期刊文献+
共找到442篇文章
< 1 2 23 >
每页显示 20 50 100
Mobility Aware Zone-Based Routing in Vehicle Ad hoc Networks Using Hybrid Metaheuristic Algorithm
1
作者 C.Nandagopal P.Siva Kumar +1 位作者 R.Rajalakshmi S.Anandamurugan 《Intelligent Automation & Soft Computing》 SCIE 2023年第4期113-126,共14页
Vehicle Ad hoc Networks(VANETs)have high mobility and a rando-mized connection structure,resulting in extremely dynamic behavior.Several challenges,such as frequent connection failures,sustainability,multi-hop data tr... Vehicle Ad hoc Networks(VANETs)have high mobility and a rando-mized connection structure,resulting in extremely dynamic behavior.Several challenges,such as frequent connection failures,sustainability,multi-hop data transfer,and data loss,affect the effectiveness of Transmission Control Protocols(TCP)on such wireless ad hoc networks.To avoid the problem,in this paper,mobility-aware zone-based routing in VANET is proposed.To achieve this con-cept,in this paper hybrid optimization algorithm is presented.The hybrid algo-rithm is a combination of Ant colony optimization(ACO)and artificial bee colony optimization(ABC).The proposed hybrid algorithm is designed for the routing process which is transmitting the information from one place to another.The optimal routing process is used to avoid traffic and link failure.Thefitness function is designed based on Link stability and Residual energy.The validation of the proposed algorithm takes solution encoding,fitness calculation,and updat-ing functions.To perform simulation experiments,NS2 simulator software is used.The performance of the proposed approach is analyzed based on different metrics namely,delivery ratio,delay time,throughput,and overhead.The effec-tiveness of the proposed method compared with different algorithms.Compared to other existing VANET algorithms,the hybrid algorithm has proven to be very efficient in terms of packet delivery ratio and delay. 展开更多
关键词 vehicle ad hoc network transmission control protocol multi-hop data transmission ant colony optimization artificial bee colony optimization
下载PDF
Message Verification Protocol Based on Bilinear Pairings and Elliptic Curves for Enhanced Security in Vehicular Ad Hoc Networks
2
作者 Vincent Omollo Nyangaresi Arkan A.Ghaib +6 位作者 Hend Muslim Jasim Zaid Ameen Abduljabbar Junchao Ma Mustafa A.Al Sibahee Abdulla J.Y.Aldarwish Ali Hasan Ali Husam A.Neamah 《Computers, Materials & Continua》 SCIE EI 2024年第10期1029-1057,共29页
Vehicular ad hoc networks(VANETs)provide intelligent navigation and efficient route management,resulting in time savings and cost reductions in the transportation sector.However,the exchange of beacons and messages ov... Vehicular ad hoc networks(VANETs)provide intelligent navigation and efficient route management,resulting in time savings and cost reductions in the transportation sector.However,the exchange of beacons and messages over public channels among vehicles and roadside units renders these networks vulnerable to numerous attacks and privacy violations.To address these challenges,several privacy and security preservation protocols based on blockchain and public key cryptography have been proposed recently.However,most of these schemes are limited by a long execution time and massive communication costs,which make them inefficient for on-board units(OBUs).Additionally,some of them are still susceptible to many attacks.As such,this study presents a novel protocol based on the fusion of elliptic curve cryptography(ECC)and bilinear pairing(BP)operations.The formal security analysis is accomplished using the Burrows–Abadi–Needham(BAN)logic,demonstrating that our scheme is verifiably secure.The proposed scheme’s informal security assessment also shows that it provides salient security features,such as non-repudiation,anonymity,and unlinkability.Moreover,the scheme is shown to be resilient against attacks,such as packet replays,forgeries,message falsifications,and impersonations.From the performance perspective,this protocol yields a 37.88%reduction in communication overheads and a 44.44%improvement in the supported security features.Therefore,the proposed scheme can be deployed in VANETs to provide robust security at low overheads. 展开更多
关键词 ATTACKS BILINEAR elliptic curve cryptography(ECC) PRIVACY SECURITY vehicular ad hoc network(vanet)
下载PDF
Secure Model to Generate Path Map for Vehicles in Unusual Road Incidents Using Association Rule Based Mining in VANET 被引量:2
3
作者 Arun Malik Babita Pandey Chia-Chun Wu 《Journal of Electronic Science and Technology》 CAS CSCD 2018年第2期153-162,共10页
Logical behavioral arrangements are a class of conventional arrangements to illustrate the happening of incidents in an appropriate and structured approach in vehicular ad hoc network (VANET). These incidents are ch... Logical behavioral arrangements are a class of conventional arrangements to illustrate the happening of incidents in an appropriate and structured approach in vehicular ad hoc network (VANET). These incidents are characterized as a list of path segments that are passed through by the vehicles for the duration of their journeys from a pre-decided local source to a local destination in a structured manner. A set of proper description illustrating the paths traversed by the vehicles as logical behavioral arrangements is describedin this paper. The data gathering scheme based on secure authentication to gather the data from the vehicles is proposed in this paper. This proposed data gathering scheme based on secure authentication is compared with the existing data gathering schemes by using veins framework and the results of analysis reflect that the proposed scheme outperforms among others. The data collected from the vehicles by the proposed data gathering scheme is stored at distributed road side units (RSUs). From these collected paths, the common and frequent paths opted by the vehicles in a certain region are determined by using frequent arrangement mining approach. An estimation model is used to decidethe next path and the whole path map opted by the vehicles in unusual situations like accident, jams, or a particular time of day. The proposed scheme will helpthe society in reducing the waiting time in vent of emergency or normal working days. 展开更多
关键词 CONFIDENCE motion arrangements support vehicular ad hoc network(vanet) vehicle-toroad side unit(V2R) vehicle-to-vehicle(V2V)
下载PDF
Software Defined Networking Based On-Demand Routing Protocol in Vehicle Ad-Hoc Networks 被引量:1
4
作者 DONG Baihong WU Weigang +1 位作者 YANG Zhiwei LI Junjie 《ZTE Communications》 2017年第2期11-18,共8页
This paper comes up with a SDN Based Vehicle Ad-Hoc On-Demand Routing Protocol(SVAO),which separates the data forwarding layer and network control layer,as in software defined networking(SDN),to enhance data transmiss... This paper comes up with a SDN Based Vehicle Ad-Hoc On-Demand Routing Protocol(SVAO),which separates the data forwarding layer and network control layer,as in software defined networking(SDN),to enhance data transmission efficiency within vehicle ad-hoc networks(VANETs).The roadside service unit plays the role of local controller and is in charge of selecting vehicles to forward packets within a road segment.All the vehicles state in the road.Correspondingly,a two-level design is used.The global level is distributed and adopts a ranked query scheme to collect vehicle information and determine the road segments along which a message should be forwarded.On the other hand,the local level is in charge of selecting forwarding vehicles in each road segment determined by the global level.We implement two routing algorithms of SVAO,and compare their performance in our simulation.We compare SVAO with popular ad-hoc network routing protocols,including Optimized Link State Routing(OLSR),Dynamic Source Routing(DSR),Destination Sequence Distance Vector(DSDV),and distance-based routing protocol(DB)via simulations.We consider the impact of vehicle density,speed on data transmission rate and average packet delay.The simulation results show that SVAO performs better than the others in large-scale networks or with high vehicle speeds. 展开更多
关键词 vanetS SDN ROUTING PROTOCOL ad.hoc network Internet of vehicle
下载PDF
A Self-Adaptive Back-off Optimization Scheme Based on Beacons Probability Prediction for Vehicle Ad-Hoc Networks 被引量:1
5
作者 Haitao Zhao Aiqian Du +2 位作者 Hongbo Zhu Dapeng Li Nanjie Liu 《China Communications》 SCIE CSCD 2016年第12期132-138,共7页
In order to improve the broadcast reception rates of beacon messages in vehicle ad-hoc networks,a conclusion that the relationship between collision probability and minimum contention window size and the relationship ... In order to improve the broadcast reception rates of beacon messages in vehicle ad-hoc networks,a conclusion that the relationship between collision probability and minimum contention window size and the relationship between expiration probability and minimum window size was reached by building a Markov model. According to this conclusion, a back-off algorithm based on adjusting the size of minimum contention window called CEB is proposed, and this algorithm is on the basis of the differential size between the number of expiration beacons and preset threshold. Simulations were done to compare the performance of CEB with that of RBEB and BEB, and the results show that the performance of the new proposed algorithm is better than that of RBEB and BEB. 展开更多
关键词 vehicle ad-hoc networks back off BEACON expiration probability collision probability
下载PDF
Vehicle Positioning Method Based on RFID in Vehicular Ad-Hoc Networks
6
作者 于德新 郑坤 张伟 《Journal of Donghua University(English Edition)》 EI CAS 2015年第5期800-806,共7页
With the rapid development of vehicular ad hoc network( VANET) technology,VANET applications such as safe driving and emergency rescue demand high position accuracy,but traditional GPS is difficult to meet new accurac... With the rapid development of vehicular ad hoc network( VANET) technology,VANET applications such as safe driving and emergency rescue demand high position accuracy,but traditional GPS is difficult to meet new accuracy requirements. To overcome this limitation,a new vehicle positioning method based on radio frequency identification( RFID) is proposed. First RFID base stations are divided into three categories using fuzzy technology,and then Chan algorithm is used to calculate three vehicles' positions,which are weighed to acquire vehicles' accurate position. This method can effectively overcome the problem that vehicle positioning accuracy is not high resulting from the factors such as ambient noise and base distribution when Chan algorithm is used. Experimental results show that the performance of the proposed method is superior to Chan algorithm and 2-step algorithm based on averaging method,which can satisfy the requirements of vehicle positioning in VANETs. 展开更多
关键词 vehicular ad-hoc network(vanet) radio frequency identification(RFID) vehicle positioning fuzzy technology
下载PDF
VANET中隐私保护的格基异构签密方案
7
作者 崔剑阳 蔡英 +1 位作者 张宇 范艳芳 《小型微型计算机系统》 CSCD 北大核心 2024年第9期2269-2277,共9页
针对车载自组织网络(Vehicular Ad hoc Network,VANET)中车辆跨密码系统通信过程中的隐私泄露问题,提出了一种格基异构签密方案.首先,方案实现了无证书密码系统(Certificateless Cryptosystem,CLC)的车辆与基于身份密码系统(Identity-Ba... 针对车载自组织网络(Vehicular Ad hoc Network,VANET)中车辆跨密码系统通信过程中的隐私泄露问题,提出了一种格基异构签密方案.首先,方案实现了无证书密码系统(Certificateless Cryptosystem,CLC)的车辆与基于身份密码系统(Identity-Based Cryptosystem,IBC)的车辆相互通信;其次利用签密的机密性和可认证性防止车辆用户在跨密码系统通信过程中发生隐私泄露,并实现了接收方对消息完整性以及发送方身份合法性的认证;最后在随机预言机模型下证明了方案在适应性选择密文攻击下具有不可区分性(Indistinguishability against adaptive Chosen Cipher Text Attack,IND-CCA2),在适应性选择消息攻击下具有存在性不可伪造性(Existential Unforgeability against adaptive Chosen Messages Attack,EUF-CMA).性能分析表明,与其他方案相比,本文方案在计算开销、通信开销和安全性方面具有一定优势,适用于车辆跨密码系统通信的场景. 展开更多
关键词 车载自组织网络 隐私保护 可认证性 异构签密
下载PDF
Performance of beacon safety message dissemination in Vehicular Ad hoc NETworks (VANETs) 被引量:4
8
作者 YOUSEFI Saleh FATHY Mahmood BENSLIMANE Abderrahim 《Journal of Zhejiang University-Science A(Applied Physics & Engineering)》 SCIE EI CAS CSCD 2007年第12期1990-2004,共15页
Currently, there is a growing belief that putting an IEEE 802.11-like radio into road vehicles can help the drivers to travel more safely. Message dissemination protocols are primordial for safety vehicular applicatio... Currently, there is a growing belief that putting an IEEE 802.11-like radio into road vehicles can help the drivers to travel more safely. Message dissemination protocols are primordial for safety vehicular applications. There are two types of safety messages which may be exchanged between vehicles: alarm and beacon. In this paper we investigate the feasibility of deploying safety applications based on beacon message dissemination through extensive simulation study and pay special attention to the safety requirements. Vehicles are supposed to issue these messages periodically to announce to other vehicles their current situation and use received messages for preventing possible unsafe situations. We evaluate the performance of a single-hop dissemination protocol while taking into account the quality of service (QoS) metrics like delivery rate and delay. We realize that reliability is the main concern in beacon message dissemination. Thus, a new metric named effective range is defined which gives us more accurate facility for evaluating QoS in safety applications specifically. Then, in order to improve the performance, the effects of three parameters including vehicle's transmission range, message transmission's interval time and message payload size are studied. Due to special characteristics of the safety applications, we model the relationship between communication-level QoS and application-level QoS and evaluate them for different classes of safety applications. As a conclusion, the current technology of IEEE 802.11 MAC layer has still some challenges for automatic safety applications but it can provide acceptable QoS to driver assistance safety applications. 展开更多
关键词 Safety applications Inter-vehicle communications Vehicular ad hoc NETworks (vanets) Application level QoS Effective range
下载PDF
Dynamic Routing for Emergency Vehicle by Collecting Real-Time Road Conditions 被引量:1
9
作者 Ryo Katsuma Shin Yoshida 《International Journal of Communications, Network and System Sciences》 2018年第2期27-44,共18页
When a natural disaster such as earthquake strikes, people go away to safety areas by cars. Some roads are broken and impenetrable by buildings falling down. Furthermore, some fixed infrastructures for radio communica... When a natural disaster such as earthquake strikes, people go away to safety areas by cars. Some roads are broken and impenetrable by buildings falling down. Furthermore, some fixed infrastructures for radio communication may be broken. In order to quickly bring ambulances and fire trucks to their destinations, it is necessary to provide real-time road conditions to these emergency vehicles via ad-hoc networks. In this paper, we propose a method to periodically reconstruct a route for an emergency vehicle by collecting real-time road conditions via vehicle ad-hoc networks. As simulation results, we confirmed that the proposed method collects 12% more road conditions than existing method. We also confirmed that the proposed method achieves 10% faster arrival than the existing method. 展开更多
关键词 EMERGENCY vehicle ROUTING DISASTER vehicle ad-hoc Networks
下载PDF
A Review on the Recent Trends of Image Steganography for VANET Applications
10
作者 Arshiya S.Ansari 《Computers, Materials & Continua》 SCIE EI 2024年第3期2865-2892,共28页
Image steganography is a technique of concealing confidential information within an image without dramatically changing its outside look.Whereas vehicular ad hoc networks(VANETs),which enable vehicles to communicate w... Image steganography is a technique of concealing confidential information within an image without dramatically changing its outside look.Whereas vehicular ad hoc networks(VANETs),which enable vehicles to communicate with one another and with roadside infrastructure to enhance safety and traffic flow provide a range of value-added services,as they are an essential component of modern smart transportation systems.VANETs steganography has been suggested by many authors for secure,reliable message transfer between terminal/hope to terminal/hope and also to secure it from attack for privacy protection.This paper aims to determine whether using steganography is possible to improve data security and secrecy in VANET applications and to analyze effective steganography techniques for incorporating data into images while minimizing visual quality loss.According to simulations in literature and real-world studies,Image steganography proved to be an effectivemethod for secure communication on VANETs,even in difficult network conditions.In this research,we also explore a variety of steganography approaches for vehicular ad-hoc network transportation systems like vector embedding,statistics,spatial domain(SD),transform domain(TD),distortion,masking,and filtering.This study possibly shall help researchers to improve vehicle networks’ability to communicate securely and lay the door for innovative steganography methods. 展开更多
关键词 STEGANOGRAPHY image steganography image steganography techniques information exchange data embedding and extracting vehicular ad hoc network(vanet) transportation system
下载PDF
Review of the Security Issues in Vehicular Ad Hoc Networks (VANET)
11
作者 Arif Sari Onder Onursal Murat Akkaya 《International Journal of Communications, Network and System Sciences》 2015年第13期552-566,共15页
There is a significant increase in the rates of vehicle accidents in countries around the world and also the casualties involved ever year. New technologies have been explored relating to the Vehicular Ad Hoc Network ... There is a significant increase in the rates of vehicle accidents in countries around the world and also the casualties involved ever year. New technologies have been explored relating to the Vehicular Ad Hoc Network (VANET) due to the increase in vehicular traffic/congestions around us. Vehicular communication is very important as technology has evolved. The research of VANET and development of proposed systems and implementation would increase safety among road users and improve the comfort for the corresponding passengers, drivers and also other road users, and a great improvement in the traffic efficiency would be achieved. This research paper investigates the current and existing security issues associated with the VANET and exposes any slack amongst them in order to lighten possible problem domains in this field. 展开更多
关键词 Vehicular ad hoc Network (vanet) MANET vehicle-to-vehicle (V2V) COMMUNICATION vehicle-to-Infrastructure (V2I) COMMUNICATION
下载PDF
车载Ad Hoc网络中基于移动网关的数据传输 被引量:13
12
作者 陈丽 李治军 +1 位作者 姜守旭 冯诚 《计算机学报》 EI CSCD 北大核心 2012年第3期454-463,共10页
由于车载Ad hoc网络拓扑的动态变化及车载节点的快速移动,应用现有传输方法在其上进行Internet接入点向移动车辆(Infrastructure-to-Vehicle,I2V)数据传输时成功率较低,而且传输延迟高、延迟抖动大.为了解决这一问题,文中利用公交车路... 由于车载Ad hoc网络拓扑的动态变化及车载节点的快速移动,应用现有传输方法在其上进行Internet接入点向移动车辆(Infrastructure-to-Vehicle,I2V)数据传输时成功率较低,而且传输延迟高、延迟抖动大.为了解决这一问题,文中利用公交车路线固定、运行特征可预测、节点及线路分布稠密等特性,将公交车作为移动网关(Mobile Gateway,MG),提出了一种新的基于MG转发的I2V数据传输方法(Mobile Gateway based Forwarding,MGF).文中首先将公路网模型化为状态-空间图,再运用马尔可夫决策方法建立了一种基于MG转发的I2V数据传输优化模型,然后通过对模型求解得出I2V数据传输的最优转发决策,最优转发决策指的就是每个状态下对应的最优动作序列,最后在目的车辆行驶轨迹上选取满足传输成功率阈值,并使I2V传输延迟最小的路口节点作为数据包与目的车辆的最优汇聚节点,即目标节点.应用MGF方法,MG节点将以最优概率转发序列向目标节点转发数据包.文中利用模拟平台对MGF方法的传输性能进行了评估,结果表明该方法在满足传输成功率阈值前提下,能够获得最小传输延迟期望.理论分析同样也证明了该方法的有效性. 展开更多
关键词 智能交通系统 车载ad hoc网络 马尔可夫决策过程 I2V数据传输 移动网关 物联网
下载PDF
车载Ad Hoc网络 被引量:6
13
作者 郝建军 罗涛 乐光新 《中兴通讯技术》 2009年第6期28-31,36,共5页
车载自组织网络(VANET)作为移动自组织网络(MANET)的特殊子类,因其在智能交通和车载娱乐方面的广阔应用前景,目前受到业界的普遍关注。VANET的主要特点是车辆高速行驶、信道快速衰落、多普勒效应严重、网络拓扑变化快,由此将带来许多传... 车载自组织网络(VANET)作为移动自组织网络(MANET)的特殊子类,因其在智能交通和车载娱乐方面的广阔应用前景,目前受到业界的普遍关注。VANET的主要特点是车辆高速行驶、信道快速衰落、多普勒效应严重、网络拓扑变化快,由此将带来许多传输和组网的问题。 展开更多
关键词 车载自组织网络 802.11p标准 专用短距离通信 车载环境无线接入
下载PDF
基于OPNET的车用Ad hoc网可靠性评估研究 被引量:3
14
作者 张桃改 谢辉 《计算机应用研究》 CSCD 北大核心 2009年第10期3807-3811,共5页
通过搭建车用Ad hoc网络(VANET)的仿真平台,将一个真实的车辆节点移动模型与标准的无线移动Ad hoc网络模型进行结合来对车用网络的可靠性进行评估。反映了车辆的移动特性对整个VANET可靠性的影响,利于更详细、更直观地刻画VANET的重要特... 通过搭建车用Ad hoc网络(VANET)的仿真平台,将一个真实的车辆节点移动模型与标准的无线移动Ad hoc网络模型进行结合来对车用网络的可靠性进行评估。反映了车辆的移动特性对整个VANET可靠性的影响,利于更详细、更直观地刻画VANET的重要特性,为将来VANET相关协议的设计提供具体、详实的参考数据和建议。 展开更多
关键词 车用ad hoc网络 车辆移动模型 无线网络模型 可靠性
下载PDF
无人飞行器Ad hoc网络中基于容错的中继节点配置 被引量:1
15
作者 陈凌 梁加红 +1 位作者 胡志伟 吴冰 《系统工程与电子技术》 EI CSCD 北大核心 2012年第1期179-184,共6页
针对无人飞行器Ad hoc网络的容错设计需求,采用增加中继节点的方法实现。在二维平面同构网络中,将容错问题转化为边长受限条件下最少数量Steiner点的Steiner树问题。提出了两种基于最小成本子图的中继节点配置算法,以求解最少数量的中... 针对无人飞行器Ad hoc网络的容错设计需求,采用增加中继节点的方法实现。在二维平面同构网络中,将容错问题转化为边长受限条件下最少数量Steiner点的Steiner树问题。提出了两种基于最小成本子图的中继节点配置算法,以求解最少数量的中继节点及其位置,使改变后的网络拓扑图为顶点2-连通,实现容错。第一种为多项式时间的8-近似算法;第二种为随机近似算法,采用文化基因算法,搜索需要新增加的最小成本强化边组合。仿真结果表明了所提算法的有效性,当网络规模较小和中等时,随机近似算法得到的中继节点数量较少,平均情况下性能较优。 展开更多
关键词 无人飞行器 ad hoc网络 容错 Steiner树问题
下载PDF
一种基于AD HOC网络的车辆定位系统的组网框架设计 被引量:1
16
作者 宋秀梅 蔡勤生 《机电工程技术》 2006年第4期27-28,86,共3页
本文提出了一种基于ADHOC网络的车辆定位系统的组网框架,着重分析了该网络的路由协议选择及优化措施。它能通过车载设备自动组成一个网络来传送系统的位置信息、控制指令和语音信息等信息,可以取得灵活的组网模式,降低系统的运行费用。
关键词 ad hoc网络 车辆定位系统 组网框架 优化
下载PDF
大城市环境下移动Ad Hoc网络通信技术的研究 被引量:6
17
作者 周一新 吕卫锋 诸彤宇 《计算机工程》 EI CAS CSCD 北大核心 2006年第24期101-103,共3页
结合实际应用场景,对大城市环境下面向车辆通信的移动ad hoc网络通信技术进行了分析与研究,分析了车辆运动行为特征,总结车辆运动的规律性,结合该规律提出了改进的ad hoc路由协议以及适用该协议的网络结构。利用实测的车辆运行数据对改... 结合实际应用场景,对大城市环境下面向车辆通信的移动ad hoc网络通信技术进行了分析与研究,分析了车辆运动行为特征,总结车辆运动的规律性,结合该规律提出了改进的ad hoc路由协议以及适用该协议的网络结构。利用实测的车辆运行数据对改进的网络性能进行评估,取得了一定效果。 展开更多
关键词 ad hoc网络 车辆间通信 ad hoc网络路由
下载PDF
一种基于方向优先的车载Ad hoc路由策略 被引量:5
18
作者 田红燕 徐成 刘彦 《计算机应用研究》 CSCD 北大核心 2010年第4期1416-1418,1426,共4页
针对城市车载网络在十字路口路由选择效率低下的问题,结合已有的地理位置路由协议,提出一种基于方向优先的地理位置路由策略。该策略通过信标的广播信息确定节点的类型,是属于普通节点、预测节点或者十字路口节点;然后再判断采取什么样... 针对城市车载网络在十字路口路由选择效率低下的问题,结合已有的地理位置路由协议,提出一种基于方向优先的地理位置路由策略。该策略通过信标的广播信息确定节点的类型,是属于普通节点、预测节点或者十字路口节点;然后再判断采取什么样的方式转发数据包,普通节点采取贪婪转发的方式,预测节点采取受限的贪婪转发,而十字路口节点决定路由策略的方向。通过NS2仿真分析,该路由策略能够以更少的跳数、更短的路径成功传递数据包。 展开更多
关键词 车载自组织网络 路由策略 十字路口节点
下载PDF
基于移动ad-hoc网络的车辆定位 被引量:2
19
作者 孙剑明 赵琳 《智能系统学报》 CSCD 北大核心 2013年第4期312-318,共7页
当车辆不能通过GPS接收机获得自身位置信息时,就难以获得有用的交通提示风险服务.提出了一种新的基于车载移动ad-hoc网络车辆定位方法,该方法能够获取作为网络节点车辆的大致位置,并结合一种改进的警报信息优化传播算法,向即将处于危险... 当车辆不能通过GPS接收机获得自身位置信息时,就难以获得有用的交通提示风险服务.提出了一种新的基于车载移动ad-hoc网络车辆定位方法,该方法能够获取作为网络节点车辆的大致位置,并结合一种改进的警报信息优化传播算法,向即将处于危险或拥堵区域的不能通过GPS接收机定位的车辆发送警报信息.仿真实验表明只要车辆自组织网络中有40%的车辆可以获得GPS的定位信息,就可以将警报信息准确完整地送达处于网络中的所有车辆.当遇到浓雾天气、交通事故或者是其他拥塞时,该方法会防止车辆进一步拥堵并能提醒驾驶员防范危险. 展开更多
关键词 车辆定位 ad-hoc网络 位置信息 警报信息最优传播 GPS
下载PDF
露天煤矿临近车辆检测ad hoc协议测试与选择 被引量:1
20
作者 王茵 施燕峰 胡圣波 《工矿自动化》 北大核心 2018年第6期21-26,共6页
通过分析目前临近车辆检测技术,即超声波传感技术、脉冲雷达和激光探测技术、计算机视觉技术、RFID和电子标签技术、GPS技术,指出GPS集成无线通信技术最适合应用在露天煤矿临近车辆检测中;提出一种GPS集成ad hoc的临近车辆检测无线通信... 通过分析目前临近车辆检测技术,即超声波传感技术、脉冲雷达和激光探测技术、计算机视觉技术、RFID和电子标签技术、GPS技术,指出GPS集成无线通信技术最适合应用在露天煤矿临近车辆检测中;提出一种GPS集成ad hoc的临近车辆检测无线通信系统:只要相邻车辆处于通信距离范围内,车辆间便可采用IEEE 802.11协议,以单跳或多跳的方式交换GPS定位数据。以该系统为研究对象,模拟真实的露天煤矿场景,测试分析了IEEE 802.11a/b/p三种版本的通信协议在视距传输、非视距传输、接收机在斜坡底部和接收机在斜坡顶部4种不同场景下的信号接收强度和有效通信距离。测试结果表明,在以上4种不同场景下,IEEE 802.11b协议的数据包接收率更高、有效通信距离更远,优于IEEE 802.11a协议和IEEE 802.11p协议,更适合露天煤矿临近车辆检测。 展开更多
关键词 露天煤矿 矿车安全 临近车辆检测 GPS集成ad hoc 定位精度
下载PDF
上一页 1 2 23 下一页 到第
使用帮助 返回顶部