Magazine et Edition

Volume 22 (2022): Edition 3 (September 2022)

Volume 22 (2022): Edition 2 (June 2022)

Volume 22 (2022): Edition 1 (March 2022)

Volume 21 (2021): Edition 4 (December 2021)

Volume 21 (2021): Edition 3 (September 2021)

Volume 21 (2021): Edition 2 (June 2021)

Volume 21 (2021): Edition 1 (March 2021)

Volume 20 (2020): Edition 6 (December 2020)
Special Edition on New Developments in Scalable Computing

Volume 20 (2020): Edition 5 (December 2020)
Special issue on Innovations in Intelligent Systems and Applications

Volume 20 (2020): Edition 4 (November 2020)

Volume 20 (2020): Edition 3 (September 2020)

Volume 20 (2020): Edition 2 (June 2020)

Volume 20 (2020): Edition 1 (March 2020)

Volume 19 (2019): Edition 4 (November 2019)

Volume 19 (2019): Edition 3 (September 2019)

Volume 19 (2019): Edition 2 (June 2019)

Volume 19 (2019): Edition 1 (March 2019)

Volume 18 (2018): Edition 5 (May 2018)
Special Thematic Edition on Optimal Codes and Related Topics

Volume 18 (2018): Edition 4 (November 2018)

Volume 18 (2018): Edition 3 (September 2018)

Volume 18 (2018): Edition 2 (June 2018)

Volume 18 (2018): Edition 1 (March 2018)

Volume 17 (2017): Edition 5 (December 2017)
Special Edition With Selected Papers From The Workshop “Two Years Avitohol: Advanced High Performance Computing Applications 2017

Volume 17 (2017): Edition 4 (November 2017)

Volume 17 (2017): Edition 3 (September 2017)

Volume 17 (2017): Edition 2 (June 2017)

Volume 17 (2017): Edition 1 (March 2017)

Volume 16 (2016): Edition 6 (December 2016)
Special issue with selection of extended papers from 6th International Conference on Logistic, Informatics and Service Science LISS’2016

Volume 16 (2016): Edition 5 (October 2016)
Edition Title: Special Edition on Application of Advanced Computing and Simulation in Information Systems

Volume 16 (2016): Edition 4 (December 2016)

Volume 16 (2016): Edition 3 (September 2016)

Volume 16 (2016): Edition 2 (June 2016)

Volume 16 (2016): Edition 1 (March 2016)

Volume 15 (2015): Edition 7 (December 2015)
Special Edition on Information Fusion

Volume 15 (2015): Edition 6 (December 2015)
Special Edition on Logistics, Informatics and Service Science

Volume 15 (2015): Edition 5 (April 2015)
Special Edition on Control in Transportation Systems

Volume 15 (2015): Edition 4 (November 2015)

Volume 15 (2015): Edition 3 (September 2015)

Volume 15 (2015): Edition 2 (June 2015)

Volume 15 (2015): Edition 1 (March 2015)

Volume 14 (2014): Edition 5 (December 2014)
Special Edition

Volume 14 (2014): Edition 4 (December 2014)

Volume 14 (2014): Edition 3 (September 2014)

Volume 14 (2014): Edition 2 (June 2014)

Volume 14 (2014): Edition 1 (March 2014)

Volume 13 (2013): Edition Special-Edition (December 2013)

Volume 13 (2013): Edition 4 (December 2013)
The publishing of the present issue (Volume 13, No 4, 2013) of the journal “Cybernetics and Information Technologies” is financially supported by FP7 project “Advanced Computing for Innovation” (ACOMIN), grant agreement 316087 of Call FP7 REGPOT-2012-2013-1.

Volume 13 (2013): Edition 3 (September 2013)

Volume 13 (2013): Edition 2 (June 2013)

Volume 13 (2013): Edition 1 (March 2013)

Volume 12 (2012): Edition 4 (December 2012)

Volume 12 (2012): Edition 3 (September 2012)

Volume 12 (2012): Edition 2 (June 2012)

Volume 12 (2012): Edition 1 (March 2012)

Détails du magazine
Format
Magazine
eISSN
1314-4081
Première publication
13 Mar 2012
Période de publication
4 fois par an
Langues
Anglais

Chercher

Volume 15 (2015): Edition 4 (November 2015)

Détails du magazine
Format
Magazine
eISSN
1314-4081
Première publication
13 Mar 2012
Période de publication
4 fois par an
Langues
Anglais

Chercher

12 Articles
Accès libre

A Generalized Multi Criteria Decision Making Method Based on Extension of ANP by Enhancing PAIR WISE Comparison Techniques

Publié en ligne: 26 Nov 2015
Pages: 3 - 12

Résumé

Abstract

A model of multi criteria decision making based on extended ANP has been provided and the existing AHP scale method is replaced by another method, in which the user has to provide fewer inputs. To check the validity of the proposed method, a sample data has been taken and an enhanced method is applied on it.

Mots clés

  • Decision making
  • MCDM
  • AHP
  • pair wise comparison
  • ANP
  • operation research
Accès libre

Improved Cross Entropy Measures of Single Valued Neutrosophic Sets and Interval Neutrosophic Sets and Their Multicriteria Decision Making Methods

Publié en ligne: 26 Nov 2015
Pages: 13 - 26

Résumé

Abstract

Due to some drawbacks of the cross entropy between Single Valued Neutrosophic Sets (SVNSs) in dealing with decision-making problems, the existing single valued neutrosophic cross entropy indicates an asymmetrical phenomenon or may produce an undefined (unmeaningful) phenomenon in some situations. In order to overcome these disadvantages, this paper proposes an improved cross entropy measure of SVNSs and investigates its properties, and then extends it to a cross entropy measure between interval neutrosophic sets (INSs). Furthermore, the cross entropy measures are applied to multicriteria decision making problems with single valued neutrosophic information and interval neutrosophic information. In decision making methods, through the weighted cross entropy measure between each alternative and the the ideal alternative, one can obtain the ranking order of all alternatives and the best one. The decision-making methods using the proposed cross entropy measures can efficiently deal with decision making problems with incomplete, indeterminate and inconsistent information which exist usually in real situations. Finally, two illustrative examples are provided to demonstrate the application and efficiency of the developed decision making approaches under single valued neutrosophic and interval neutrosophic environments.

Mots clés

  • Neutrosophic set
  • single valued neutrosophic set
  • interval neutrosophic set
  • cross entropy
  • multicriteria decision making
Accès libre

Modeling Workflow Systems Constrained by Inputs and Outputs − An Approach Based on Petri Nets

Publié en ligne: 26 Nov 2015
Pages: 27 - 41

Résumé

Abstract

Workflow systems are widely used in our daily life so that the validity, dependability and security with which they need to be assured are important. However, existing researches mainly focus on correctness validation, performance analysis and assignment scheduling, but the testing methods have been seldom suited. In this paper a formalized definition of workflows constrained by an input and output is presented, and based on that, a Petri Net-based model (I/O_WF_Net) is proposed. In I/O_WF_Net, the activities of the workflow can be modeled as transitions of a Petri Net, and the inputs and outputs of an activity can be modeled as places. After the modeling method for I/O constrained workflow net into the I/O_WF_Net model is described, the corresponding transforming algorithm and its simplifying method are given.

Mots clés

  • Workflow modeling
  • workflow testing
  • Petri Net
  • I/O_WF_Net
Accès libre

Robust Stability Analysis for a Perturbed Single-Area Power System Model

Publié en ligne: 26 Nov 2015
Pages: 42 - 49

Résumé

Abstract

This research work investigates the derivation of a fixed upper matrix bound for the solution of one class of parameter-dependent Continuous Algebraic Lyapunov Equations (CALE). It is supposed that the nominal coefficient matrix is subjected to real structured parametric uncertainty belonging to a convex set. The bound is used to analyze the robust stability and the performance behavior of a load-frequency control system for a single area power system model. By means of the bound one can easily estimate the distance from instability of the uncertain system and the linear quadratic performance index associated with it. The applicability of the obtained results is illustrated by an example.

Mots clés

  • Lyapunov equation
  • solution bounds
  • uncertain systems
  • power systems
Accès libre

High-Order Markov Random Fields and Their Applications in Cross-Language Speech Recognition

Publié en ligne: 26 Nov 2015
Pages: 50 - 57

Résumé

Abstract

In this paper we study the cross-language speech emotion recognition using high-order Markov random fields, especially the application in Vietnamese speech emotion recognition. First, we extract the basic speech features including pitch frequency, formant frequency and short-term intensity. Based on the low level descriptor we further construct the statistic features including maximum, minimum, mean and standard deviation. Second, we adopt the high-order Markov random fields (MRF) to optimize the cross-language speech emotion model. The dimensional restrictions may be modeled by MRF. Third, based on the Vietnamese and Chinese database we analyze the efficiency of our emotion recognition system. We adopt the dimensional emotion model (arousal-valence) to verify the efficiency of MRF configuration method. The experimental results show that the high-order Markov random fields can improve the dimensional emotion recognition in the cross-language experiments, and the configuration method shows promising robustness over different languages.

Mots clés

  • High-order Markov random fields
  • speech emotion recognition
  • crossdatabase recognition
  • dimensional emotion model
Accès libre

Text Mining and Big Data Analytics for Retrospective Analysis of Clinical Texts from Outpatient Care

Publié en ligne: 26 Nov 2015
Pages: 58 - 77

Résumé

Abstract

This paper presents the results of an on-going research project for knowledge extraction from large corpora of clinical narratives in Bulgarian language, approximately 100 million of outpatient care notes. Entities with numerical values are mined in the free text and the extracted information is stored in a structured format. The Algorithms for retrospective analyses and big data analytics are applied for studying the treatment and evaluating the diabetes compensation and control of arterial blood pressure.

Mots clés

  • Medical Informatics
  • Big Data
  • Text Mining
  • Information Extraction
  • Natural Language Processing
Accès libre

Towards an Efficient Approach for Automatic Medical Document Summarization

Publié en ligne: 26 Nov 2015
Pages: 78 - 91

Résumé

Abstract

Document summarization deals with providing condensed version of the original document. We present an extractive informative single medical document summarization approach. We compare the tokens in the sentence with cue words. A sentence ranking method is used to extract the important sentences. The existing summarizers are used for performance analysis.

Mots clés

  • Document summarization
  • medical document
  • Domain-specific vocabulary
  • cue words
  • sentence ranking
Accès libre

Bridging the Gap between Digital Libraries and e-Learning

Publié en ligne: 26 Nov 2015
Pages: 92 - 110

Résumé

Abstract

Digital Libraries (DL) are offering access to a vast amount of digital content, relevant to practically all domains of human knowledge, which makes it suitable to enhance teaching and learning. Based on a systematic literature review, this article provides an overview and a gap analysis of educational use of DLs.

Mots clés

  • e-Learning
  • digital libraries
  • personas
  • scenarios
  • digitisation priorities
Accès libre

Secured Document Sharing Using Visual Cryptography in Cloud Data Storage

Publié en ligne: 26 Nov 2015
Pages: 111 - 123

Résumé

Abstract

Security has emerged as the most concerned aspect of cloud computing environment and a prime challenge for the cloud users. The stored data can be retrieved by the user whenever and wherever required. But there is no guarantee that the data stored in the cloud server has not been accessed by any unauthorized user. The current cloud framework does not allow encrypted data to be stored due to the space and storage cost. Storing secret data in an unencrypted form is vulnerable to external attacks by both illegitimate customers and a Cloud Service Provider (CSP). Traditional encryption techniques require more computation and storage space. Hence, protecting cloud data with minimal computations is the prime task. Secured Document Sharing Using Visual Cryptography (SDSUVC) technique proposes an efficient storage scheme in a cloud for storing and retrieving a document file without any mathematical computations and also ensures data confidentiality and integrity.

Mots clés

  • Security
  • computing
  • environment
  • hindrance
  • frame work
  • vulnerable
  • attackers
  • efficient
  • visual cryptography
  • technique
  • confidentiality
  • integrity
Accès libre

BRLO-Tree: A Data Structure Used for 3D GIS Dynamic Scene Rendering

Publié en ligne: 26 Nov 2015
Pages: 124 - 137

Résumé

Abstract

BRLO-Tree (Block-R-Tree-Loose-Octree) is presented in this paper based on the R-Tree and Loose-Octree. The aim of the structure is to visualize the large scale and complex dynamic scenes in a 3D (three-dimensional) GIS (Geographic Information System). A new method of clustering rectangles to construct R-tree based on an improved K-means algorithm is put forward. Landform in 3D GIS is organized by R-Tree. The block is used as the basic rendering unit. The 3D objects of each block are respectively organized by a Loose-Octree. A series of techniques, based on this data structure, such as LOD (Level of Detail), relief impostors are integrated. The results of the tests show that BRLO-Tree cannot only support the large scale 3D GIS scene exhibition with wandering and fighting, but it can also efficiently manage the models in a dynamic scene. At the same time, a set of integrated techniques based on BRLO-Tree can make the rendering pictures more fluence and the rendering time vastly improved.

Mots clés

  • BRLO-Tree
  • data structure
  • geographic information system
  • dynamic scene
Accès libre

OLB: A Nature Inspired Approach for Load Balancing in Cloud Computing

Publié en ligne: 26 Nov 2015
Pages: 138 - 148

Résumé

Abstract

Load balancing is treated as one of the important mechanisms for efficient resource allocation in cloud computing. In future there will appear a necessity of fully autonomic distributed systems to address the load balancing issues. With reference to this, we proposed a load balancing mechanism called Osmosis Load Balancing (OLB). OLB works on the principle of osmosis to reschedule the tasks in virtual machines. The solution is based on the Distributed Hash Table (DHT) with a chord overlay mechanism. The Chord overlay is used for managing bio inspired agents and status of the cloud. By simulation analysis, the proposed algorithm has shown better performance in different scenarios, both in heterogeneous and homogeneous clouds.

Mots clés

  • Load balance
  • virtual machines
  • osmosis
  • cloud
  • relocation
Accès libre

Modeling and Topological Properties of a V2I Sub Network in VANET Based on a Complex Network

Publié en ligne: 26 Nov 2015
Pages: 149 - 160

Résumé

Abstract

Vehicles to Infrastructure (V2I) communicate with each other in a Vehicular Ad hoc NETwork (VANET) that can be represented as a complex network. In them much interest has been attracted towards the topological properties and structure recently, and many studies focus the attention on it, in particular V2I sub network. V2I is an important basic part of the future intelligent transportation, which transfers information through a wireless communication network. Analyzing the topological properties would help understand the VANET system structure and reveal the essence of the network. In this paper we propose a V2I model in VANET based on the complex network theory, analyzing the degree distribution. VANET topology characteristics are designed and discussed. The simulation results further illustrate the efficiency and applicability of the proposed approach.

Mots clés

  • Intelligent transportation
  • topological characteristics
  • complex network
  • VANET
  • Vehicle to Infrastructure
12 Articles
Accès libre

A Generalized Multi Criteria Decision Making Method Based on Extension of ANP by Enhancing PAIR WISE Comparison Techniques

Publié en ligne: 26 Nov 2015
Pages: 3 - 12

Résumé

Abstract

A model of multi criteria decision making based on extended ANP has been provided and the existing AHP scale method is replaced by another method, in which the user has to provide fewer inputs. To check the validity of the proposed method, a sample data has been taken and an enhanced method is applied on it.

Mots clés

  • Decision making
  • MCDM
  • AHP
  • pair wise comparison
  • ANP
  • operation research
Accès libre

Improved Cross Entropy Measures of Single Valued Neutrosophic Sets and Interval Neutrosophic Sets and Their Multicriteria Decision Making Methods

Publié en ligne: 26 Nov 2015
Pages: 13 - 26

Résumé

Abstract

Due to some drawbacks of the cross entropy between Single Valued Neutrosophic Sets (SVNSs) in dealing with decision-making problems, the existing single valued neutrosophic cross entropy indicates an asymmetrical phenomenon or may produce an undefined (unmeaningful) phenomenon in some situations. In order to overcome these disadvantages, this paper proposes an improved cross entropy measure of SVNSs and investigates its properties, and then extends it to a cross entropy measure between interval neutrosophic sets (INSs). Furthermore, the cross entropy measures are applied to multicriteria decision making problems with single valued neutrosophic information and interval neutrosophic information. In decision making methods, through the weighted cross entropy measure between each alternative and the the ideal alternative, one can obtain the ranking order of all alternatives and the best one. The decision-making methods using the proposed cross entropy measures can efficiently deal with decision making problems with incomplete, indeterminate and inconsistent information which exist usually in real situations. Finally, two illustrative examples are provided to demonstrate the application and efficiency of the developed decision making approaches under single valued neutrosophic and interval neutrosophic environments.

Mots clés

  • Neutrosophic set
  • single valued neutrosophic set
  • interval neutrosophic set
  • cross entropy
  • multicriteria decision making
Accès libre

Modeling Workflow Systems Constrained by Inputs and Outputs − An Approach Based on Petri Nets

Publié en ligne: 26 Nov 2015
Pages: 27 - 41

Résumé

Abstract

Workflow systems are widely used in our daily life so that the validity, dependability and security with which they need to be assured are important. However, existing researches mainly focus on correctness validation, performance analysis and assignment scheduling, but the testing methods have been seldom suited. In this paper a formalized definition of workflows constrained by an input and output is presented, and based on that, a Petri Net-based model (I/O_WF_Net) is proposed. In I/O_WF_Net, the activities of the workflow can be modeled as transitions of a Petri Net, and the inputs and outputs of an activity can be modeled as places. After the modeling method for I/O constrained workflow net into the I/O_WF_Net model is described, the corresponding transforming algorithm and its simplifying method are given.

Mots clés

  • Workflow modeling
  • workflow testing
  • Petri Net
  • I/O_WF_Net
Accès libre

Robust Stability Analysis for a Perturbed Single-Area Power System Model

Publié en ligne: 26 Nov 2015
Pages: 42 - 49

Résumé

Abstract

This research work investigates the derivation of a fixed upper matrix bound for the solution of one class of parameter-dependent Continuous Algebraic Lyapunov Equations (CALE). It is supposed that the nominal coefficient matrix is subjected to real structured parametric uncertainty belonging to a convex set. The bound is used to analyze the robust stability and the performance behavior of a load-frequency control system for a single area power system model. By means of the bound one can easily estimate the distance from instability of the uncertain system and the linear quadratic performance index associated with it. The applicability of the obtained results is illustrated by an example.

Mots clés

  • Lyapunov equation
  • solution bounds
  • uncertain systems
  • power systems
Accès libre

High-Order Markov Random Fields and Their Applications in Cross-Language Speech Recognition

Publié en ligne: 26 Nov 2015
Pages: 50 - 57

Résumé

Abstract

In this paper we study the cross-language speech emotion recognition using high-order Markov random fields, especially the application in Vietnamese speech emotion recognition. First, we extract the basic speech features including pitch frequency, formant frequency and short-term intensity. Based on the low level descriptor we further construct the statistic features including maximum, minimum, mean and standard deviation. Second, we adopt the high-order Markov random fields (MRF) to optimize the cross-language speech emotion model. The dimensional restrictions may be modeled by MRF. Third, based on the Vietnamese and Chinese database we analyze the efficiency of our emotion recognition system. We adopt the dimensional emotion model (arousal-valence) to verify the efficiency of MRF configuration method. The experimental results show that the high-order Markov random fields can improve the dimensional emotion recognition in the cross-language experiments, and the configuration method shows promising robustness over different languages.

Mots clés

  • High-order Markov random fields
  • speech emotion recognition
  • crossdatabase recognition
  • dimensional emotion model
Accès libre

Text Mining and Big Data Analytics for Retrospective Analysis of Clinical Texts from Outpatient Care

Publié en ligne: 26 Nov 2015
Pages: 58 - 77

Résumé

Abstract

This paper presents the results of an on-going research project for knowledge extraction from large corpora of clinical narratives in Bulgarian language, approximately 100 million of outpatient care notes. Entities with numerical values are mined in the free text and the extracted information is stored in a structured format. The Algorithms for retrospective analyses and big data analytics are applied for studying the treatment and evaluating the diabetes compensation and control of arterial blood pressure.

Mots clés

  • Medical Informatics
  • Big Data
  • Text Mining
  • Information Extraction
  • Natural Language Processing
Accès libre

Towards an Efficient Approach for Automatic Medical Document Summarization

Publié en ligne: 26 Nov 2015
Pages: 78 - 91

Résumé

Abstract

Document summarization deals with providing condensed version of the original document. We present an extractive informative single medical document summarization approach. We compare the tokens in the sentence with cue words. A sentence ranking method is used to extract the important sentences. The existing summarizers are used for performance analysis.

Mots clés

  • Document summarization
  • medical document
  • Domain-specific vocabulary
  • cue words
  • sentence ranking
Accès libre

Bridging the Gap between Digital Libraries and e-Learning

Publié en ligne: 26 Nov 2015
Pages: 92 - 110

Résumé

Abstract

Digital Libraries (DL) are offering access to a vast amount of digital content, relevant to practically all domains of human knowledge, which makes it suitable to enhance teaching and learning. Based on a systematic literature review, this article provides an overview and a gap analysis of educational use of DLs.

Mots clés

  • e-Learning
  • digital libraries
  • personas
  • scenarios
  • digitisation priorities
Accès libre

Secured Document Sharing Using Visual Cryptography in Cloud Data Storage

Publié en ligne: 26 Nov 2015
Pages: 111 - 123

Résumé

Abstract

Security has emerged as the most concerned aspect of cloud computing environment and a prime challenge for the cloud users. The stored data can be retrieved by the user whenever and wherever required. But there is no guarantee that the data stored in the cloud server has not been accessed by any unauthorized user. The current cloud framework does not allow encrypted data to be stored due to the space and storage cost. Storing secret data in an unencrypted form is vulnerable to external attacks by both illegitimate customers and a Cloud Service Provider (CSP). Traditional encryption techniques require more computation and storage space. Hence, protecting cloud data with minimal computations is the prime task. Secured Document Sharing Using Visual Cryptography (SDSUVC) technique proposes an efficient storage scheme in a cloud for storing and retrieving a document file without any mathematical computations and also ensures data confidentiality and integrity.

Mots clés

  • Security
  • computing
  • environment
  • hindrance
  • frame work
  • vulnerable
  • attackers
  • efficient
  • visual cryptography
  • technique
  • confidentiality
  • integrity
Accès libre

BRLO-Tree: A Data Structure Used for 3D GIS Dynamic Scene Rendering

Publié en ligne: 26 Nov 2015
Pages: 124 - 137

Résumé

Abstract

BRLO-Tree (Block-R-Tree-Loose-Octree) is presented in this paper based on the R-Tree and Loose-Octree. The aim of the structure is to visualize the large scale and complex dynamic scenes in a 3D (three-dimensional) GIS (Geographic Information System). A new method of clustering rectangles to construct R-tree based on an improved K-means algorithm is put forward. Landform in 3D GIS is organized by R-Tree. The block is used as the basic rendering unit. The 3D objects of each block are respectively organized by a Loose-Octree. A series of techniques, based on this data structure, such as LOD (Level of Detail), relief impostors are integrated. The results of the tests show that BRLO-Tree cannot only support the large scale 3D GIS scene exhibition with wandering and fighting, but it can also efficiently manage the models in a dynamic scene. At the same time, a set of integrated techniques based on BRLO-Tree can make the rendering pictures more fluence and the rendering time vastly improved.

Mots clés

  • BRLO-Tree
  • data structure
  • geographic information system
  • dynamic scene
Accès libre

OLB: A Nature Inspired Approach for Load Balancing in Cloud Computing

Publié en ligne: 26 Nov 2015
Pages: 138 - 148

Résumé

Abstract

Load balancing is treated as one of the important mechanisms for efficient resource allocation in cloud computing. In future there will appear a necessity of fully autonomic distributed systems to address the load balancing issues. With reference to this, we proposed a load balancing mechanism called Osmosis Load Balancing (OLB). OLB works on the principle of osmosis to reschedule the tasks in virtual machines. The solution is based on the Distributed Hash Table (DHT) with a chord overlay mechanism. The Chord overlay is used for managing bio inspired agents and status of the cloud. By simulation analysis, the proposed algorithm has shown better performance in different scenarios, both in heterogeneous and homogeneous clouds.

Mots clés

  • Load balance
  • virtual machines
  • osmosis
  • cloud
  • relocation
Accès libre

Modeling and Topological Properties of a V2I Sub Network in VANET Based on a Complex Network

Publié en ligne: 26 Nov 2015
Pages: 149 - 160

Résumé

Abstract

Vehicles to Infrastructure (V2I) communicate with each other in a Vehicular Ad hoc NETwork (VANET) that can be represented as a complex network. In them much interest has been attracted towards the topological properties and structure recently, and many studies focus the attention on it, in particular V2I sub network. V2I is an important basic part of the future intelligent transportation, which transfers information through a wireless communication network. Analyzing the topological properties would help understand the VANET system structure and reveal the essence of the network. In this paper we propose a V2I model in VANET based on the complex network theory, analyzing the degree distribution. VANET topology characteristics are designed and discussed. The simulation results further illustrate the efficiency and applicability of the proposed approach.

Mots clés

  • Intelligent transportation
  • topological characteristics
  • complex network
  • VANET
  • Vehicle to Infrastructure

Planifiez votre conférence à distance avec Sciendo