• Nenhum resultado encontrado

[PDF] Top 20 Realtime multiprocessor for mobile ad hoc networks

Has 4896 "Realtime multiprocessor for mobile ad hoc networks" found on our website. Below are the top 20 most common "Realtime multiprocessor for mobile ad hoc networks".

Realtime multiprocessor for mobile ad hoc networks

Realtime multiprocessor for mobile ad hoc networks

... RAPTOR2000 rapid prototyping system, the test environ- ment can be reused as described in section 2.4.1. The hier- archical design of the ASIC shortens development time, be- cause parts as the processing elements and the ... See full document

5

An Overview on Intrusion Detection in Manet

An Overview on Intrusion Detection in Manet

... A mobile ad hoc network (MANET) is a self-configuring of mobile devices network connected without wires and hence MANET has become a very popular technology now ...the networks that are ... See full document

4

Design and Implementation of AMRP for Multi hop wireless Mobile ad hoc Networks

Design and Implementation of AMRP for Multi hop wireless Mobile ad hoc Networks

... wireless networks have been devoted to system stability while maximizing metrics like throughput or ...wireless networks, however, has largely been an open ...line networks, primarily because of the ... See full document

5

Reliable and Efficient Broadcasting in Asymmetric Mobile Ad Hoc Networks Using Minimized Forward Node List Algorithm

Reliable and Efficient Broadcasting in Asymmetric Mobile Ad Hoc Networks Using Minimized Forward Node List Algorithm

... Wireless ad hoc networks, also called Mobile Ad Hoc Networks (MANETs) are collections of autonomous mobile nodes or terminals that communicate with each other by ... See full document

6

COMPARATIVE ANALYSIS OF DIFFERENT ENCRYPTION TECHNIQUES IN MOBILE AD HOC NETWORKS (MANETS)

COMPARATIVE ANALYSIS OF DIFFERENT ENCRYPTION TECHNIQUES IN MOBILE AD HOC NETWORKS (MANETS)

... Security is provided through security services such as confidentiality. The goal of confidentiality is to control or restrict access to sensitive information to the only authorized individuals. MANET uses an open medium, ... See full document

13

Intrusion detection in mobile ad hoc network

Intrusion detection in mobile ad hoc network

... These networks change their topologies dynamically due to node mobility; lack of concentration points where traffic can be analyzed for intrusions; utilize self configuring multi-party infrastructure protocols ... See full document

7

An Efficient Quality of Service Based Routing Protocol for Mobile Ad Hoc Networks

An Efficient Quality of Service Based Routing Protocol for Mobile Ad Hoc Networks

... mobility networks, a node which is on the route for transmitting traffic flow has higher possibility to move out of the transmission range of the upstream or the downstream ... See full document

7

Identification of Closest and Phantom Nodes in Mobile Ad Hoc  Networks

Identification of Closest and Phantom Nodes in Mobile Ad Hoc Networks

... spontaneous networks, data gathering in sensor networks, movement coordination among autonomous robotic nodes, location specific services for hand held devices and danger warning or traffic monitoring in ... See full document

10

DYNAMIC K-MEANS ALGORITHM FOR OPTIMIZED ROUTING IN MOBILE AD HOC NETWORKS

DYNAMIC K-MEANS ALGORITHM FOR OPTIMIZED ROUTING IN MOBILE AD HOC NETWORKS

... of mobile nodes travels with similar speed and direction, as in highway ...a mobile node’s speed regarding each of its neighbors, the totality positional speed of mobile nodes is ...this ... See full document

14

Mobile ad hoc networks tcp performance and comparison over routing protocols

Mobile ad hoc networks tcp performance and comparison over routing protocols

... of mobile computing devices, the demand for continuous network connectivity regardless of physical location has spurred interest in the use of mobile ad hoc ...A mobile ad ... See full document

9

A Cross-Layer Delay-Aware Node Disjoint Multipath Routing Algorithm for Mobile Ad Hoc Networks

A Cross-Layer Delay-Aware Node Disjoint Multipath Routing Algorithm for Mobile Ad Hoc Networks

... multihop networks has demonstrated that cross- layer design which can significantly improve the system performance ...is Ad hoc On demand Multipath Distance Vector (AOMDV) ...of Ad Hoc ... See full document

14

Energy-Aware Performance Metric for AODV and DSDV Routing Protocols in Mobile Ad-Hoc Networks

Energy-Aware Performance Metric for AODV and DSDV Routing Protocols in Mobile Ad-Hoc Networks

... DSDV is a proactive routing protocol based on the classical distributed Bellman-Ford routing algorithm [2]. In DSDV[4] messages are shared between the mobile nodes (i.e., nodes are in the same transmission ... See full document

6

Towards a network management solution for vehicular delay-tolerant networks

Towards a network management solution for vehicular delay-tolerant networks

... Vehicular Ad-hoc Networks (VANETs) [2], Delay-Tolerant Networks (DTNs) applied to vehicular communications [3], and even Vehicular Delay-Tolerant Networks (VDTNs) ...as mobile ... See full document

64

Secure Clustering in Vehicular Ad Hoc Networks

Secure Clustering in Vehicular Ad Hoc Networks

... of Mobile Nodes and relatively fewer, but more powerful, fixed ...an Ad-hoc Network, it is a self- organizing collection of Mobile Nodes that form an infrastructure less wireless network on a ... See full document

7

Content delivery in vehicular ad hoc networks

Content delivery in vehicular ad hoc networks

... a mobile social scenario in which nodes forward their content to their neighbors using opportunistic ...opportunistic ad-hoc communications to offload the network core infras- tructure when ... See full document

143

Manet Load Balancing Parallel Routing Protocol

Manet Load Balancing Parallel Routing Protocol

... This paper has proposed a load balancing parallel routing protocol (LBPRP) for mobile ad-hoc networks. LBPRP allows routing multiple packets in parallel from a source node to a destination ... See full document

7

Proposed protocol for secured multi path routing in ad hoc networks

Proposed protocol for secured multi path routing in ad hoc networks

... common mobile network usually appears in forms, such as the cellular network or the wireless local area ...cellular networks use fix infrastructures, which are vulnerable to some special environments or the ... See full document

6

A Combined Solution for Routing and Medium Access Control Layer Attacks in Mobile Ad Hoc Networks

A Combined Solution for Routing and Medium Access Control Layer Attacks in Mobile Ad Hoc Networks

... Abstract: Problem statement: In Mobile Ad hoc Network (MANET), both the routing layer and the Medium Access Control (MAC) layer are vulnerable to several attacks. There are very few techniques to ... See full document

8

A MODEL FOR CONGESTION CONTROL OF TRANSMISSION CONTROL PROTOCOL IN MOBILE WIRELESS AD HOC NETWORKS

A MODEL FOR CONGESTION CONTROL OF TRANSMISSION CONTROL PROTOCOL IN MOBILE WIRELESS AD HOC NETWORKS

... in ad hoc networks use wireless channel as a shared medium to send and receive ...in ad hoc networks while buffer overflow-induced packet loss is ... See full document

8

A Comprehensive Study on Defence Against Wormhole Attack Methods in Mobile Ad hoc Networks

A Comprehensive Study on Defence Against Wormhole Attack Methods in Mobile Ad hoc Networks

... Due to inherent specifications of MANETs, they face many security issues compared to present ordinary networks (Hoang et al, 2006). An attacker can contravention them by passively or actively attacking on MANETs ... See full document

20

Show all 4896 documents...