2019 International Conference on Automation, Computational and Technology Management (ICACTM) 2019
DOI: 10.1109/icactm.2019.8776703
|View full text |Cite
|
Sign up to set email alerts
|

Cluster Based Multi Hop Data Dissemination Protocol in V2V Networks using Whale Optimization Technique

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
4

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(4 citation statements)
references
References 16 publications
0
4
0
Order By: Relevance
“…In 2-hop communication, the CH can reach up to 2-hops of vehicle for its coverage. In protocol is proposed [79] by minimizing the overhead messages; however, sufficient results are not provided that can prove the stability of the protocol. CH selection and cluster creation in VMaSC:…”
Section: -Hop Protocolsmentioning
confidence: 99%
“…In 2-hop communication, the CH can reach up to 2-hops of vehicle for its coverage. In protocol is proposed [79] by minimizing the overhead messages; however, sufficient results are not provided that can prove the stability of the protocol. CH selection and cluster creation in VMaSC:…”
Section: -Hop Protocolsmentioning
confidence: 99%
“…A modified version of AddP is later proposed as Optimal Adaptive data dissemination Protocol OAddP [105], which deals with different traffic flow, utilizing prediction-based decision-making schemes to generate clusters and disseminate data. Selo et al proposed a distributed approach based on Coalitional Game Clustering (CGC) [106] that allows every vehicle to make a distributed cluster with other vehicles based on coalition value.…”
Section: Distributed Clusteringmentioning
confidence: 99%
“…Due to this, the proposed system using type-2 fuzzy is employed with belief entropy for dynamic threshold value. Let the QoF be expressed as follows, qQ } ‚# ; Yr # (14) where,…”
Section: Normal Data Routing In Vanetmentioning
confidence: 99%
“…Emergency message dissemination is also performed by a cluster based network, relay selection that is operated using fuzzy logic, optimization and other algorithms too [14][15][16][17][18]. The dissemination of messages always contains emergency data and hence it is required to be forwarded in short time within the deadline.…”
Section: Introductionmentioning
confidence: 99%