237
Views
4
CrossRef citations to date
0
Altmetric
Articles

Estimation of stadium construction schedule based on big data analysis

Pages 268-275 | Received 03 Sep 2017, Accepted 12 Oct 2017, Published online: 08 Nov 2017

References

  • Xinghua L , Pinghua C . Traffic prediction algorithm in buffer based on recurrence quantification union entropy feature reconstruction[J]. Comput Sci. 2015;42(4):68–71.
  • Hartenstein H , Laberteaux, KP . A tutorial survey on vehicular ad hoc networks[J]. IEEE Commun Mag. 2008;46(6):164–171.10.1109/MCOM.2008.4539481
  • Marfia G , Roccetti M , Amoroso A , et al. Safe driving in LA: report from the greatest intervehicular accident detection test ever[J]. IEEE Trans Veh Technol. 2013;62(2):522–535.10.1109/TVT.2012.2226484
  • Sahu PK , Wu EHK , Sahoo J , et al . BAHG: back-bone-assisted hop greedy routing for VANET’s city environments[J]. IEEE Trans Intell Trans Syst. 2013;14(1):199–213.
  • Barrachina J , Garrido P , Fogue M , et al . VEACON: a vehicular accident ontology designed to improve safety on the roads[J]. J Netw Comput Appl. 2012;35(6):1891–1900.10.1016/j.jnca.2012.07.013
  • Ma X , Zhang J , Yin X , et al . Design and analysis of a robust broadcast scheme for VANET safety-related services[J]. IEEE Trans Veh Technol. 2012;61(1):46–61.10.1109/TVT.2011.2177675
  • Khabazian M , Aissa S , Mustafa M-A . Performance modeling of message dissemination in vehicular ad hoc networks with priority [J]. IEEE J Select Area Commun. 2011;29(1):61–71.10.1109/JSAC.2011.110107
  • Zhang W , Chen Y , Yang Y , et al . Multi-Hop connectivity probability in infrastructure-based vehicular networks[J]. IEEE J Select Area Commun. 2012;30(4):740–747.10.1109/JSAC.2012.120508
  • Daeinabi A , Pour Rahbar AG , Khademzadeh A . VWCA: an efficient clustering algorithm in vehicular ad hoc networks[J]. J Network Comput Appl. 2011;34(1):207–222.10.1016/j.jnca.2010.07.016
  • Quek TQS , Shin H , Win MZ . Robust wireless relay networks: slow power allocation with guaranteed QoS[J]. IEEE J Select Topic Signal Process. 2008;1(4):700–713.10.1109/JSTSP.2007.910271
  • Shibo HE , Chen Jiming , Yau DKY , et al . Cross-layer optimization of correlated data gathering in wireless sensor networks[J]. IEEE Trans Mobile Comput. 2012;11(11):1678–1691.
  • Alfaro VM , Vilanova R . Robust tuning of 2DoF five-parameter PID controllers for inverse response controlled processes[J]. J Process Cont. 2013;23(4):453–462.10.1016/j.jprocont.2013.01.005
  • Deng C , Weisi L . Performance analysis, parameter selection and extensions to H.264/AVC FRExt for high resolution video coding. J Visual Commun Image Represent. 2011;22(8):749–759.10.1016/j.jvcir.2011.01.004
  • Xia K , Wu Y , Ren X , et al . Research in clustering algorithm for diseases analysis[J]. J Netw. 2013;8(7):1632–1639.
  • Xia K , Cai J , Wu Y . Research on improved network data fault-tolerant transmission optimization algorithm[J]. J Conver Inf Technol. 2012;7(19):208–213.
  • Asharov G , Canetti R , Hazay C . Towardsa game theoretic view of secure computation [M]. In: Paterson KG , editor. Advances in cryptology – EUROCRYPT 2011 . Berlin: Springer Berlin Heidelberg. 2011. p. 426–445.
  • Singh K , Pandurangan C , Banerjee A . Lattice based forward- secure identity based encryption scheme with shorter ciphertext[J]. J Inter Serv Inf Secur. 2013; 3(1/2):5–19.
  • Liu Y . Mining frequent patterns from univariate uncertain data. Data Knowl Eng. 2012;71(1):47–68.10.1016/j.datak.2011.07.009
  • Cristani M , Raghavendra R , Bue DA . Human behavior analysis in video surveillance: a social signal processing perspective[J]. Neuro comput. 2013;100(1):86–97.
  • Lakshmi DC , Revathí R . Video surveillance systems-a survey[J]. Int J Comput Sci Iss. 2011;8(4):635–642.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.