Results 11 to 20 of about 236,756 (293)
Hierarchical Design Based Intrusion Detection System For Wireless Ad hoc Network [PDF]
In recent years, wireless ad hoc sensor network becomes popular both in civil and military jobs. However, security is one of the significant challenges for sensor network because of their deployment in open and unprotected environment.
M. Mamun, A. S. Kabir
semanticscholar +1 more source
A survey of performance enhancement of transmission control protocol (TCP) in wireless ad hoc networks [PDF]
This Article is provided by the Brunel Open Access Publishing Fund - Copyright @ 2011 Springer OpenTransmission control protocol (TCP), which provides reliable end-to-end data delivery, performs well in traditional wired network environments, while in ...
A Gupta+61 more
core +1 more source
Abstract This research aims to study the intelligent wireless sensor to improve the water permeability of permeable asphalt concrete pavement. The water permeability of pavement is extremely important for the traffic environment. This study first briefly introduces the background and significance analysis, and then exemplifies the deployment algorithm ...
Xingmei Zhang, Cong Xu, Qi Lei
wiley +1 more source
Adapting BitTorrent to Wireless Ad Hoc Networks [PDF]
BitTorrent is one of the Internet''s most efficient content distribution protocols. It is known to perform very well over the wired Internet where end-to-end performance is almost guaranteed. However, in wireless ad hoc networks, many constraints appear as the scarcity of resources and their shared nature, which make running BitTorrent in such an ...
Sbai, Mohamed Karim+4 more
openaire +3 more sources
Localized Support for Injection Point Election in Hybrid Networks [PDF]
Ad-hoc networks, a promising trend in wireless technology, fail to work properly in a global setting. In most cases, self-organization and cost-free local communication cannot compensate the need for being connected, gathering urgent information just-in ...
Brust, Matthias R., Rothkugel, Steffen
core +2 more sources
Distributed wireless network resource optimisation method based on mobile edge computing
This paper mainly compares the network ranking leader, consumption amount and network signal reception of the three algorithms. The study found that in terms of network sort captain, there are significant differences between the CPLEX algorithm, the CCST algorithm, and edge computing methods. The CCST algorithm and edge computing have little difference
Jiongting Jiang+4 more
wiley +1 more source
Integrating mobile ad hoc network into mobile IPv6 network [PDF]
In the future more and more devices connected to the Internet will be wireless. Wireless networks can be classified into two types of networks: network with infrastructure (i.e.
Abdol Latiff, Liza+2 more
core +1 more source
We utilise a metaheuristic optimisation method, inspired by nature, called the Lévy‐flight firefly algorithm (LFA), to tackle the power regulation and user grouping in the NOMA systems. Abstract The non‐orthogonal multiple access strategies have shown promise to boost fifth generation and sixth generation wireless networks' spectral efficiency and ...
Zaid Albataineh+4 more
wiley +1 more source
An Overview of Mobile Ad Hoc Networks for the Existing Protocols and Applications
Mobile Ad Hoc Network (MANET) is a collection of two or more devices or nodes or terminals with wireless communications and networking capability that communicate with each other without the aid of any centralized administrator also the wireless nodes ...
Al-Omari, Saleh Ali K., Sumari, Putra
core +2 more sources
Traffic agents for improving QoS in mixed infrastructure and ad hoc modes wireless LAN [PDF]
As an important complement to infrastructured wireless networks, mobile ad hoc networks (MANET) are more flexible in providing wireless access services, but more difficult in meeting different quality of service (QoS) requirements for mobile customers ...
A Hills+17 more
core +2 more sources