2021
DOI: 10.32604/cmc.2020.014484
|View full text |Cite
|
Sign up to set email alerts
|

Cooperative Channel Assignment for VANETs Based on Dual Reinforcement Learning

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2

Citation Types

0
6
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
3

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(6 citation statements)
references
References 12 publications
0
6
0
Order By: Relevance
“…However, the centralized structure avoids contention collisions [18][19][20][21] because the central node also allocates an empty slot to each vehicle. In the centralized structure of TDMA, the central node must allocate timeslots efficiently and equitably to each vehicle.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…However, the centralized structure avoids contention collisions [18][19][20][21] because the central node also allocates an empty slot to each vehicle. In the centralized structure of TDMA, the central node must allocate timeslots efficiently and equitably to each vehicle.…”
Section: Related Workmentioning
confidence: 99%
“…However, safety requires that vehicular communication consider packet delivery and road characteristics. Although studies have been done to reduce the collision rate of packets using TDMA and clustering [16][17][18][19][20][21], the studies could not maximize the use of bandwidth because of inefficient DSRC multichannel usage and not considering the bidirectionality of the road traffic.…”
Section: Related Workmentioning
confidence: 99%
“…Recently, studies are being conducted to provide stable vehicular wireless communication [11][12][13][14]. The complexity of the offloading problem can be reduced if stable communication is ensured in task offloading.…”
Section: Introductionmentioning
confidence: 99%
“…Security in wireless networks has always been a core challenge, especially ad hoc networks where each time distinct nodes are likely to involve in network formation [7,8]. Similarly, the biggest threat for IoV is a security breach [9,10], which can cause a catastrophic sequence of chain accidents, traffic congestions, and diverting traffic to a specific path. The vehicular network has unique properties, unlike other wireless networks.…”
Section: Introductionmentioning
confidence: 99%
“…(dir_from ∧ exp_ 0.5|rep_flase) = P(dir_from |rep_flase) P(exp_ 0.5|rep_flase) (8) P(exp <0.5 dir from )= P(exp_0.5 |rep_flase) P(dir_from |rep_flase) P(rep_flase) +P(exp_0.5 |rep_true)P(dir_from |rep_true)P(rep_true) (9) P(rep_ false |exp < 0.5 ∧ dir_ from ) = P(rep _ flase ).P(exp_ <0.5 |rep _ flase ). P(rep _ flase )P(exp_ <0.5 |rep _ flase )P(dir _ from |rep _ flase ) + P(dir_ from |rep_ flase ) P(rep_ true )P(exp <0.5 |rep true )P(dir_ from |rep_ true )(10) …”
mentioning
confidence: 99%