security, that’s why the incentive and security process has been taken. In such system, Public Key Infrastructure is the best way to satisfy the security requirements in vehicle communication by digital signature. It gives its certified identity and secure location verify scheme. By this authentication, security in VANETs becomes strong. This paper presented one secure incentive framework for ad distribution in VANET which is named as Signature Seeking Drive (SSD). It provides incentive to the users based on their ad services. It just likes a reward which is provided by micropayment charging/rewarding scheme. During the driving, it may collect many receipts. By using this receipt, user can exchange the receipt to virtual cashier and get some cash from receipt-providing nodes. By using this virtual cash, users can fill the gas for their vehicles in gas station. Goal of the paper Advertisers in all those types probably want to spread their ads in secure manner.However,from a viewpoint of vehicle users, those commercial ads are only give the benefit to the business companies and they are exploiting vehicle user’s resources for their own profit. Users probably want some type of incentive to stimulate cooperation. Thus the graceful compromise between these two sides is that advertisers pay charges for network resources or advertising charges. Vehicular ad system projected secure incentive framework for commercial ad spread in VANETs which is named as Signature Seeking Drive (SSD).This framework stimulates cooperative distribution of ad messages among vehicular users in a secure way and it also provided the secure ad distribution between the vehicles and pedestrians PDAs. II. SYSTEM MODEL In this section to described our vehicular network module. A.VANET Network module We used SWANS (Scalable Wireless Ad hoc Network Simulation) vehicular network simulator. SWANS have been shown to be scalable and efficient; it supported the large number of mobile nodes. SWANS fully implemented the IEEE 802.11a protocol. All vehicles in our simulations have a transmission range of 300m. The roadway is a four-lane divided highway of length 100 km. Vehicles are entered into that highway according to the Poisson distribution and travel at a maximum speed of 30 m/s. The simulation is run for 360 seconds and generated the 500 vehicles. In the 360-second simulation runtime, the maximum distance traveled by any vehicle is 10 km. In the high density case there are averages of 90 vehicles / km. In medium density traffic, there is an average of 66 vehicles / km and in low density there is an average of 53 vehicles / km.
3.
International Journal of
Computer Engineering and Technology (IJCET), ISSN 0976- 6367(Print), ISSN 0976 – 6375(Online) Volume 4, Issue 3, May – June (2013), © IAEME 25 In this module we develop a VANET Network model. In that each node (vehicle) can communicate with other nearby nodes (vehicles) to perform some useful applications. Our vehicular network module assumes that, each registered node keeps its own certificate [i.e., public/private key pair issued by a certificate authority (CA)] Certificate authority (CA) The certificate authority has two roles: 1) Government Authority 2) Vehicle Manufacturer In this the first one has many administrative problems, the vehicle manufacturer also trustworthy one. So we need to give proper security to our VANET. Vehicular Authority (VA) The vehicular authority (VA) is the authority provider; it is given the authority to all the vehicles to disseminate their ad in the VANET. The vehicle that get the permission from VANET only disseminate ad in the network.VA also maintain the all ad payment transaction. Utilize SWANS (Scalable Wireless Ad hoc Network Simulation) vehicular network simulator fully implements the IEEE 802.11a protocol Vehicles are with transmission range of 300m and the roadway used is a four-lane divided highway of length 100 km with total simulation time 360 seconds. A vehicle enters the highway according to a Poisson distribution and travel at a maximum speed of 30 m/s and the maximum distance traveled by any vehicle is 10 km. Each node (vehicle) can communicate with other nearby nodes (vehicles) or with fixed roadside (fixed node) infrastructure regarding safety-related warning functions, traffic management, infotainment, payment services, etc.., Fig.1. Vehicular network module
4.
International Journal of
Computer Engineering and Technology (IJCET), ISSN 0976- 6367(Print), ISSN 0976 – 6375(Online) Volume 4, Issue 3, May – June (2013), © IAEME 26 B. One Level Advertisement In one level advertisement the only one vehicle has the authority to disseminate the ad in the VANET. Other vehicles are not having the authority to reuse the ad and this module only suitable for local area communication. Notations Agreement with ADP Advertisement dissemination Approval for advertisement Receipt redemption One level advertis ement Fig. 2. One level advertisement
5.
International Journal of
Computer Engineering and Technology (IJCET), ISSN 0976- 6367(Print), ISSN 0976 – 6375(Online) Volume 4, Issue 3, May – June (2013), © IAEME 27 C. Multi Level Advertisement In Multi level advertisement each every vehicles have the authority to disseminate the ad in the VANET. The ad get by the one vehicle, it is nearer to the ad distribution point (ADP).That ad should be reused by all the vehicles that have the vehicular authority over the network. It is suitable for wide area communication. I→VA: Commercial advertiser (I) get permission from Vehicle authority (VA) to disseminate ad for a certain period of time and certain location VA→I: After approval from VA, I distribute its ad I →u: Vehicle (u) agrees to forward the ad of I at Ad u → v: “u” continues to advertise it to any newly encountered vehicle or PDA of pedestrian ”v” for a certain Receiving vehicles returns digitally signed reception for sending vehicle These receipts are exchangeable at Virtual Cashier (VC) VC → VA: Virtual Cashier (VC) sends the record to VA VA → I: VA charges I for ad dissemination of u as well as v Similarly v → w, w → x, x → y, y → z Multile vel Adverti sement Fig. 3 Multilevel Advertisement
6.
International Journal of
Computer Engineering and Technology (IJCET), ISSN 0976- 6367(Print), ISSN 0976 – 6375(Online) Volume 4, Issue 3, May – June (2013), © IAEME 28 Fig 4. Localized Advertisement Localized advertisement Provider S can specify/include its target advertising area along with the ad, and S’s ADP contacts with each approaching vehicle u LOCS is the center (location coordinates) of S’ target advertising area, and RNS is the intended adverting radius (from LOCS). u is not able to obtain a valid receipt outside the target area (as described below) it forwards ADS only within the specified target area. Locating information After the proper message exchange with ADP (depending on the ad-model used), u is ready to advertise ADS GPS-Based Approach: While in the target area (by checking if d (LOCu, LOCS) ≤ RNS, where d(i, j) is the distance between two locations i and j, and LOCu is u’s location coordinate available by GPS), adverting vehicle u may advertise ADS to any newly approaching vehicle v Infrastructure Based Approach Vehicles can obtain their location information from the infrastructure that broadcasts beacon signals. the existing cellular base stations periodically broadcast one beacon signal per second, and the signals carry information such as a cellular network identifier, location, timestamp, signature, gateway address, paging area ID, and other base station parameters. Using such information, ad-receiving node v can react to ADS forwarded from u
7.
International Journal of
Computer Engineering and Technology (IJCET), ISSN 0976- 6367(Print), ISSN 0976 – 6375(Online) Volume 4, Issue 3, May – June (2013), © IAEME 29 Start Initial registration of vehicles for VA and CA public key that becomes Advertiser (I) who needs to disseminate their ad request permission from After approval Advertiser distribute their ad for certain period and certain area A vehicle (u) agrees to forward I’s ad at Ad Distribution Point (ADP) Vehicle (u) continues to advertise it to any encountered vehicle or road side pedestrian’s PDA or smart phone using localization information Receiving vehicle v, returns digitally signed receipt for u. This is called single level ad If then v transmits to more nodes/vehicles and digitally signed receipt returned for sender nodes. This is called multilevel ad These receipts are exchangeable at VC where VC sends record to VA and it in turn charges advertiser (I) Stop Initial registration of pedestrian’s device for PA and CA public key that becomes preloaded Advertiser(I) request permission from Pedestrian Authority (PA) The pedestrian device (u) agrees to forward I’s ad at Ad Distribution Point (ADP) Pedestrian (u) continues to advertise it to any encountered vehicle or road side pedestrian’s PDA or smart phone using localization Receiver, returns digitally signed receipt for u. This is called single level ad dissemination Fig. 5. Vanet with PDA
8.
International Journal of
Computer Engineering and Technology (IJCET), ISSN 0976- 6367(Print), ISSN 0976 – 6375(Online) Volume 4, Issue 3, May – June (2013), © IAEME 30 D. Localized Advertisement In localized advertisement some advisers want to disseminate their ad in particular geographic area, for that purpose we used the localized model. Here we used the Location coordinates (LOCs), S is the ad distributor and RNs is the adverting radius. In this we used two approaches 1) GPS based Approach 2) Infrastructure based Approach In the GPS based approach to estimated the distance between the two locations, if that value is less than or equal to the RNs, after that only it disseminate the ad otherwise ad is not disseminated in the network. But in GPS based approach we have one disadvantage; in this not verify the receipt providing node authority. It should be satisfied in Infrastructure based approach; in this we verified the receipt providing node authority by using the beacon signal from base station, it should be nearer to the receipt providing node. E.VANET with PDA In this implemented the vehicular network with pedestrians Smart PDAs. Whenever the vehicle to vehicle communication (V2V) and vehicle to infrastructure communication (V2I) is not possible that time the advertiser send their ads to the nearby pedestrians Smart PDAs. Through those PDAs, that ad should be disseminating to the nearby vehicle. By using this approach the ad dissemination speed will be increased. In this work also the security overhead may be occurred and it should be managed by our Signature Seeking Drive framework. III CONCLUSION The dissemination of commercial advertisements in VANETs is based on practical aspects such as advertising intensity and dissemination locality. With both selfish users (incentives) and malicious users (security) the developed SSD secure incentive framework stimulates cooperative dissemination of ad messages among vehicular users in a secure way. The SSD employs the concept of virtual cash to charge and reward the provision of advertising service as an incentive for users in the network. The performance evaluation results of SSD through analysis and simulation experiments reveal its robustness in both incentive and security perspectives against various types of attacks and it showed the effectiveness of our advertisement models. REFERENCES 1. N. Ben Salem, L. Buttyan, J.-P. Hubaux, and M. Jakobsson, (2003), A Charging and Rewarding Scheme for Packet Forwarding, in Proc. ACM MobiHoc, pp. 13–24. 2. L. Buttyan and J. P. Hubaux, (2003), Stimulating cooperation in self organizing Mobile Ad hoc Networks, ACM J. Mobile Netw., Vol. 8, No. 5, pp. 579–592.
9.
International Journal of
Computer Engineering and Technology (IJCET), ISSN 0976- 6367(Print), ISSN 0976 – 6375(Online) Volume 4, Issue 3, May – June (2013), © IAEME 31 3. S. Buchegger and J.-Y. L. Boudec, (2002), Nodes bearing grudges: Towards Routing security, fairness, and robustness in mobile ad hoc networks, in Proc. Eur. Workshop Parallel, Distrib. Netw.-Based Process, pp. 403–410. 4. S. Eapkun, L. Buttyan, and J.-P. Hubaux, (2003), SECTOR: Secure tracking of Node encounters in multi-hop Wireless Network”, in Proc. ACMWorkshop SASN, pp. 21–32. 5. S. Eapkun and J.-P. Hubaux, (2005) “Secure positioning of wireless devices with Application to Sensor Networks”, in Proc. IEEE INFOCOM, Miami, FL, pp. 1917–1928. 6. J. Deng, R. Han, and S. Mishra, (2005), Defending against path-based DoS Attacks in Wireless Sensor Networks”, in Proc. ACM Workshop SASN, pp. 89–96. 7. A.Garyfalos and K. C. Almeroth, (2008), Coupons: A Multilevel Incentive Scheme for Information Dissemination in Mobile Networks”, IEEE Trans. Mobile Comput. Vol. 7, No. 6, pp. 792–804. 8. M. Felegyhazi, J.-P. Hubaux, and L. Buttyan, (2006), Nash equilibria of Packet Forwarding strategies in Wireless Ad hoc Networks”, IEEE Trans. Mobile Comput., Vol. 5, No. 5, pp. 463–476. 9. W. R. Heinzelman, J. Kulik, and H. Balakrishnan, (1999), Adaptive Protocols for Information Dissemination in Wireless Sensor Networks”, in Proc. ACM MobiCom, pp. 174–185. 10. Mohd Umar Farooq and Dr .Khaleel Ur Rahman Khan, “The Novel Techniques for Data Dissemination in Vehicular Networks to Triumph Over Broadcast Storm Problem”, International Journal of Advanced Research in Engineering & Technology (IJARET), Volume 4, Issue 3, 2013, pp. 264 - 272, ISSN Print: 0976-6480, ISSN Online: 0976-6499. 11. Thaker Minesh, S B Sharma and Yogesh Kosta, “A Survey: Variants of Energy Constrained Reactive Routing Protocols of Mobile Ad Hoc Networks”, International Journal of Electronics and Communication Engineering & Technology (IJECET), Volume 3, Issue 2, 2012, pp. 248 - 257, ISSN Print: 0976- 6464, ISSN Online: 0976 –6472