Results 51 to 60 of about 223,216 (205)
The Novel Mobility Models Based on Spiral Line for Aerial Backbone Networks
With the convenience and flexibility, the UAV has received more attention in the search and rescue. Due to inherent mobility of UAV, the aerial backbone network maybe suffers some problems of dynamics of connectivity, such as uncertain delay jitter or ...
Dawei He, Wei Sun, Lei Shi
doaj +1 more source
Nowadays, ZigBee communication protocol is one of the dominating standards for wireless sensor & ad-hoc networks and Internet of Things (IoT) networks. Even though the ZigBee standard was formed with security in mind and lower consumption of power, still
Jegan Govindasamy+1 more
doaj
A Self-Adaptive and Link-Aware Beaconless Forwarding Protocol for VANETs
With the development of networks, Vehicular Ad-hoc Networks (VANETs) which act as the emerging application enhance the potential power of networks on the traffic safety and the entertainment.
Changle Li+3 more
doaj +1 more source
Multihop Routing in Ad Hoc Networks [PDF]
This paper presents a dual method of closed-form analysis and lightweight simulation that enables an evaluation of the performance of mobile ad hoc networks that is more realistic, efficient, and accurate than those found in existing publications. Some features accommodated by the new analysis are shadowing, exclusion and guard zones, and distance ...
arxiv +1 more source
Jaringan Ad Hoc adalah jaringan wireless dengan beberapa Mobile node yang tidak memiliki router tetap. Setiap node ini dapat berfungsi sebagai router yang dapat mencari dan menangani jalur ke node yang lain dalam suatu jaringan. Setiap node pada jaringan
B. Kusuma+2 more
semanticscholar +1 more source
Emergency Informing System Based on Ad hoc Networks
One current trend for providing delay-tolerant communications under highly-dynamic routing conditions is to form ad hoc OppNets with the exploitation of smart mobile devices carried by people.
Tatyana Prikhodko+2 more
doaj +1 more source
New Detection Paradigms to Improve Wireless Sensor Network Performance under Jamming Attacks
In this work, two new self-tuning collaborative-based mechanisms for jamming detection are proposed. These techniques are named (i) Connected Mechanism and (ii) Extended Mechanism.
Carolina Del-Valle-Soto+5 more
doaj +1 more source
Routing Load of Route Calculation and Route Maintenance in Wireless Proactive Routing Protocols [PDF]
This paper presents mathematical framework and study of proactive routing Protocols. The performance analysis of three major proactive routing protocols: Destination-Sequenced Distance Vector (DSDV), Fish-eye State Routing (FSR) and Optimized Link State Routing (OLSR) are under consideration in this work. Taking these routing protocols into account, we
arxiv +1 more source
Improved QoS and avoidance of black hole attacks in MANET using trust detection framework
In recent times, secured routing is a major research in MANETs. The behaviour of malicious nodes in this network increases the risk of threats and induces abnormal operations in MANETs.
J. Manoranjini+2 more
doaj +1 more source
Ensuring Cache Freshness in On-demand Routing Protocols for Mobile Ad Hoc Network: A Cross-layer Framework [PDF]
One of the big challenges in ad hoc network design is packet routing. Studies have shown that on-demand routing protocols perform better than table-driven routing protocols. In order to avoid route discovery for each packet, on-demand routing protocols cache routes previously learnt. A node in ad hoc network learns routing information by overhearing or
arxiv +1 more source