Simulative Performance Evaluation of a Free Space Optical Communication Link Operating at 1550 nm using Different Modulation Formats
暂无分享,去创建一个
Karamdeep Singh | Salwinder Singh | Shivinder Devra | Shivinder Devra | Karamdeep Singh | Salwinder Singh
[1] Bogdan Filipic,et al. DEMO: Differential Evolution for Multiobjective Optimization , 2005, EMO.
[2] Yang Tang,et al. Secure Overlay Cloud Storage with Access Control and Assured Deletion , 2012, IEEE Transactions on Dependable and Secure Computing.
[3] Yanqing Zhang,et al. A genetic algorithm-based method for feature subset selection , 2008, Soft Comput..
[4] Xin-She Yang,et al. Binary Flower Pollination Algorithm and Its Application to Feature Selection , 2015, Recent Advances in Swarm Intelligence and Evolutionary Computation.
[5] Philip S. Yu,et al. Efficient Relevance Feedback for Content-Based Image Retrieval by Mining User Navigation Patterns , 2011, IEEE Transactions on Knowledge and Data Engineering.
[6] Xin-She Yang,et al. Engineering Optimization: An Introduction with Metaheuristic Applications , 2010 .
[7] Pradeep K. Khosla,et al. Selecting the Right Data Distribution Scheme for a Survivable Storage System (CMU-CS-01-120) , 2001 .
[8] Ashwin Kothari,et al. Linear antenna array optimization using flower pollination algorithm , 2016, SpringerPlus.
[9] Kun-Chan Lan,et al. Rapid Generation of Realistic Mobility Models for VANET , 2007, 2007 IEEE Wireless Communications and Networking Conference.
[10] L. Plümer,et al. Original paper: Early detection and classification of plant diseases with Support Vector Machines based on hyperspectral reflectance , 2010 .
[11] A Sudheer Kumar,et al. A New Meta Heuristic Algorithm Based Shunt Capacitive Compensation for Power Loss Reduction on Radial Distribution System , 2014 .
[12] Amir-Masoud Eftekhari-Moghadam,et al. An adaptive image steganographic scheme based on Noise Visibility Function and an optimal chaotic based encryption method , 2015, Appl. Soft Comput..
[13] Shih-Fu Chang,et al. Using Relevance Feedback in Content-Based Image Metasearch , 1998, IEEE Internet Comput..
[14] Dheerendra Singh,et al. Robust and Efficient 'RGB' based Fractal Image Compression: Flower Pollination based Optimization , 2013 .
[15] Vipin Kumar,et al. Feature Selection: A literature Review , 2014, Smart Comput. Rev..
[16] Ferat Sahin,et al. A survey on feature selection methods , 2014, Comput. Electr. Eng..
[17] Ivan B. Djordjevic,et al. A survey on recent advances in optical communications , 2014, Comput. Electr. Eng..
[18] V. S. S. S. Chakravarthy Vedula,et al. Synthesis of Circular Array Antenna for Sidelobe Level and Aperture Size Control Using Flower Pollination Algorithm , 2015 .
[19] Djamel-Eddine Saïdouni,et al. A discrete flower pollination algorithm for graph coloring problem , 2015, 2015 IEEE 2nd International Conference on Cybernetics (CYBCONF).
[20] C Shilaja,et al. Optimal Line Flow in Conventional Power System using Euclidean Affine Flower Pollination Algorithm , 2016 .
[21] W. Diepenbrock,et al. A method to extract morphological traits of plant organs from 3D point clouds as a database for an architectural plant model , 2007 .
[22] Ali Harounabadi,et al. Feature Ranking in Intrusion Detection Dataset using Combination of Filtering Methods , 2013 .
[23] Pavel Paclík,et al. Adaptive floating search methods in feature selection , 1999, Pattern Recognit. Lett..
[24] Volker Steinhage,et al. Semantic Skeletonization for Structural Plant Analysis , 2013 .
[25] Bernd Grobauer,et al. Understanding Cloud Computing Vulnerabilities , 2011, IEEE Security & Privacy.
[26] Younghwan Yoo,et al. A Partition-Based LEACH Algorithm for Wireless Sensor Networks , 2009, 2009 Ninth IEEE International Conference on Computer and Information Technology.
[27] Lale Özbakır,et al. Artificial Bee Colony Algorithm and Its Application to Generalized Assignment Problem , 2007 .
[28] Pan Feng,et al. Wireless LAN security issues and solutions , 2012, 2012 IEEE Symposium on Robotics and Applications (ISRA).
[29] Ching-Nung Yang,et al. A general multi-secret visual cryptography scheme , 2010 .
[30] Bijay Ketan Panigrahi,et al. Hybrid flower pollination algorithm with time-varying fuzzy selection mechanism for wind integrated multi-objective dynamic economic dispatch , 2015 .
[31] Mihai Datcu,et al. A fast compression-based similarity measure with applications to content-based image retrieval , 2012, J. Vis. Commun. Image Represent..
[32] Sasongko Pramono Hadi,et al. Flower pollination algorithm for optimal control in multi-machine system with GUPFC , 2014, 2014 6th International Conference on Information Technology and Electrical Engineering (ICITEE).
[33] Mohamed Abdel-Baset,et al. A Novel Hybrid Flower Pollination Algorithm with Chaotic Harmony Search for Solving Sudoku Puzzles , 2014 .
[34] Yongquan Zhou,et al. Flower Pollination Algorithm with Dimension by Dimension Improvement , 2014 .
[35] Pedro Larrañaga,et al. A review of feature selection techniques in bioinformatics , 2007, Bioinform..
[36] H. Kabir. Research Issues on Vehicular Ad hoc Network , 2013 .
[37] B. S. Manjunath,et al. NeTra: A toolbox for navigating large image databases , 1997, Multimedia Systems.
[38] Manoj Kumar,et al. Performance evaluation of 16 channel DWDM radio-over-fiber link , 2013 .
[39] Ishfaq Ahmad,et al. Comparison and analysis of ten static heuristics-based Internet data replication techniques , 2008, J. Parallel Distributed Comput..
[40] Li Zhuo,et al. A genetic algorithm based wrapper feature selection method for classification of hyperspectral images using support vector machine , 2008, Geoinformatics.
[41] Vaishali D. Khairnar,et al. DEMO: Simulation of Realistic Mobility Model and Implementation of 802.11p (DSRC) for Vehicular Networks (VANET) , 2013, ArXiv.
[42] B. S. Manjunath. Image Browsing in the Alexandria Digital Library (ADL) Project , 1995, D Lib Mag..
[43] Lili Qiu,et al. On the placement of Web server replicas , 2001, Proceedings IEEE INFOCOM 2001. Conference on Computer Communications. Twentieth Annual Joint Conference of the IEEE Computer and Communications Society (Cat. No.01CH37213).
[44] Amir-Massoud Bidgoli,et al. A Hybrid Feature Selection Method to Improve Performance of a Group of Classification Algorithms , 2013, ArXiv.
[45] S Ramgovind,et al. The management of security in Cloud computing , 2010, 2010 Information Security for South Africa.
[46] Bok-Min Goi,et al. Cloud enabled spam filtering services: Challenges and opportunities , 2011, 2011 IEEE Conference on Sustainable Utilization and Development in Engineering and Technology (STUDENT).
[47] Arnold W. M. Smeulders,et al. PicToSeek: combining color and shape invariant features for image retrieval , 2000, IEEE Trans. Image Process..
[48] Pei-Ling Chiu,et al. Image Size Invariant Visual Cryptography for General Access Structures Subject to Display Quality Constraints , 2013, IEEE Transactions on Image Processing.
[49] G. Wiselin Jiji,et al. Hybrid data clustering approach using K-Means and Flower Pollination Algorithm , 2015, ArXiv.
[50] Carlos Alberto Ochoa Ortíz Zezzatti,et al. Implementing flower multi-objective algorithm for selection of university academic credits , 2014, 2014 Sixth World Congress on Nature and Biologically Inspired Computing (NaBIC 2014).
[51] Simon Haykin,et al. Neural Networks: A Comprehensive Foundation , 1998 .
[52] Mazin Ali,et al. Analysis of Data Rate for Free Space Optical Communications System , 2014 .
[53] Sushil Jajodia,et al. Secure Dynamic Fragment and Replica Allocation in Large-Scale Distributed File Systems , 2003, IEEE Trans. Parallel Distributed Syst..
[54] Klaudia Kaiser,et al. Wireless Communication Systems From Rf Subsystems To 4g Enabling Technologies , 2016 .
[55] Ishfaq Ahmad,et al. Static and adaptive distributed data replication using genetic algorithms , 2004, J. Parallel Distributed Comput..
[56] Dewan Md. Farid,et al. Literature Review of Feature Selection for Mining Tasks , 2015 .
[57] Dimitrios Zissis,et al. Securing e-Government and e-Voting with an open cloud computing architecture , 2011, Gov. Inf. Q..
[58] Anu Sheetal,et al. Comparison of CSRZ, DRZ and MDRZ Modulation Formats for High Bit Rate WDM-PON System using AWG , 2012 .
[59] Ching-Nung Yang,et al. Aspect ratio invariant visual cryptography by image filtering and resizing , 2012, Personal and Ubiquitous Computing.
[60] Mooi Choo Chuah,et al. Design and Performance of 3G Wireless Networks and Wireless LANs , 2005 .
[61] Wenye Wang,et al. ART: an asymmetric and reliable transport mechanism for wireless sensor networks , 2007, Int. J. Sens. Networks.
[62] Asoke Nath,et al. Symmetric Key Cryptography Using Random Key Generator , 2010, Security and Management.
[63] K. Kersting,et al. Early drought stress detection in cereals: simplex volume maximisation for hyperspectral image analysis. , 2012, Functional plant biology : FPB.
[64] Yuh-Shyan Chen,et al. Routing Protocols in Vehicular Ad Hoc Networks: A Survey and Future Perspectives , 2010, J. Inf. Sci. Eng..
[65] Mazliza Othman,et al. A Survey of Mobile Cloud Computing Application Models , 2014, IEEE Communications Surveys & Tutorials.
[66] Ulas Kilic,et al. Optimal Reactive Power Dispatch Problem Solved By Using Flower Pollination Algorithm , 2016 .
[68] Albert Y. Zomaya,et al. On the Characterization of the Structural Robustness of Data Center Networks , 2013, IEEE Transactions on Cloud Computing.
[69] W. Cao,et al. The International Archives of the Photogrammetry, Remote Sensing and Spatial Information Sciences, Vol. XXXVIII-4/C7 CLASSIFICATION OF HIGH RESOLUTION OPTICAL AND SAR FUSION IMAGE USING FUZZY KNOWLEDGE AND OBJECT-ORIENTED PARADIGM , 2010 .
[70] Joan Feigenbaum,et al. Graph distances in the streaming model: the value of space , 2005, SODA '05.
[71] Ethem Alpaydin,et al. Introduction to Machine Learning (Adaptive Computation and Machine Learning) , 2004 .
[72] Hossein Shahamat,et al. Feature selection using genetic algorithm for classification of schizophrenia using fMRI data , 2015 .
[73] S. S. Dorle,et al. Particle Swarm Optimization based Routing Protocol for Vehicular Ad Hoc Network , 2015 .
[74] Rui Wang,et al. An Improved Flower Pollination Algorithm for Optimal Unmanned Undersea Vehicle Path Planning Problem , 2016, Int. J. Pattern Recognit. Artif. Intell..
[75] Choong Seon Hong,et al. Multipath Congestion Control for Heterogeneous Traffic in Wireless Sensor Network , 2008, 2008 10th International Conference on Advanced Communication Technology.
[76] Aditi Malik,et al. Free Space Optics: Current Applications and Future Challenges , 2015 .
[77] Martin Gilje Jaatun,et al. Beyond lightning: A survey on security challenges in cloud computing , 2013, Comput. Electr. Eng..
[79] Youngshin Han,et al. Implementation of Cloud Computing Environment for Discrete Event System Simulation using Service Oriented Architecture , 2010, 2010 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing.
[80] Bo Li,et al. A survey of transport protocols for wireless sensor networks , 2006, IEEE Network.
[81] B. V. Babu,et al. Multi-objective differential evolution (MODE) for optimization of supply chain planning and management , 2007, 2007 IEEE Congress on Evolutionary Computation.
[82] Miss. Dhanashree S. Kalel,et al. Color, Shape and Texture feature extraction for Content Based Image Retrieval System: A Study , 2016 .
[83] Yuxiang Zhou,et al. Local Greedy Flower Pollination Algorithm for Solving Planar Graph Coloring Problem , 2015 .
[84] Ji Young Lee,et al. Multi-objective optimisation using the Bees Algorithm , 2010 .
[86] Eduardo B. Fernández,et al. An analysis of security issues for cloud computing , 2013, Journal of Internet Services and Applications.
[87] Rajinder Singh Kaler,et al. Simulation of high capacity 40 Gb/s long haul DWDM system using different modulation formats and dispersion compensation schemes in the presence of Kerr's effect , 2010 .
[88] mahmoud mohamed ismail ali,et al. An Improved Chaotic Flower Pollination Algorithm for Solving LargeInteger Programming Problems , 2014 .
[89] N. Madavan. Multiobjective optimization using a Pareto differential evolution approach , 2002, Proceedings of the 2002 Congress on Evolutionary Computation. CEC'02 (Cat. No.02TH8600).
[90] Heiner Kuhlmann,et al. Surface feature based classification of plant organs from 3D laserscanned point clouds for plant phenotyping , 2013, BMC Bioinformatics.
[91] M. Singh,et al. A single As2Se3 chalcogenide Highly Non-Linear Fiber (HNLF) based simultaneous all-optical half-adder and half-subtracter , 2015 .
[92] T. Devi,et al. Design and Development of an Algorithm for Image Clustering In Textile Image Retrieval Using Color Descriptors , 2012 .
[93] Jeremy S. Smith,et al. Image pattern classification for the identification of disease causing agents in plants , 2009 .
[94] D. Turgay Altilar,et al. HYBRIST Mobility Model- A Novel Hybrid Mobility Model for VANET Simulations , 2014, ArXiv.
[95] Yuhong Yang,et al. Information Theory, Inference, and Learning Algorithms , 2005 .
[96] Josef Kittler,et al. Floating search methods in feature selection , 1994, Pattern Recognit. Lett..
[97] Mohamed Abdel-Baset,et al. A Hybrid Flower Pollination Algorithm for Engineering Optimization Problems , 2016 .
[98] Giorgos Kappes,et al. Dike : Virtualization-aware Access Control for Multitenant Filesystems , 2013 .
[99] Oindrilla Dutta,et al. DE-FPA: A hybrid differential evolution-flower pollination algorithm for function minimization , 2014, 2014 International Conference on High Performance Computing and Applications (ICHPCA).
[100] Yves Deswarte,et al. Intrusion tolerance in distributed computing systems , 1991, Proceedings. 1991 IEEE Computer Society Symposium on Research in Security and Privacy.
[101] Xin-She Yang,et al. Flower Pollination Algorithm for Global Optimization , 2012, UCNC.
[102] Andrew Warfield,et al. Live migration of virtual machines , 2005, NSDI.
[103] Nikita Arora,et al. Block and Stream Cipher Based Cryptographic Algorithms : A Survey , 2014 .
[104] Kai Liu,et al. Upstream hop-by-hop congestion control in wireless sensor networks , 2009, 2009 IEEE 20th International Symposium on Personal, Indoor and Mobile Radio Communications.
[105] Junli Liang,et al. Double-image encryption based on discrete multiple-parameter fractional angular transform and two-coupled logistic maps , 2015 .
[106] Subhajyoti Bandyopadhyay,et al. Cloud computing - The business perspective , 2011, Decis. Support Syst..
[107] Xin-She Yang,et al. Bat algorithm: a novel approach for global engineering optimization , 2012, 1211.6663.
[108] Lori M. Kaufman,et al. Data Security in the World of Cloud Computing , 2009, IEEE Security & Privacy.
[109] Harish Kundra,et al. A hybrid FPAB/BBO Algorithm for Satellite Image Classification , 2010 .
[110] Lei Yu,et al. Fast Correlation Based Filter (FCBF) with a different search strategy , 2008, 2008 23rd International Symposium on Computer and Information Sciences.
[111] Tao Wang,et al. A Hybrid Feature Selection Algorithm: Combination of Symmetrical Uncertainty and Genetic Algorithms , 2008 .
[112] Naresh Kumar,et al. Performance analysis of different modulation format on free space optical communication system , 2013 .
[113] Alfred Menezes,et al. Handbook of Applied Cryptography , 2018 .
[114] Xin-She Yang,et al. Flower pollination algorithm: A novel approach for multiobjective optimization , 2014, ArXiv.
[115] Rohini K. Srihari,et al. Intelligent Indexing and Semantic Retrieval of Multimodal Documents , 2004, Information Retrieval.
[116] Duncan Fyfe Gillies,et al. A Review of Feature Selection and Feature Extraction Methods Applied on Microarray Data , 2015, Adv. Bioinformatics.
[117] Shivinder Devra. Dispersion Compensation Using Raised Cosine Filter inOptical Fibers , 2011 .
[118] Alex Pentland,et al. Photobook: Content-based manipulation of image databases , 1996, International Journal of Computer Vision.
[119] Emad Nabil,et al. A Modified Flower Pollination Algorithm for Global Optimization , 2016, Expert Syst. Appl..
[120] Jacob John. Cryptography for Resource Constrained Devices: A Survey , 2012 .
[121] Samee Ullah Khan,et al. Future Generation Computer Systems ( ) – Future Generation Computer Systems towards Secure Mobile Cloud Computing: a Survey , 2022 .
[122] Ari Juels,et al. New approaches to security and availability for cloud data , 2013, CACM.
[123] Shivinder Devra,et al. Different Compensation Techniques To Compensate Chromatic Dispersion In Fiber Optics , 2011 .
[124] Florian David. Scintillation loss in free-space optic IM/DD systems , 2004, SPIE LASE.
[125] Mrs. P. Nalini. Review on Content Based Image Retrieval : From Its Origin to the New Age , 2016 .
[126] Rajkumar Buyya,et al. Article in Press Future Generation Computer Systems ( ) – Future Generation Computer Systems Cloud Computing and Emerging It Platforms: Vision, Hype, and Reality for Delivering Computing as the 5th Utility , 2022 .
[127] Jasbir S. Arora,et al. Survey of multi-objective optimization methods for engineering , 2004 .
[128] Kalyanmoy Deb,et al. Mechanical Component Design for Multiple Objectives Using Elitist Non-dominated Sorting GA , 2000, PPSN.
[129] Jeremy S. Smith,et al. An image-processing based algorithm to automatically identify plant disease visual symptoms. , 2009 .
[130] Farooq Khan,et al. LTE for 4G Mobile Broadband: Air Interface Technologies and Performance , 2009 .
[131] Li Qiang Tao,et al. ECODA: enhanced congestion detection and avoidance for multiple class of traffic in sensor networks , 2009, IEEE Transactions on Consumer Electronics.
[132] Mohamed Abdel-Baset,et al. A New Hybrid Flower Pollination Algorithm for Solving Constrained Global Optimization Problems , 2014 .
[133] Shih-Fu Chang,et al. Querying by color regions using VisualSEEk content-based visual query system , 1997 .
[134] Chien-Ming Chou,et al. Realistic mobility models for Vehicular Ad hoc Network (VANET) simulations , 2008, 2008 8th International Conference on ITS Telecommunications.
[135] Panos M. Pardalos,et al. A survey of data mining techniques applied to agriculture , 2009, Oper. Res..
[136] Shailendra Singh,et al. An ensemble approach for feature selection of Cyber Attack Dataset , 2009, ArXiv.
[137] Raghupathy Sivakumar,et al. ATP: a reliable transport protocol for ad hoc networks , 2003, IEEE Transactions on Mobile Computing.
[138] Perica Strbac,et al. Toward optimal feature selection using ranking methods and classification algorithms , 2011 .
[139] Edoardo Ardizzone,et al. JACOB: just a content-based query system for video databases , 1996, 1996 IEEE International Conference on Acoustics, Speech, and Signal Processing Conference Proceedings.
[140] M. Sumathi. Swarm Intelligence based Bee inspired routing protocol for multipath routing in MANET , 2015 .
[141] Petra Perner,et al. Data Mining - Concepts and Techniques , 2002, Künstliche Intell..
[142] Peng Li,et al. On the optimal placement of secure data objects over Internet , 2005, 19th IEEE International Parallel and Distributed Processing Symposium.
[143] Preeti Nagrath,et al. Nested Digital Image Watermarking Technique Using Blowfish Encryption Algorithm , 2013 .
[144] G. H. Raisoni,et al. Bio-Inspired Routing Protocol for Vehicular Ad Hoc Networks , 2014 .
[145] Khalil AL-Wagih,et al. An Improved Flower Pollination Algorithm for Solving Integer Programming Problems , 2015 .
[146] Arthur C. Sanderson,et al. Multi-objective differential evolution: theory and applications , 2004 .
[147] Dimitrios Zissis,et al. Addressing cloud computing security issues , 2012, Future Gener. Comput. Syst..
[148] Antony Selvadoss Thanamani,et al. Feature Selection Based on Information Gain , 2013 .
[149] Jitendra Malik,et al. Blobworld: A System for Region-Based Image Indexing and Retrieval , 1999, VISUAL.
[150] Lloyd A. Smith,et al. Practical feature subset selection for machine learning , 1998 .
[151] JaeWon Kang,et al. TARA: Topology-Aware Resource Adaptation to Alleviate Congestion in Sensor Networks , 2007, IEEE Transactions on Parallel and Distributed Systems.
[152] Don R. Hush,et al. Query by image example: The CANDID approach , 1995 .
[153] Hesham N. Elmahdy,et al. Flower Pollination Optimization Algorithm for Wireless Sensor Network Lifetime Global Optimization , 2014, SOCO 2014.
[154] Václav Snásel,et al. Retinal Vessel Segmentation Based on Flower Pollination Search Algorithm , 2014, IBICA.
[155] Jose A. Regalado,et al. Optimal power flow solution using Modified Flower Pollination Algorithm , 2015, 2015 IEEE International Autumn Meeting on Power, Electronics and Computing (ROPEC).
[156] Guiran Chang,et al. Surveying and Analyzing Security, Privacy and Trust Issues in Cloud Computing Environments , 2011 .
[157] Amarnath Gupta,et al. Virage image search engine: an open framework for image management , 1996, Electronic Imaging.
[158] S. Sasikala,et al. Multi Filtration Feature Selection (MFFS) to improve discriminatory ability in clinical data set , 2016 .
[159] DISPERSION COMPENSATION USING ALL PASS FILTERS IN OPTICAL FIBERS , .
[160] Siddhant K. Jaiswal,et al. Hybrid Approach for Routing in Vehicular Ad-hocNetwork (VANET) Using Clustering Approach , 2013 .
[161] Michael Stonebraker,et al. Chabot: Retrieval from a Relational Database of Images , 1995, Computer.
[162] Linda G. Shapiro,et al. A flexible image database system for content-based retrieval , 1998, Proceedings. Fourteenth International Conference on Pattern Recognition (Cat. No.98EX170).
[163] D. Rajya Lakshmi,et al. Feature Extraction Methods for Color Image Similarity , 2012, ArXiv.
[164] O. Mohamed,et al. Hybridizing Filters and Wrapper Approaches for Improving the Classification Accuracy of Microarray Dataset , 2013 .
[165] Günther Greiner,et al. A Model-based Approach to Extract Leaf Features from 3D Scans , 2013 .
[166] Wayne A. Jansen,et al. Cloud Hooks: Security and Privacy Issues in Cloud Computing , 2011, 2011 44th Hawaii International Conference on System Sciences.
[167] Osama Abdel Raouf,et al. An Improved Flower Pollination Algorithm with Chaos , 2014 .
[168] Sougata Mukherjea,et al. AMORE: A World Wide Web image retrieval engine , 1999, World Wide Web.
[169] Miss Laiha Mat Kiah,et al. Enhanced dynamic credential generation scheme for protection of user identity in mobile-cloud computing , 2013, The Journal of Supercomputing.
[170] Divya Chadha,et al. Query by Image for Efficient Information Retrieval: A Necessity , 2011 .
[171] Mohamed Abdel-Baset,et al. A Hybrid Flower Pollination Algorithm with Tabu Search for Unconstrained Optimization Problems , 2016 .
[172] Linda K. Moore. Wireless Technology and Spectrum Demand: Advanced Wireless Services , 2006 .
[173] D. Straeten,et al. Seeing is believing: imaging techniques to monitor plant health. , 2001, Biochimica et biophysica acta.
[174] Ivanka Menken,et al. Cloud Computing Virtualization Specialist Complete Certification Kit - Study Guide Book and Online Course - Second Edition , 2009 .
[175] Hamid R. Rabiee,et al. WCCP: A congestion control protocol for wireless multimedia communication in sensor networks , 2014, Ad Hoc Networks.
[176] Linesh Raja,et al. The Realistic Mobility Evaluation of Vehicular Ad-Hoc Network for Indian Automotive Networks , 2014 .