Vartika Agarwal

Secured scheduling techniques of network resource management in vehicular communication networks

  • Authors Details :  
  • Vartika Agarwal,  
  • Sachin Sharma,  
  • Gagan Bansal

Journal title : 2021 5th International Conference on Intelligent Computing and Control Systems (ICICCS)

Publisher : IEEE

152 Views Conference

Scheduling is the need of every project. Without scheduling, projects don’t fulfill time constraints, go over spending plan. It is a process utilized by teams to organize and structure their resources so the tasks they need to complete are scheduled based on availability and capability. This process is more beneficial if it is required to allocate and assign task to the resources without allocating their schedules. This paper reviews different types of network scheduling techniques, which are used to schedule a task. These techniques are very effective and help us to preplan the whole scheduling process

Article DOI & Crossmark Data

DOI : https://doi.org/10.1109/ICICCS51141.2021.9432278

Article Subject Details


Article Keywords Details



Article File

Full Text PDF


Article References




More Article by Vartika agarwal

Emvd: efficient multitype vehicle detection algorithm using deep learning approach in vehicular communication network for radio resource management

Radio resource allocation in vcn is a challenging role in an intelligent transportation system due to traffic congestion. lot of time is wasted because of traffic congestion. due t...

Route forecasting-based authentication scheme using a* algorithm in vehicular communication network

Researchers have developed several authentication techniques for route predictions based on user requirements. these techniques estimate the shortest path and available resources i...

P2pcpm: point to point critical path monitoring based denial of service attack detection for vehicular communication network resource management

Various types of security attacks are normal in vehicular communication networks. the current study uses a support vector machine to implement a point to point critical path monito...

Network resource allocation security techniques and challenges for vehicular communication network management

Internet of things describes the network of physical objects such as sensors, receivers, transmitters and other technologies which are used in vcn. in vehicular communication netwo...