Results 1 to 10 of about 224,739 (312)

A Survey on the Application of Evolutionary Algorithms for Mobile Multihop Ad Hoc Network Optimization Problems [PDF]

open access: yesInternational Journal of Distributed Sensor Networks, 2016
Evolutionary algorithms are metaheuristic algorithms that provide quasioptimal solutions in a reasonable time. They have been applied to many optimization problems in a high number of scientific areas. In this survey paper, we focus on the application of
D. G. Reina   +5 more
doaj   +3 more sources

Mobile Ad-Hoc Networks [PDF]

open access: yes, 2004
Ad-hoc networks are a key in the evolution of wireless networks. Ad-hoc networks are typically composed of equal nodes, which communicate over wireless links without any central control.
Giordano, Silvia
core   +2 more sources

Receiver-Based Ad Hoc On Demand Multipath Routing Protocol for Mobile Ad Hoc Networks. [PDF]

open access: yesPLoS ONE, 2016
Decreasing the route rediscovery time process in reactive routing protocols is challenging in mobile ad hoc networks. Links between nodes are continuously established and broken because of the characteristics of the network.
Abdulaziz Al-Nahari   +1 more
doaj   +2 more sources

Wireless Mobile Ad Hoc Networks

open access: yesEURASIP Journal on Wireless Communications and Networking, 2007
Wireless mobile ad hoc networks (MANETs), due to their dynamic nature and due to the unreliability of the wireless medium, pose unique challenges that are significantly more complex than those that arise in traditional wired or even cellular wireless networks.
Hamid R. Sadjadpour   +3 more
doaj   +3 more sources

Auto-Configuration Protocols in Mobile Ad Hoc Networks [PDF]

open access: yesSensors, 2011
The TCP/IP protocol allows the different nodes in a network to communicate by associating a different IP address to each node. In wired or wireless networks with infrastructure, we have a server or node acting as such which correctly assigns IP addresses,
Julián García Matesanz   +3 more
doaj   +2 more sources

Masquerading Attacks Detection in Mobile Ad Hoc Networks

open access: goldIEEE Access, 2018
Due to the lack of centralized identity management and the broadcast nature, wireless ad hoc networks are always a palatable target for masquerading attacks. The attackers can spoof identities of privileged legitimate users for various malicious reasons,
Sohail Abbas   +5 more
doaj   +2 more sources

Mobile ad-hoc networks: MANET [PDF]

open access: yesTrendovi u Poslovanju, 2018
Currently in 2018, 7.6 billion people are in the world, and 8.6 billion mobile devices. As mobile phones have completely changed the meaning of the term to be available, a similar change in the wait and laptops users is, so it is only a matter of time ...
Mikarić Bratislav   +2 more
doaj   +2 more sources

Classification and comparison of ad hoc networks: A review

open access: yesEgyptian Informatics Journal, 2023
The study of ad hoc networks and their different varieties, including wireless sensor networks, wireless mesh networks, and mobile ad hoc networks, is discussed in this paper. Wireless devices link to one another directly in an ad hoc network without the
Reeya Agrawal   +7 more
doaj   +1 more source

Fault-Tolerant Ad Hoc On-Demand Routing Protocol for Mobile Ad Hoc Networks

open access: yesIEEE Access, 2022
Mobile ad hoc networks (MANETs) are particularly suited for scenarios that demand rapid deployment of a communication system without any existing network resources.
Duc N. M. Hoang   +2 more
doaj   +1 more source

Recent Developments on Mobile Ad-Hoc Networks and Vehicular Ad-Hoc Networks [PDF]

open access: yesElectronics, 2021
Mobile ad-hoc networks (MANETs) have a decentralized nature that makes them suitable for a variety of applications [...]
Dimitris Kanellopoulos, Francesca Cuomo
openaire   +2 more sources

Home - About - Disclaimer - Privacy