Vehicular Cloud Computing for Traffic Management and Systems
Book Citation Index

Vehicular Cloud Computing for Traffic Management and Systems

Jyoti Grover (Manipal University Jaipur, India), P. Vinod (SCMS School of Engineering and Technology, India) and Chhagan Lal (Manipal University Jaipur, India)
Release Date: June, 2018|Copyright: © 2018 |Pages: 281
DOI: 10.4018/978-1-5225-3981-0
ISBN13: 9781522539810|ISBN10: 1522539816|EISBN13: 9781522539827
Hardcover:
Available
$235.00
TOTAL SAVINGS: $235.00
Benefits
  • Free shipping on orders $395+
  • Printed-On-Demand (POD)
  • Usually ships one day from order
  • 20% discount on 5+ titles*
E-Book:
(Multi-User License)
Available
$235.00
TOTAL SAVINGS: $235.00
Benefits
  • Multi-user license (no added fee)
  • Immediate access after purchase
  • No DRM
  • ePub with PDF download
  • 20% discount on 5+ titles*
Hardcover +
E-Book:
(Multi-User License)
Available
$280.00
TOTAL SAVINGS: $280.00
Benefits
  • Free shipping on orders $395+
  • Printed-On-Demand (POD)
  • Usually ships one day from order
  • Multi-user license (no added fee)
  • Immediate access after purchase
  • No DRM
  • ePub with PDF download
  • 20% discount on 5+ titles*
OnDemand:
(Individual Chapters)
Available
$37.50
TOTAL SAVINGS: $37.50
Benefits
  • Purchase individual chapters from this book
  • Immediate PDF download after purchase or access through your personal library
  • 20% discount on 5+ titles*
Description & Coverage
Description:

Road accidents caused by impaired and distracted driving as well as traffic congestion are on the rise, with the numbers increasing dramatically every day. Intelligent transportation systems (ITS) aim to improve the efficiency and safety of traveling by consolidating vehicle operations, managing vehicle traffic, and notifying drivers with alerts and safety messages in real time.

Vehicular Cloud Computing for Traffic Management and Systems provides innovative research on the rapidly advancing applications of vehicle-to-vehicle and vehicle-to-infrastructure communication. It also covers the need to fully utilize vehicular ad-hoc network (VANET) resources to provide updated and dynamic information about the conditions of road traffic so that the number of road accidents can be minimized. Featuring research on topics such as identity management, computational architecture, and resource management, this book is ideally designed for urban planners, researchers, policy makers, graduate-level students, transportation engineers, and technology developers seeking current research on vehicle computational design, architecture, security, and privacy.

Coverage:

The many academic areas covered in this publication include, but are not limited to:

  • Communication Protocols
  • Computational Architecture
  • Computing Models
  • Fog Computing
  • Identity Management
  • Privacy
  • Resource Management
  • Smart Cities
  • Traffic Control Systems
Table of Contents
Search this Book:
Reset
Editor Biographies
Jyoti Grover received a PhD degree in Computer Engineering from Malaviya National Institute of Technology, Jaipur (India) in 2013. Prior to this, she completed M.Tech degree in Computer Science and Engineering from G.J. University in 2004 and B.E in Computer Science and Engineering from M.D. University, Rohtak, India in 2002. Currently, she is an Associate Professor in Computer Science and Engineering department at Manipal University Jaipur (India). Her areas of interest are Ad hoc networks security, VANET, cloud and mobile computing.
Vinod P. is Professor in Department of Computer Science & Engineering at SCMS School of Engineering & Technology, Cochin, Kerala. He holds his Ph.D in Computer Engineering from Malaviya National Institute of Technology, Jaipur, India. He has also served as programme committee member in the International Security Conference like Security of Information and Networks, ICACCI, ICISSP etc. He also a reviewer of Inderscience Journal of Information and Computer Security, Elsevier Journal of Information Security and Application. Dr. Vinod P's research uses feature selection and dimensionality reduction methods which is major principle in Machine Learning Domain in the detection of malicious application. He has more than 70 research articles published in peer reviewed Journals and International Conferences. His current research is involved in the development of offline malware scanner for mobile application using machine learning techniques. Vinod's area of interest is Malware Analysis, Data Mining, Ethical Hacking and Natural Language Processing.
Peer Review Process
The peer review process is the driving force behind all IGI Global books and journals. All IGI Global reviewers maintain the highest ethical standards and each manuscript undergoes a rigorous double-blind peer review process, which is backed by our full membership to the Committee on Publication Ethics (COPE). Learn More >
Ethics & Malpractice
IGI Global book and journal editors and authors are provided written guidelines and checklists that must be followed to maintain the high value that IGI Global places on the work it publishes. As a full member of the Committee on Publication Ethics (COPE), all editors, authors and reviewers must adhere to specific ethical and quality standards, which includes IGI Global’s full ethics and malpractice guidelines and editorial policies. These apply to all books, journals, chapters, and articles submitted and accepted for publication. To review our full policies, conflict of interest statement, and post-publication corrections, view IGI Global’s Full Ethics and Malpractice Statement.