• Nenhum resultado encontrado

[PDF] Top 20 Fuzzy-controlled Rebroadcasting in Mobile Ad Hoc Networks

Has 10000 "Fuzzy-controlled Rebroadcasting in Mobile Ad Hoc Networks" found on our website. Below are the top 20 most common "Fuzzy-controlled Rebroadcasting in Mobile Ad Hoc Networks".

Fuzzy-controlled Rebroadcasting in Mobile Ad Hoc Networks

Fuzzy-controlled Rebroadcasting in Mobile Ad Hoc Networks

... nodes in the ...and Fuzzy-controlled Rebroadcasting saves maximum rebroadcasts throughout the simulation period and the improvement is very ...nodes in the network increase. Flooding ... See full document

5

An Efficient Routing Protocol under Noisy Environment for Mobile Ad Hoc Networks using Fuzzy Logic

An Efficient Routing Protocol under Noisy Environment for Mobile Ad Hoc Networks using Fuzzy Logic

... Routing in MANET using the shortest hop count is not a sufficient condition to construct high-quality routes, because minimum hop count routing often chooses routes that have significantly less capacity than the ... See full document

6

LINK STABILITY WITH ENERGY AWARE AD HOC ON DEMAND MULTIPATH ROUTING PROTOCOL IN MOBILE AD HOC NETWORKS

LINK STABILITY WITH ENERGY AWARE AD HOC ON DEMAND MULTIPATH ROUTING PROTOCOL IN MOBILE AD HOC NETWORKS

... (2012). In this protocol have small amount of overhead occur when they are flooding the ...the rebroadcasting is main objective of this study. In proposed system, we will use global positioning ... See full document

5

EFFECT OF CLUSTERING IN DESIGNING A FUZZY BASED HYBRID INTRUSION DETECTION SYSTEM FOR MOBILE AD HOC NETWORKS

EFFECT OF CLUSTERING IN DESIGNING A FUZZY BASED HYBRID INTRUSION DETECTION SYSTEM FOR MOBILE AD HOC NETWORKS

... vulnerable Mobile Adhoc Networks (MANET). Use of Fuzzy Inference System (FIS) in the design of IDS is proven to be efficient in detecting routing attacks in ...means in ... See full document

5

Rebroadcasting for Routing Reduction based upon Neighbor coverage in Ad Hoc Networks

Rebroadcasting for Routing Reduction based upon Neighbor coverage in Ad Hoc Networks

... (MOBILE ad hoc networks) contains a set of mobile nodes which can shift without ...topology networks which are arbitrary without a predetermined ...less in front. A lot ... See full document

5

An Efficient Routing Protocol under Noisy Environment for Mobile Ad Hoc Networks using Fuzzy Logic

An Efficient Routing Protocol under Noisy Environment for Mobile Ad Hoc Networks using Fuzzy Logic

... Routing in MANET using the shortest hop count is not a sufficient condition to construct high-quality routes, because minimum hop count routing often chooses routes that have significantly less capacity than the ... See full document

6

Power-Controlled Data Transmission in Wireless Ad-Hoc Networks: Challenges and Solutions

Power-Controlled Data Transmission in Wireless Ad-Hoc Networks: Challenges and Solutions

... Wireless ad-hoc networks (WANETs) have gained increasing popularity because of the ubiquitous communication needs with satisfying ...applications in fields such as military, medical and ... See full document

7

EFFECTIVE APPROACH FOR REDUCING THE FLOODING IN ROUTING MECHANISM FOR MULTIHOP MOBILE AD HOC NETWORKS

EFFECTIVE APPROACH FOR REDUCING THE FLOODING IN ROUTING MECHANISM FOR MULTIHOP MOBILE AD HOC NETWORKS

... nodes in the first inner circle are one-hop neighbours and the nodes in the outer circle are two-hop ...redundant rebroadcasting, which means same packet is being received more than once by some ... See full document

11

Data Confidentiality in Mobile Ad hoc Networks

Data Confidentiality in Mobile Ad hoc Networks

... Mobile ad hoc networks are autonomous systems comprised of a number of mobile nodes that communicate using wireless ...self- controlled infrastructure-less ...are in the ... See full document

12

Secure Clustering in Vehicular Ad Hoc Networks

Secure Clustering in Vehicular Ad Hoc Networks

... successful in getting signed certificates, so the dynamic demilitarized zone technique was introduced in which the unknown nodes were not authorized to communicate with the certificate authority ...involved ... See full document

7

Mobile ad hoc networks tcp performance and comparison over routing protocols

Mobile ad hoc networks tcp performance and comparison over routing protocols

... of mobile computing devices, the demand for continuous network connectivity regardless of physical location has spurred interest in the use of mobile ad hoc ...A mobile ad ... See full document

9

Content delivery in vehicular ad hoc networks

Content delivery in vehicular ad hoc networks

... interested in content, and must thus receive ...scheme in which a data center selects specific roads on which to push the content, based on a dissemi- nating ...zone. In addition, some vehicles ... See full document

143

Intrusion detection in mobile ad hoc network

Intrusion detection in mobile ad hoc network

... detection in MANETs, however, is challenging for a number of reasons ...These networks change their topologies dynamically due to node mobility; lack of concentration points where traffic can be analyzed ... See full document

7

COMPARATIVE ANALYSIS OF DIFFERENT ENCRYPTION TECHNIQUES IN MOBILE AD HOC NETWORKS (MANETS)

COMPARATIVE ANALYSIS OF DIFFERENT ENCRYPTION TECHNIQUES IN MOBILE AD HOC NETWORKS (MANETS)

... done in the MATLAB programming and the output produces time of data ...Mahriyar in [12] analyzed video streaming characteristics in Ad hoc networks using several cryptography ... See full document

13

Reliable and Efficient Broadcasting in Asymmetric Mobile Ad Hoc Networks Using Minimized Forward Node List Algorithm

Reliable and Efficient Broadcasting in Asymmetric Mobile Ad Hoc Networks Using Minimized Forward Node List Algorithm

... operation in ad hoc networks. In broadcasting, a source node sends a message to all the other nodes in the ...Unlike in a wired network, a packet transmitted by a node ... See full document

6

A Comprehensive Study on Defence Against Wormhole Attack Methods in Mobile Ad hoc Networks

A Comprehensive Study on Defence Against Wormhole Attack Methods in Mobile Ad hoc Networks

... antenna, in addition to changing the routing ...and in (Capkun et al, 2003), two mechanisms are introduced to detect wormhole attacks: temporal packet leashes and geographical packet ...leashes. In ... See full document

20

An Overview on Intrusion Detection in Manet

An Overview on Intrusion Detection in Manet

... A mobile ad hoc network (MANET) is a self-configuring of mobile devices network connected without wires and hence MANET has become a very popular technology now ...the networks that are ... See full document

4

Energy-Aware Performance Metric for AODV and DSDV Routing Protocols in Mobile Ad-Hoc Networks

Energy-Aware Performance Metric for AODV and DSDV Routing Protocols in Mobile Ad-Hoc Networks

... In Mobile Ad-Hoc Networks (MANETs), mobile devices are equipped with power ...(energy). In order to utilize this energy equipped devices efficiently for transmission of ... See full document

6

Design and Implementation of AMRP for Multi hop wireless Mobile ad hoc Networks

Design and Implementation of AMRP for Multi hop wireless Mobile ad hoc Networks

... In this paper have analyzed the interruption concert of a multi-hop wireless network in which the routes between resource-objective pairs are fixed. It has developed a new queue grouping technique to handle ... See full document

5

Detection/Removal of Cooperative Black and Gray Hole Attack in Mobile Ad-Hoc Networks

Detection/Removal of Cooperative Black and Gray Hole Attack in Mobile Ad-Hoc Networks

... nodes) in ad hoc network. In this technique initially a backbone network of strong nodes (capable of tuning its antenna to short (normal) as well as to long ranges) is established over the ... See full document

6

Show all 10000 documents...