• No results found

[PDF] Top 20 An Agent Based Approach for Sinkhole Preventive Route formation in Mobile Network

Has 10000 "An Agent Based Approach for Sinkhole Preventive Route formation in Mobile Network" found on our website. Below are the top 20 most common "An Agent Based Approach for Sinkhole Preventive Route formation in Mobile Network".

An Agent Based Approach for Sinkhole Preventive Route formation in Mobile Network

An Agent Based Approach for Sinkhole Preventive Route formation in Mobile Network

... an agent based analysis method is defined to generate the safe communication over the mobile network in existence of sinkhole ...parameter based evaluation is provided to ... See full document

6

Clustering Approach in Route Selection Using Mobile Agent in Mobile Ad-Hoc Network

Clustering Approach in Route Selection Using Mobile Agent in Mobile Ad-Hoc Network

... data network in order to maximize its efficiency and ...of network management architectures: centralized, distributed, and ...clustering approach facilitates this hierarchical management architecture ... See full document

6

A MOBILE AGENT-BASED EVENT DRIVEN ROUTE DISCOVERY PROTOCOL IN WIRELESS SENSOR NETWORK: AERDP

A MOBILE AGENT-BASED EVENT DRIVEN ROUTE DISCOVERY PROTOCOL IN WIRELESS SENSOR NETWORK: AERDP

... by mobile agents. The protocol fully exploits the clustering approach and the potential of ...Further, mobile agents are particularly susceptible to message losses, therefore an extra caution is ... See full document

8

Improving quality of service in wireless 
		sensor networks using neighbor constraint transmission centric 
		distributed sink hole detection and network simulator II

Improving quality of service in wireless sensor networks using neighbor constraint transmission centric distributed sink hole detection and network simulator II

... A sinkhole attack detection scheme in Mintroute wireless Sensor Networks [11], where the vulnerabilities of Mintroute protocol to sinkhole attacks are discussed and the offered manual rules which can be ... See full document

5

An Improved Approach for Intrusion Detection ...

An Improved Approach for Intrusion Detection ...

... A victim solaris machine placed inside the simulation network gives the Basic Security module (BSM) audit data. This data contains information on system call produced which is running on the solaris machine. We ... See full document

9

Route selection of mobile agent for query retrieval using GA

Route selection of mobile agent for query retrieval using GA

... of mobile agents for network ...the mobile agents has been proposed in ...for network routing by using a rule-based method has been proposed in ...and network traffic used by ... See full document

10

Networks and farsighted stability

Networks and farsighted stability

... directed network, an agent or a coalition of agents can change the network to another network by simply adding, subtracting, or replacing arcs from the existing network in accordance ... See full document

26

Adaptive Network Based Fuzzy Inference System Model for Minimizing Handover Failure in Mobile Networks

Adaptive Network Based Fuzzy Inference System Model for Minimizing Handover Failure in Mobile Networks

... wireless mobile technology is referred to as “1G” and it was the era of analog cell ...advanced mobile phone systems (AMPS) used in U.S.A, Nordic Mobile Telephone (NMT),Total Access Communications ... See full document

12

Self-Protected Mobile Agent Paradigm for DDoS Threats Using Block Chain Technology

Self-Protected Mobile Agent Paradigm for DDoS Threats Using Block Chain Technology

... The Agent is created at creation time at its agent owner ...of agent creation, after that the agent migrates from its agent owner node through its route (path) between various ... See full document

6

DCmod-5.pdf

DCmod-5.pdf

... The foreign-agent is a router attached to the foreign network. The foreign-agent receives and delivers packets sent by the home-agent to the mobile-host. The mobile-host can also act as [r] ... See full document

57

Modelling and Self-organizing in Mobile Wireless Sensor Networks: Application to Fire Detection

Modelling and Self-organizing in Mobile Wireless Sensor Networks: Application to Fire Detection

... sensor network (WSN) is a complex ...elling approach of the mobile WSN based on Holonic Multi- Agent paradigm (Holonic Multi-Agent Systems ...The approach of modelling ... See full document

7

Mechanisms to Locate Mobile Agents in Multi Agents Environment

Mechanisms to Locate Mobile Agents in Multi Agents Environment

... To locate a mobile agent, a global search at all network sites must be initiated; however, when the mobile agent moves, no cost is associated with updating the location database.. Betwee[r] ... See full document

5

Innovation creation and diffusion in a social network: an agent based approach

Innovation creation and diffusion in a social network: an agent based approach

... economist, based on a perpetual dynam- ics of innovation - imitation - innovation, is cause of economic growth and mostly of the cyclical instability of the economic ... See full document

30

An Efficient Approach for Mobile Agent Security

An Efficient Approach for Mobile Agent Security

... an agent through the reliable recording of the agent's behavior during its execution on each agent ...the agent while traversing in the network, and to submit a cryptographic hash of the ... See full document

5

An Empirical Approach of Optimizing AODV
          Routing Protocol for Route Discovery in Mobile
          Ad-Hoc Network

An Empirical Approach of Optimizing AODV Routing Protocol for Route Discovery in Mobile Ad-Hoc Network

... RO AODV (Route Optimized Ad Hoc On demand Distance Vector Routing Protocol) [7] limits the route request broadcasting activity based on Route optimization. It optimizes AODV to perform ... See full document

6

Toward Development of Mobile Agent Based Architecture for Wireless Sensor Network

Toward Development of Mobile Agent Based Architecture for Wireless Sensor Network

... Wireless Sensor Networks (WSNs) having small sensing devices which have capability of sensing, processing, and storage. These sensing devices are connected via wireless links called sensor nodes [1]. Sensor nodes have ... See full document

6

Mobile Agent Embedding in Cluster based Wireless Sensor Network Environment

Mobile Agent Embedding in Cluster based Wireless Sensor Network Environment

... of network like nodes having limited battery dead ...of network, energy consumption, communication cost, bandwidth, MA routing strategy, load balancing ...the network, to reduce the communication ... See full document

7

Gateway Load Balancing in Integrated Internet-          MANET to Improve Network Performance

Gateway Load Balancing in Integrated Internet- MANET to Improve Network Performance

... this approach a mobile node that wants to find a new route or update an existing route to the gateway, initiates the gateway ...source mobile node wants to communicate with an Internet ... See full document

5

Mobile Agent for Monitoring and Evaluation of
Security Applications in a Network Environment

Mobile Agent for Monitoring and Evaluation of Security Applications in a Network Environment

... The Agent Monitor moves from one workstation to another while carrying along intermediate ...the mobile agent after successful visits to a set of target workstations are transferred to the server, ... See full document

9

Wireless Network Security: The Mobile Agent Approach

Wireless Network Security: The Mobile Agent Approach

... the network port on the authenticator opens and the supplicant is discon- nected from the ...have network access otherwise the network is disconnected Figures 7 and 8 shows the re-authentication ... See full document

8

Show all 10000 documents...