Analysis of LTE performance of V2V communications on indonesia toll road
Vehicle-to-vehicle (V2V) is a transportation technology that uses wireless communication developed to solve transportation problems. In carrying out V2V communication, it has developed from the 802.11p ad-hoc communication protocol or what is known as Vehicular Ad-hoc Network (VANET) to Long Term Ev...
| Main Authors: | Amrullah, Agit, Azhar, Fadhilah, Aminuddin, Afrig, Ernawan, Ferda, Elhadi, Haitham |
|---|---|
| Format: | Conference or Workshop Item |
| Language: | English English |
| Published: |
Institute of Electrical and Electronics Engineers Inc.
2023
|
| Subjects: | |
| Online Access: | http://umpir.ump.edu.my/id/eprint/41912/ http://umpir.ump.edu.my/id/eprint/41912/1/Analysis%20of%20LTE%20performance%20of%20V2V%20communications.pdf http://umpir.ump.edu.my/id/eprint/41912/2/Analysis%20of%20LTE%20performance%20of%20V2V%20communications%20on%20indonesia%20toll%20road_ABS.pdf |
Similar Items
TCBR and TCBD: Evaluation metrics for tamper coincidence problem in fragile image watermarking
by: Afrig, Aminuddin, et al.
Published: (2024)
by: Afrig, Aminuddin, et al.
Published: (2024)
AuSR1 : Authentication and self-recovery using a new image inpainting technique with LSB shifting in fragile image watermarking
by: Aminuddin, Afrig, et al.
Published: (2022)
by: Aminuddin, Afrig, et al.
Published: (2022)
AuSR3: A new block mapping technique for image authentication and self-recovery to avoid the tamper coincidence problem
by: Afrig, Aminuddin, et al.
Published: (2023)
by: Afrig, Aminuddin, et al.
Published: (2023)
AuSR1: Authentication and self-recovery using a new image inpainting technique with LSB shifting in fragile image watermarking
by: Aminuddin, Afrig, et al.
Published: (2022)
by: Aminuddin, Afrig, et al.
Published: (2022)
TDSF: Two-phase tamper detection in semi-fragile watermarking using two-level integer wavelet transform
by: Amrullah, Agit, et al.
Published: (2025)
by: Amrullah, Agit, et al.
Published: (2025)
Face recognition using faster R-CNN with inception-V2 architecture for CCTV camera
by: Halawa, Lavin J., et al.
Published: (2019)
by: Halawa, Lavin J., et al.
Published: (2019)
A blind recovery technique with integer wavelet transforms in image watermarking
by: Ernawan, Ferda, et al.
Published: (2023)
by: Ernawan, Ferda, et al.
Published: (2023)
AuSR2: Image watermarking technique for authentication and self-recovery with image texture preservation
by: Aminuddin, Afrig, et al.
Published: (2022)
by: Aminuddin, Afrig, et al.
Published: (2022)
Three layer authentications with a spiral block mapping to prove authenticity in medical images
by: Ernawan, Ferda, et al.
Published: (2022)
by: Ernawan, Ferda, et al.
Published: (2022)
An improved hiding information by modifying selected DWT coefficients in video steganography
by: Ernawan, Ferda
Published: (2023)
by: Ernawan, Ferda
Published: (2023)
v-Faculty / Leong Kee Foo
by: Leong , Kee Foo
Published: (2001)
by: Leong , Kee Foo
Published: (2001)
Self-Recovery in Fragile Image Watermarking Using Integer Wavelet Transform
by: Ernawan, Ferda, et al.
Published: (2022)
by: Ernawan, Ferda, et al.
Published: (2022)
Robust Image Watermarking based on Psychovisual Threshold
by: Ernawan, Ferda
Published: (2016)
by: Ernawan, Ferda
Published: (2016)
An efficient adaptive scaling factor for 4×4 DCT image watermarking
by: Ernawan, Ferda, et al.
Published: (2023)
by: Ernawan, Ferda, et al.
Published: (2023)
A recent survey on image watermarking using scaling factor techniques for copyright protection
by: Ernawan, Ferda, et al.
Published: (2023)
by: Ernawan, Ferda, et al.
Published: (2023)
Tchebichef image watermarking along the edge using YCoCg-R color space for copyright protection
by: Ernawan, Ferda
Published: (2019)
by: Ernawan, Ferda
Published: (2019)
A method for predicting defects in System Testing for V-Model
by: Muhammad Dhiauddin Mohamed Suffian,, et al.
Published: (2012)
by: Muhammad Dhiauddin Mohamed Suffian,, et al.
Published: (2012)
Virtual hairstyle studio (V-Hair) / Lee Ean Har
by: Lee , Ean Har
Published: (2003)
by: Lee , Ean Har
Published: (2003)
Development of predictive modeling and deep learning classification of taxi trip tolls
by: Al-Shoukry, Suhad, et al.
Published: (2022)
by: Al-Shoukry, Suhad, et al.
Published: (2022)
Personality predictive analysis based on artificial neural network
by: Zuriani, Mustaffa, et al.
Published: (2022)
by: Zuriani, Mustaffa, et al.
Published: (2022)
Email virus scanner V1.1 / Nur Firdaus Ghazali
by: Nur Firdaus, Ghazali
Published: (2004)
by: Nur Firdaus, Ghazali
Published: (2004)
A New Psychovisual Threshold Technique in Image Processing Applications
by: Ernawan, Ferda
Published: (2016)
by: Ernawan, Ferda
Published: (2016)
Hand Gesture Recognition: Sign to Voice System (S2V)
by: Foong, Oi Mean
Published: (2009)
by: Foong, Oi Mean
Published: (2009)
Real time vein visualization using near-infrared imaging
by: May, Y. H., et al.
Published: (2020)
by: May, Y. H., et al.
Published: (2020)
A Robust Image Watermarking Technique With an Optimal DCT-Psychovisual Threshold
by: Ernawan, Ferda, et al.
Published: (2018)
by: Ernawan, Ferda, et al.
Published: (2018)
A block-based RDWT-SVD image watermarking method using human visual system characteristics
by: Ernawan, Ferda, et al.
Published: (2018)
by: Ernawan, Ferda, et al.
Published: (2018)
Dual watermarking based on DCT with human visual characteristics for authentication and copyright protection
by: Ernawan, Ferda, et al.
Published: (2023)
by: Ernawan, Ferda, et al.
Published: (2023)
Knowledge design in rule-based system architecture for C tutorial / V Thavachelvi Velautham
by: V Thavachelvi, Velautham
Published: (2005)
by: V Thavachelvi, Velautham
Published: (2005)
An adaptive scaling factor for multiple watermarking scheme
by: Dhani, Ariatmanto, et al.
Published: (2019)
by: Dhani, Ariatmanto, et al.
Published: (2019)
Video steganography based on DCT psychovisual and object motion
by: Muhammad, Fuad, et al.
Published: (2020)
by: Muhammad, Fuad, et al.
Published: (2020)
Adaptive scaling factors based on the impact of selected DCT coefficients for image watermarking
by: Ariatmanto, Dhani, et al.
Published: (2020)
by: Ariatmanto, Dhani, et al.
Published: (2020)
An improved robust image watermarking by using different embedding strengths
by: Ernawan, Ferda, et al.
Published: (2020)
by: Ernawan, Ferda, et al.
Published: (2020)
Frames selection based on modified entropy and object motion in video steganography
by: Muhammad, Fuad, et al.
Published: (2019)
by: Muhammad, Fuad, et al.
Published: (2019)
Lawatan Maya di FSKTM secara Online (V-TOUR) / Ahmad Faizal Ismail @ Z.Abidin
by: Ahmad Faizal, Ismail @ Z.Abidin
Published: (2003)
by: Ahmad Faizal, Ismail @ Z.Abidin
Published: (2003)
Hybrid LTE-VANETs Based Optimal Radio Access Selection
by: Ayoob, Ayoob A., et al.
Published: (2018)
by: Ayoob, Ayoob A., et al.
Published: (2018)
SVD-gorank: Recommender system algorithm using SVD and gower's ranking
by: Saifudin, Ilham, et al.
Published: (2025)
by: Saifudin, Ilham, et al.
Published: (2025)
Development of Website Service Governance at the Muhammadiyah University Palembang Using the ITIL V3 Method
by: Kemas Muhammad, Wahyu Hidayat, et al.
Published: (2022)
by: Kemas Muhammad, Wahyu Hidayat, et al.
Published: (2022)
V2S: Voice to Sign Language Translation System for Malaysian Deaf People
by: Foong, Oi Mean, et al.
Published: (2009)
by: Foong, Oi Mean, et al.
Published: (2009)
A new embedding technique based on psychovisual threshold for robust and secure compressed video steganography
by: Ferda, Ernawan, et al.
Published: (2020)
by: Ferda, Ernawan, et al.
Published: (2020)
Product recommendation using deep learning in computer vision
by: Mogan, Sharvinteraan Carberry, et al.
Published: (2023)
by: Mogan, Sharvinteraan Carberry, et al.
Published: (2023)
Similar Items
-
TCBR and TCBD: Evaluation metrics for tamper coincidence problem in fragile image watermarking
by: Afrig, Aminuddin, et al.
Published: (2024) -
AuSR1 : Authentication and self-recovery using a new image inpainting technique with LSB shifting in fragile image watermarking
by: Aminuddin, Afrig, et al.
Published: (2022) -
AuSR3: A new block mapping technique for image authentication and self-recovery to avoid the tamper coincidence problem
by: Afrig, Aminuddin, et al.
Published: (2023) -
AuSR1: Authentication and self-recovery using a new image inpainting technique with LSB shifting in fragile image watermarking
by: Aminuddin, Afrig, et al.
Published: (2022) -
TDSF: Two-phase tamper detection in semi-fragile watermarking using two-level integer wavelet transform
by: Amrullah, Agit, et al.
Published: (2025)