• No results found

[PDF] Top 20 An Efficient Method to Avoid Hidden Node Problem in Ad Hoc Network

Has 10000 "An Efficient Method to Avoid Hidden Node Problem in Ad Hoc Network" found on our website. Below are the top 20 most common "An Efficient Method to Avoid Hidden Node Problem in Ad Hoc Network".

An Efficient Method to Avoid Hidden Node Problem in Ad Hoc Network

An Efficient Method to Avoid Hidden Node Problem in Ad Hoc Network

... An ad hoc network consists of various mobile nodes which are not physicals connected to each ...other. Ad-hoc network is temporary based network which does not rely on the ... See full document

5

Efficient Energy Based Path Selection in Sensor Ad-Hoc Cognitive Radio Network
                 

Efficient Energy Based Path Selection in Sensor Ad-Hoc Cognitive Radio Network  

... sensor ad hoc cognitive radio network, secondary users access the channels temporarily bases those channel unused by primary users, and the existence of a communication link between two secondary ... See full document

6

Node Credit Based Efficient Flooding (NCBEF) Method for Mobile Ad-hoc Networks

Node Credit Based Efficient Flooding (NCBEF) Method for Mobile Ad-hoc Networks

... non-anticipating network topology, frequent link failure occurred that leads route break, partitions and high routing overhead ...Receiving node of route request further forward to all its neighbours’ nodes ... See full document

13

Optimized Fuzzy based Malicious Node Detection on Routing and Certificate Authority based Secure Communication in Wireless Ad HOC Network

Optimized Fuzzy based Malicious Node Detection on Routing and Certificate Authority based Secure Communication in Wireless Ad HOC Network

... present network scenario to avoid intruders and ...provide efficient support to MANET to establish the communication in trust-worthy manner and provides best support to its consumers to work with ... See full document

7

Performance Evaluation of Routing Algorithms for Ad Hoc Wireless Sensor Network and Enhancing the Parameters for Good Throughput

Performance Evaluation of Routing Algorithms for Ad Hoc Wireless Sensor Network and Enhancing the Parameters for Good Throughput

... Sensor Network are emerging as a new tool for important application in diverse fields like military surveillance, habitat monitoring, weather, home electrical appliances and ...sensor network nodes are ... See full document

6

A Research Study on Efficient Management of Memory in Mobile Ad Hoc Network in Trust Management System Environment

A Research Study on Efficient Management of Memory in Mobile Ad Hoc Network in Trust Management System Environment

... overflow Problem has to be addressed effectively in order to make the system to function in a most efficient ...overflow problem with a technique called “Load ...less node should and will ... See full document

8

An Improved Content Centric Extended Kalman Filter Based Crowd Sensing In Vanet Using Vehicular Cloud Computing

An Improved Content Centric Extended Kalman Filter Based Crowd Sensing In Vanet Using Vehicular Cloud Computing

... The problem of crowd sensing in Vehicular Ad-hoc Network is a most widely researched problem in recent ...the problem of congestion Mobile crowd sensing refers to a broad range ... See full document

8

An Innovative technique for Efficient Usage of Intrusion Detection System in Mobile Ad Hoc Networks

An Innovative technique for Efficient Usage of Intrusion Detection System in Mobile Ad Hoc Networks

... an ad hoc ...in ad-hoc networks and multi-route existence between any pair of nodes in the network to prevent routing against denial-of-service ... See full document

10

DETECTION AND PREVENTION MECHANISM FOR GREY AND BLACK HOLE ATTACK IN A MOBILE AD-HOC NETWORK

DETECTION AND PREVENTION MECHANISM FOR GREY AND BLACK HOLE ATTACK IN A MOBILE AD-HOC NETWORK

... in ad-hoc network remain to be investigated. New Method should be introduced for detecting & preventing from the gray hole attack or behavior of malicious node because of the ... See full document

7

Analysis of hidden terminal’s effect on the performance of vehicular ad hoc networks

Analysis of hidden terminal’s effect on the performance of vehicular ad hoc networks

... IBSS network with hidden terminals, nodes are unsynchronized; hence, we cannot assume that the nodes start transmission, simul- ...the hidden terminals but only in the case of saturated unicast ... See full document

21

Super Node Approach to Enhance Performance in Mobile Ad-hoc Network

Super Node Approach to Enhance Performance in Mobile Ad-hoc Network

... Mobile Ad- hoc Networks encounter many severe problems concerning routing, scalability and network management when the size of network becomes ...mobile ad-hoc network in ... See full document

5

A NOVEL APPROACH FOR ENERGY EFFICIENT ROUTING ALGORITHM FOR AD-HOC NETWORK

A NOVEL APPROACH FOR ENERGY EFFICIENT ROUTING ALGORITHM FOR AD-HOC NETWORK

... Transmission power control and load distribution belong to the former category,and sleep/power-down mode approach belongs to the latter category. Another important approach to optimizing active communication energy is ... See full document

9

Trusted Routing With An Efficient Certificate Revocation For Mobile Ad Hoc Network

Trusted Routing With An Efficient Certificate Revocation For Mobile Ad Hoc Network

... proposed method ensures the forwarding of packets through the trusted and least link delay routes only by monitoring the behavior of neighboring nodes and meeting the QoS constraint ... See full document

9

A Novel Method of Minimal Dominating Node Selection and Comparison with Dai and Wu Algorithm for Energy Efficient Routing in Ad hoc Network based on Directional Antenna

A Novel Method of Minimal Dominating Node Selection and Comparison with Dai and Wu Algorithm for Energy Efficient Routing in Ad hoc Network based on Directional Antenna

... Wireless ad hoc network is a network without physical ...central network administration and its ability to support tetherless access to a variety of services, the ad hoc ... See full document

6

Proposal of a Centralized Optimization Model for Efficient Data Query in Mobile Ad-hoc Social Network

Proposal of a Centralized Optimization Model for Efficient Data Query in Mobile Ad-hoc Social Network

... the node with a lower aggregated reachable expertise to the node with a higher ...A node considers both its friend’s parsed interests and answer quality in determining the friend’s similarity value, ... See full document

13

An Assessment of Probabilistic Reactive Routing Protocol for MANET’s

An Assessment of Probabilistic Reactive Routing Protocol for MANET’s

... wireless network for sharing the information among the different ...Wireless network has been exploded ...mobile node in limited resource and without uses of any centralized administration is ... See full document

5

Efficient and Secure Communication In Vehicular AD HOC Network

Efficient and Secure Communication In Vehicular AD HOC Network

... vehicles avoid accidents and improve road safety is the main motivation in the development of ...movements, network disconnections and limited ...develop efficient protocol in VANET for secure and ... See full document

5

A Study on Evaluation of DoS Attacks in WiMAX Networks

A Study on Evaluation of DoS Attacks in WiMAX Networks

... “confidential”, and those attacks had very limited impact. With time and as the Internet gets more and more used as a communication channel, hacktivism becomes more and more popular. Geopolitical situations, wars, ... See full document

7

Efficient Dom protocol in mobile AD HOC network

Efficient Dom protocol in mobile AD HOC network

... It is transfer speed effective in information conveyance yet inadequately versatile in dealing with the multicast tree, subsequent to every switch needs to keep up the multicast sending [r] ... See full document

7

An Approach to Combat the Blackhole Attack in AODV Routing Protocol

An Approach to Combat the Blackhole Attack in AODV Routing Protocol

... any node. Third, in wireless ad hoc networks adversaries can exploit the decentralized management for new types of attack designed to break the cooperative ... See full document

7

Show all 10000 documents...