59
Views
17
CrossRef citations to date
0
Altmetric
Articles

An enhanced energy efficient routing protocol for VANET using special cross over in genetic algorithm

, , &
Pages 1349-1364 | Received 01 Jun 2018, Published online: 24 Nov 2019

Keep up to date with the latest research on this topic with citation updates for this article.

Read on this site (17)

Shatarupa Dash & Bharat J. R. Sahu. (2022) Genetic algorithm based coverage optimization 5G networks. Journal of Information and Optimization Sciences 43:5, pages 933-939.
Read now
S. Gnana Sanga Mithra & V. Vijayalaskmi. (2022) A mathematical model for breaching the blockades-mainstreaming transwomen and transmen in Chennai by using block fuzzy cognitive. Journal of Interdisciplinary Mathematics 25:3, pages 827-838.
Read now
Santosh Kumar, Neha Janu, Linesh Raja & Ankit Kumar. (2022) A fuzzy ISM analysis of factors in growth of initial coin offerings (ICOs). Journal of Interdisciplinary Mathematics 25:3, pages 815-825.
Read now
Osama R. Shahin, Rasha M. Abd El-Aziz & Ahmed I. Taloba. (2022) Detection and classification of Covid-19 in CT-lungs screening using machine learning techniques. Journal of Interdisciplinary Mathematics 25:3, pages 791-813.
Read now
Anjali Meena, Anima Vaish, Shweta Meena, Ramesh Chand Meena & Santosh Kumar. (2022) A mathematical model for analysing the significance of information technology resources in school education during pandemic. Journal of Interdisciplinary Mathematics 25:3, pages 741-752.
Read now
Ankit Kumar, Neeraj Sharma & Abhishek Kumar. (2022) End-to-end authentication based secure communication in vehicular ad hoc networks (VANET). Journal of Discrete Mathematical Sciences and Cryptography 25:1, pages 219-229.
Read now
Richa Rawal, Devesh Kumar Bandil & Srawan Nath. (2021) Data sparsity for twitter sentiment analysis in real-time from biased and noisy data. Journal of Discrete Mathematical Sciences and Cryptography 24:8, pages 2403-2413.
Read now
Ramesh Chand Meena, Keshav Meena, Ankit Kumar, Mukesh Gupta & Santosh Kumar. (2021) Status of address spoofing attack prevention techniques in software-defined networking (SDN). Journal of Discrete Mathematical Sciences and Cryptography 24:8, pages 2341-2351.
Read now
Ankit Kumar, Neeraj Sharma & Abhishek Kumar. (2021) Improving security and privacy in VANET network using node authentication. Journal of Discrete Mathematical Sciences and Cryptography 24:8, pages 2471-2480.
Read now
C. Praveen Kumar & K. Rajendra Prasad. (2021) Multi-ROI segmentation for effective texture features of mammogram images. Journal of Discrete Mathematical Sciences and Cryptography 24:8, pages 2461-2469.
Read now
Priyanka, Bright Keswani & Rashid Hussain. (2021) Blockchain-based cryptography model to preserve privacy for smart contracts. Journal of Discrete Mathematical Sciences and Cryptography 24:8, pages 2279-2289.
Read now
Osama R. Shahin & Rady El Rwelli. (2021) Part of speech tagging for Arabic text based radial basis function. Journal of Discrete Mathematical Sciences and Cryptography 24:8, pages 2443-2459.
Read now
Alanazi Rayan & Hamoud Alshammari. (2021) Personal phone number privacy-preserving models for public use. Journal of Discrete Mathematical Sciences and Cryptography 24:8, pages 2377-2388.
Read now
Aakriti Sharma, Bright Keswani & Anjana Sangwan. (2021) Optimization of docker container security and its performance evaluation. Journal of Discrete Mathematical Sciences and Cryptography 24:8, pages 2365-2375.
Read now
Anjana Sangwan, Bright Keswani & Aakriti Sharma. (2021) Optimization of secure communication channel over the volunteer cloud and cloud computing. Journal of Discrete Mathematical Sciences and Cryptography 24:8, pages 2257-2266.
Read now
Ruchi Kaushik, Vijander Singh & Rajani Kumari. (2021) Multi-class SVM based network intrusion detection with attribute selection using infinite feature selection technique. Journal of Discrete Mathematical Sciences and Cryptography 24:8, pages 2137-2153.
Read now
Parveen, Rishipal Singh & Sushil Kumar. (2021) IoV based intelligent vehicle tracker using FoG computing with supervised machine learning techniques. Journal of Discrete Mathematical Sciences and Cryptography 24:5, pages 1393-1413.
Read now

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.