2017
DOI: 10.1007/978-981-10-3503-6_4
|View full text |Cite
|
Sign up to set email alerts
|

Vehicular Ad Hoc Network (VANET): A Survey, Challenges, and Applications

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
36
0
1

Year Published

2019
2019
2022
2022

Publication Types

Select...
5
3

Relationship

0
8

Authors

Journals

citations
Cited by 83 publications
(37 citation statements)
references
References 9 publications
0
36
0
1
Order By: Relevance
“…Thus, in the years ahead, VANET will be exploited to improve the experience of not only drivers but also the passengers who use interactive, storage, and computation-intensive applications. The VANETs can provide entertainment services including internet browsing, file transfer, mobile-e-commerce, and video-on-demand [7]. Similarly, any surrounding event captured by a vehicle can be of interest to other vehicles in its vicinity.…”
Section: Vehicular Networkmentioning
confidence: 99%
“…Thus, in the years ahead, VANET will be exploited to improve the experience of not only drivers but also the passengers who use interactive, storage, and computation-intensive applications. The VANETs can provide entertainment services including internet browsing, file transfer, mobile-e-commerce, and video-on-demand [7]. Similarly, any surrounding event captured by a vehicle can be of interest to other vehicles in its vicinity.…”
Section: Vehicular Networkmentioning
confidence: 99%
“…Low-priority service queue r 3 , ..., r i r 1 , ..., r 1 Figure 1: System model. input: data requests of vehicles within coverage (1) while R i 's service queues are not empty do (2) R i constructs the IDNC graph G(V, E) as described in Section 4.1; (3) R i calculates each vertex's weight according to a specific scheduling algorithm; (4) R i finds the maximum weighted clique C * in G; (5) R i generates the IDNC packet by XORing all the data items identified by the vertices in C * and multicast it to all vehicles; (6) Each vehicle decodes the IDNC packet and sends back a 1-bit message to R i , notifying the success/failure of receiving the requested data item; (7) R i updates the service queues and the vehicles' statuses based on the feedbacks. Wireless Communications and Mobile Computing where VH(d j ) is the set of vehicles that are requesting d j and dl min j represents the deadline of the most urgent request among all requests that are asking for item d j .…”
Section: Admission Controllermentioning
confidence: 99%
“…e original IDNCassisted algorithms without admission control are labeled as EDF, SIN, and PVDD, respectively. e algorithms with (1) If R i receives a newly arriving request r i then (2) Determine the priority of r i ; (3) if r i is high priority then (4) Admit r i and put r i into the high priority service queue; (5) else (6) Vectorize r i as rv ij , the mean vector of VE α as rv α , and the mean vector of VE β as rv β ; (7) Calculate rv α and rv β as described in Section 4.2.1; (8) Calculate the distance between rv ij and rv α , and the distance between rv ij and rv β , respectively; (9) Compare the distances (10) if dist(rv ij , rv α ) ≤ dist(rv ij , rv β ) then (11) Reject r i ; (12) Send a rejection message to the vehicle; (13) else (14) if dist(rv ij , rv α ) > dist(rv ij , rv β ) then (15) Admit r i and put r i into the low priority service queue; (16) end if (17) end if (18) end if (19) network coding-aware admission control are denoted as EDF_NCaAC, SIN_NCaAC, and PVDD_NCaAC. e results are obtained when the system is in a steady state and all data points are based on the average of over 5000 simulation runs.…”
Section: Performance Evaluationmentioning
confidence: 99%
See 1 more Smart Citation
“…These applications can generally be grouped into two categories: safety applications and non-safety applications as shown in Figure 2. We summarize the main applications of these categories in the next paragraphs [21], [22], [23], [24].…”
Section: Video Streaming Over Vehicular Networkmentioning
confidence: 99%