• No results found

[PDF] Top 20 Fuzzy Approach for Throughput Selection in Mobile Ad hoc Network

Has 10000 "Fuzzy Approach for Throughput Selection in Mobile Ad hoc Network" found on our website. Below are the top 20 most common "Fuzzy Approach for Throughput Selection in Mobile Ad hoc Network".

Fuzzy Approach for Throughput Selection in Mobile Ad hoc Network

Fuzzy Approach for Throughput Selection in Mobile Ad hoc Network

... semi-stateless approach based on a fuzzy logic system for wireless mobile ad hoc ...called Fuzzy MARS assures service differentiation delivery with low delay ...different ... See full document

8

An efficient approach to improve throughput for TCP vegas in ad hoc network

An efficient approach to improve throughput for TCP vegas in ad hoc network

... like throughput and transmission delay plays a vital role in vegas ...in mobile ad-hoc network ...higher throughput and lower delay of whole network and control ... See full document

5

Super Node Approach to Enhance Performance in Mobile Ad-hoc Network

Super Node Approach to Enhance Performance in Mobile Ad-hoc Network

... the network layer in MANET ...reuse, throughput, scalability and power ...the network layer by lessening the size of the routing tables and by decreasing transmission overheads updating of routing ... See full document

5

COMPARISON AODV AND DSDV ROUTING PROTOCOLS WITH USING FUZZY LOGIC IN THE MANET

COMPARISON AODV AND DSDV ROUTING PROTOCOLS WITH USING FUZZY LOGIC IN THE MANET

... Mobile ad hoc networks have consisted of the nodes which are freely ...this network has dynamic ...ing fuzzy logic approach to evaluate and compare two routing protocols ...and ... See full document

7

Mobile ad hoc network overview

Mobile ad hoc network overview

... ABR is a compromise between broadcast and point-to-point routing and uses the connection-oriented packet forwarding approach. Route selection is primarily based on the aggregated associativity ticks of ... See full document

8

A Survey on Best Path Selection Approaches in Mobile Ad Hoc Network

A Survey on Best Path Selection Approaches in Mobile Ad Hoc Network

... the network different time intervals have many scenarios of finding ...for selection of best path for improving network performance if there is many path ... See full document

8

Literature survey of network reconstruction, reconfiguration & QOS optimization approach in case of link failure in existing SSA protocol in Mobile Ad Hoc Network

Literature survey of network reconstruction, reconfiguration & QOS optimization approach in case of link failure in existing SSA protocol in Mobile Ad Hoc Network

... are typically characterized by high mobility and frequent link failures that result in low throughput and high end-to-end delay. To reduce the number of route discoveries due to such broken paths, multipath ... See full document

10

Clustering Approach in Route Selection Using Mobile Agent in Mobile Ad-Hoc Network

Clustering Approach in Route Selection Using Mobile Agent in Mobile Ad-Hoc Network

... data network in order to maximize its efficiency and ...of network management architectures: centralized, distributed, and ...clustering approach facilitates this hierarchical management architecture ... See full document

6

Optimized Fuzzy based Malicious Node Detection on Routing and Certificate Authority based Secure Communication in Wireless Ad HOC Network

Optimized Fuzzy based Malicious Node Detection on Routing and Certificate Authority based Secure Communication in Wireless Ad HOC Network

... the network performance by enhancing the routing-procedures over ...proposed approach genuinely ensures the node lifetime and in which it indirectly improves the network performance and node ... See full document

7

Data Transmission based On Demand Routing in MANET

Data Transmission based On Demand Routing in MANET

... of ad-hoc on demand distance vector routing protocol (AODV) in grid based topology of wireless ad-hoc ...and throughput rate has best results in all the considered transmission rates at ... See full document

8

MULTIHOP CELLULAR NETWORKS: A REVIEW

MULTIHOP CELLULAR NETWORKS: A REVIEW

... the network operator or mobile nodes (MNs) with multihop communication capability; fixed MHNs or mobile ...the network operator at strategic ...access. Mobile MHNs are actually MSs with ... See full document

10

A Survey of Mobile Ad Hoc Network Attacks

A Survey of Mobile Ad Hoc Network Attacks

... the network. These packets overspend a significant portion of network resources, and introduce wireless channel contention and network contention in the ... See full document

9

Racial Disparity in Social Spatiality: Usage of National Parks and Opera Attendance

Racial Disparity in Social Spatiality: Usage of National Parks and Opera Attendance

... our approach through both theoretical analysis and simulation ...Genetic Fuzzy Multi-path Routing Protocol (GFMRP), which is a multi-path routing protocol based on fuzzy set theory and evolutionary ... See full document

187

QUALITY OF SERVICE SUPPORT MOBILE AD-HOC NETWORKS (MANETS): ITS CHALLENGES AND ASSOCIATED ISSUES

QUALITY OF SERVICE SUPPORT MOBILE AD-HOC NETWORKS (MANETS): ITS CHALLENGES AND ASSOCIATED ISSUES

... Dynamic Ad-Hoc ...the network operation another approach is required which is taken based cooperation enforcement scheme for each node of the Ad-Hoc ...of network [11] ... See full document

10

An Efficient Approach for Detection of Wormhole Attack in Mobile ad hoc Network

An Efficient Approach for Detection of Wormhole Attack in Mobile ad hoc Network

... Phase 2: Neighbor list Detection Approach for Wormhole Attack: Step1: Sending RREQ message source find route to destination.. Step 2: RREQ packet is received by intermediate nodes and ve[r] ... See full document

6

A serve on: An efficient prediction based routing for mobile AD HOC network

A serve on: An efficient prediction based routing for mobile AD HOC network

... prediction are information theory base and neighboring nodes based prediction (Mrinal Kanti Debbarma et al., 2012) The route discovery process is initiate for a source node need to communicate to another, which it has no ... See full document

5

Routing Flying Ad Hoc Networks (FANET) Flight Systems: A Survey

Routing Flying Ad Hoc Networks (FANET) Flight Systems: A Survey

... the network whose result is new problems for MAC layer in ad hoc ...FANET network is usually fluctuating ...of Ad-Hoc(FANETs) network ...FANET network, which is ... See full document

5

Intrusion Detection in Mobile Ad Hoc Network

Intrusion Detection in Mobile Ad Hoc Network

... C. Not complying with the bandwidth reservation scheme:Nodes in a multi-hop wireless network can reserve bandwidth, i.e. a portion of the transmission channel capacity, along its route before initiating a flow. If ... See full document

7

Link Prediction in Mobile Ad hoc Network

Link Prediction in Mobile Ad hoc Network

... K´aroly Farkas, Theus Hossmann, Lukas Ruf, and Bernhard Plattner [9] proposed an approach to predict link quality variation based on pattern matching which is affected by mobility of nodes. This approach ... See full document

8

MAC Issues in Mobile Ad hoc Network

MAC Issues in Mobile Ad hoc Network

...  When validation is accomplished in MANET then secrecy is simply an issue of encoding calculation on the session by utilizing keys. These security administrations can be given separately or blend, it just relies upon ... See full document

5

Show all 10000 documents...