Results 71 to 80 of about 75,178 (256)

Distributed Call Admission Control for DESYNC-TDMA in Mobile Ad Hoc Networks

open access: yesEAI Endorsed Transactions on Mobile Communications and Applications, 2016
DESYNC-TDMA is a self-organizing algorithm based on bio-inspired features used to implement a collision-free MAC. It does not require a global clock or other infrastructures, and it automatically adjusts to the number of participating nodes to ensure ...
Bongsoo Roh   +5 more
doaj   +1 more source

Improving The Stability of GRP Routing Protocol [PDF]

open access: yesEngineering and Technology Journal, 2016
More recent works aim at enhancing MANET performance, because of the multiple problems caused by the wireless transmission constraints. The problem that faces the routing protocol is to obtain the stable path with nodes movement. A route between a source
Turkan A. Khaleel   +2 more
doaj   +1 more source

Performance Analysis of Advanced Quality of Service‐Based Robust Multipath Routing (AQRMR) Protocol for Mobile Ad Hoc Networks (MANETs)

open access: yesDigital Twins and Applications, Volume 2, Issue 1, January/December 2025.
This paper contains the study about the advanced quality of service‐based robust multipath routing (AQRMR) protocol and its performance improvement over the previous protocol, that is, quality of service‐based robust multipath routing (QRMR) protocol.
Parveen Kumar
wiley   +1 more source

Routing Metric based on Slot Length of AODV on Multihop DESYNC-TDMA

open access: yesEAI Endorsed Transactions on Mobile Communications and Applications, 2016
DESYNC-TDMA is a representative bio-inspired MAC protocol which assigns slots of each node evenly in decentralized manner. However, it could suffer from bottleneck node on the delivery path because the slot is evenly assigned according to the number of ...
Kwangsoo Kim   +4 more
doaj   +1 more source

A Review of the Energy Efficient and Secure Multicast Routing Protocols for Mobile Ad hoc Networks

open access: yes, 2010
This paper presents a thorough survey of recent work addressing energy efficient multicast routing protocols and secure multicast routing protocols in Mobile Ad hoc Networks (MANETs).
Meghanathan, Natarajan   +1 more
core   +2 more sources

A Systematic Review of U‐Net Optimizations: Advancing Tumour Segmentation in Medical Imaging

open access: yesIET Image Processing, Volume 19, Issue 1, January/December 2025.
Since its introduction in 2015, U‐Net has become a foundational model for medical image segmentation, yet challenges remain in tumour segmentation due to heterogeneity and boundary ambiguity. This PRISMA‐based systematic review examines recent strategies aimed at enhancing U‐Net's performance for tumour segmentation in CT and MRI, focusing on backbone,
Omar Abueed   +2 more
wiley   +1 more source

Design and Analysis of a Bandwidth Aware Adaptive Multipath N-Channel Routing Protocol for 5G Internet of Things (IoT)

open access: yesEmerging Science Journal
Large numbers of mobile wireless nodes that can move randomly and join or leave the network at any moment make up mobile ad-hoc networks. A significant number of messages are delivered during information exchange in populated regions because of the ...
Satyanand Singh   +2 more
doaj   +1 more source

Efficient Data Transfer by Mobility Adjustment Algorithm for Clustered Mobile Ad-Hoc Networks

open access: yesCybernetics and Information Technologies, 2014
Mobile Ad-hoc NETwork (MANET) is a prevalent deployable network for easy plug-in and it is widely applied for many real time scenarios. Clustering is a well known solution for efficient communication among nodes with least control overheads.
Alagiri I.   +2 more
doaj   +1 more source

A two‐step authentication framework for Mobile ad hoc networks [PDF]

open access: yes, 2007
The lack of fixed infrastructure in ad hoc networks causes nodes to rely more heavily on peer nodes for communication. Nevertheless, establishing trust in such a distributed environment is very difficult, since it is not straightforward for a node to ...
Douligeris, C.   +2 more
core  

Enhancing IoT Security via Federated Learning: A Comprehensive Approach to Intrusion Detection

open access: yesIET Information Security, Volume 2025, Issue 1, 2025.
The rapid proliferation of Internet of Things (IoT) devices has revolutionized various industries by enabling smart grids, smart cities, and other applications that rely on seamless connectivity and real‐time data processing. However, this growth has also introduced significant security challenges due to the scale, heterogeneity, and resource ...
Ye Bai   +6 more
wiley   +1 more source

Home - About - Disclaimer - Privacy