Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (20)
  • Open Access


    Intelligent DoS Attack Detection with Congestion Control Technique for VANETs

    R. Gopi1, Mahantesh Mathapati2, B. Prasad3, Sultan Ahmad4, Fahd N. Al-Wesabi5, Manal Abdullah Alohali6,*, Anwer Mustafa Hilal7

    CMC-Computers, Materials & Continua, Vol.72, No.1, pp. 141-156, 2022, DOI:10.32604/cmc.2022.023306

    Abstract Vehicular Ad hoc Network (VANET) has become an integral part of Intelligent Transportation Systems (ITS) in today's life. VANET is a network that can be heavily scaled up with a number of vehicles and road side units that keep fluctuating in real world. VANET is susceptible to security issues, particularly DoS attacks, owing to maximum unpredictability in location. So, effective identification and the classification of attacks have become the major requirements for secure data transmission in VANET. At the same time, congestion control is also one of the key research problems in VANET which aims at minimizing the time expended… More >

  • Open Access


    An Optimal Deep Learning for Cooperative Intelligent Transportation System

    K. Lakshmi1, Srinivas Nagineni2, E. Laxmi Lydia3, A. Francis Saviour Devaraj4, Sachi Nandan Mohanty5, Irina V. Pustokhina6,*, Denis A. Pustokhin7

    CMC-Computers, Materials & Continua, Vol.72, No.1, pp. 19-35, 2022, DOI:10.32604/cmc.2022.020244

    Abstract Cooperative Intelligent Transport System (C-ITS) plays a vital role in the future road traffic management system. A vital element of C-ITS comprises vehicles, road side units, and traffic command centers, which produce a massive quantity of data comprising both mobility and service-related data. For the extraction of meaningful and related details out of the generated data, data science acts as an essential part of the upcoming C-ITS applications. At the same time, prediction of short-term traffic flow is highly essential to manage the traffic accurately. Due to the rapid increase in the amount of traffic data, deep learning (DL) models… More >

  • Open Access


    Implementation of K-Means Algorithm and Dynamic Routing Protocol in VANET

    Manoj Sindhwani1, Charanjeet Singh1,*, Rajeshwar Singh2

    Computer Systems Science and Engineering, Vol.40, No.2, pp. 455-467, 2022, DOI:10.32604/csse.2022.018498

    Abstract With the growth of Vehicular Ad-hoc Networks, many services delivery is gaining more attention from the intelligent transportation system. However, mobility characteristics of vehicular networks cause frequent disconnection of routes, especially during the delivery of data. In both developed and developing countries, a lot of time is consumed due to traffic congestion. This has significant negative consequences, including driver stress due to increased time demand, decreased productivity for various personalized and commercial vehicles, and increased emissions of hazardous gases especially air polluting gases are impacting public health in highly populated areas. Clustering is one of the most powerful strategies for… More >

  • Open Access


    Intelligent Framework for Secure Transportation Systems Using Software-Defined-Internet of Vehicles

    Mohana Priya Pitchai1, Manikandan Ramachandran1,*, Fadi Al-Turjman2, Leonardo Mostarda3

    CMC-Computers, Materials & Continua, Vol.68, No.3, pp. 3947-3966, 2021, DOI:10.32604/cmc.2021.015568

    Abstract The Internet of Things plays a predominant role in automating all real-time applications. One such application is the Internet of Vehicles which monitors the roadside traffic for automating traffic rules. As vehicles are connected to the internet through wireless communication technologies, the Internet of Vehicles network infrastructure is susceptible to flooding attacks. Reconfiguring the network infrastructure is difficult as network customization is not possible. As Software Defined Network provide a flexible programming environment for network customization, detecting flooding attacks on the Internet of Vehicles is integrated on top of it. The basic methodology used is crypto-fuzzy rules, in which cryptographic… More >

  • Open Access


    Constructional Cyber Physical System: An Integrated Model

    Tzer-Long Chen1, Chien-Yun Chang2, Yung-Cheng Yao3, Kuo-Chang Chung4,*

    Intelligent Automation & Soft Computing, Vol.28, No.1, pp. 73-82, 2021, DOI:10.32604/iasc.2021.015980

    Abstract Artificial intelligence, machine learning, and deep learning have achieved great success in the fields of computer vision and natural language processing, and then extended to various fields, such as biology, chemistry, and civil engineering, including big data in the field of logistics. Therefore, many logistics companies move towards the integration of intelligent transportation systems. Only virtual and physical development can support the sustainable development of the logistics industry. This study aims to: 1.) collect timely information from the block chain, 2.) use deep learning to build a customer database so that sales staff in physical stores can grasp customer preferences,… More >

  • Open Access


    An Intelligent Cluster Optimization Algorithm for Smart Body Area Networks

    Adil Mushtaq1, Muhammad Nadeem Majeed1, Farhan Aadil2, Muhammad Fahad Khan2, Sangsoon Lim3,*

    CMC-Computers, Materials & Continua, Vol.67, No.3, pp. 3795-3814, 2021, DOI:10.32604/cmc.2021.015369

    Abstract Body Area Networks (BODYNETs) or Wireless Body Area Networks (WBAN), being an important type of ad-hoc network, plays a vital role in multimedia, safety, and traffic management applications. In BODYNETs, rapid topology changes occur due to high node mobility, which affects the scalability of the network. Node clustering is one mechanism among many others, which is used to overcome this issue in BODYNETs. There are many clustering algorithms used in this domain to overcome this issue. However, these algorithms generate a large number of Cluster Heads (CHs), which results in scarce resource utilization and degraded performance. In this research, an… More >

  • Open Access


    Internet of Things Based Solutions for Transport Network Vulnerability Assessment in Intelligent Transportation Systems

    Weiwei Liu1, Yang Tang2, Fei Yang2, Chennan Zhang1, Dun Cao3, Gwang-jun Kim4, *

    CMC-Computers, Materials & Continua, Vol.65, No.3, pp. 2511-2527, 2020, DOI:10.32604/cmc.2020.09113

    Abstract Intelligent Transportation System (ITS) is essential for effective identification of vulnerable units in the transport network and its stable operation. Also, it is necessary to establish an urban transport network vulnerability assessment model with solutions based on Internet of Things (IoT). Previous research on vulnerability has no congestion effect on the peak time of urban road network. The cascading failure of links or nodes is presented by IoT monitoring system, which can collect data from a wireless sensor network in the transport environment. The IoT monitoring system collects wireless data via Vehicle-to-Infrastructure (V2I) channels to simulate key segments and their… More >

  • Open Access


    Applying Probabilistic Model Checking to Path Planning in an Intelligent Transportation System Using Mobility Trajectories and Their Statistical Data

    Honghao Gao1, 2, 5, Wanqiu Huang1, 4, Xiaoxian Yang3

    Intelligent Automation & Soft Computing, Vol.25, No.3, pp. 547-559, 2019, DOI:10.31209/2019.100000110

    Abstract Path planning is an important topic of research in modern intelligent traffic systems (ITSs). Traditional path planning methods aim to identify the shortest path and recommend this path to the user. However, the shortest path is not always optimal, especially in emergency rescue scenarios. Thus, complex and changeable factors, such as traffic congestion, road construction and traffic accidents, should be considered when planning paths. To address this consideration, the maximum passing probability of a road is considered the optimal condition for path recommendation. In this paper, the traffic network is abstracted as a directed graph. Probabilistic data on traffic flow… More >

  • Open Access


    Authentication of Vehicles and Road Side Units in Intelligent Transportation System

    Muhammad Waqas1, 2, Shanshan Tu1, 3, *, Sadaqat Ur Rehman1, Zahid Halim2, Sajid Anwar2, Ghulam Abbas2, Ziaul Haq Abbas4, Obaid Ur Rehman5

    CMC-Computers, Materials & Continua, Vol.64, No.1, pp. 359-371, 2020, DOI:10.32604/cmc.2020.09821

    Abstract Security threats to smart and autonomous vehicles cause potential consequences such as traffic accidents, economically damaging traffic jams, hijacking, motivating to wrong routes, and financial losses for businesses and governments. Smart and autonomous vehicles are connected wirelessly, which are more attracted for attackers due to the open nature of wireless communication. One of the problems is the rogue attack, in which the attacker pretends to be a legitimate user or access point by utilizing fake identity. To figure out the problem of a rogue attack, we propose a reinforcement learning algorithm to identify rogue nodes by exploiting the channel state… More >

  • Open Access


    Numerical Simulation and Natural Computing applied to a Real World Traffic Optimization Case under Stress Conditions:

    M.J. Galán Moreno, J.J. Sánchez Medina, L. Álvarez Álvarez E. Rubio Royo1

    CMES-Computer Modeling in Engineering & Sciences, Vol.50, No.3, pp. 191-226, 2009, DOI:10.3970/cmes.2009.050.191

    Abstract Urban traffic is a key factor for the development of a city. There exist many different approaches facing traffic optimization. In our case we have focused on traffic lights optimization. We have designed and tested a new architecture to optimize traffic light cycle times. The purpose of this research is to demonstrate the good performance of our architecture in a congested scenario. We have simulated several congestion situations for a very large real world traffic network - "La Almozara" in Zaragoza, Spain. Our results seem encouraging in this extreme situation. As we increase the load in the network we get… More >

Displaying 11-20 on page 2 of 20. Per Page