Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
[PDF][PDF] International journal of advanced research in computer science and software engineering
AB Angadi, AB Angadi, KC Gull - International Journal, 2013 - academia.edu
Relational database management systems (RDMBSs) today are the predominant
technology for storing. In the past few years, the” one size fits all “-thinking concerning …
technology for storing. In the past few years, the” one size fits all “-thinking concerning …
Fuzzy logic based DSR trust estimation routing protocol for MANET using evolutionary algorithms
VK Kalimuthu, G Samydurai - Tehnički vjesnik, 2021 - hrcak.srce.hr
Sažetak In MANET attaining consistent routing is a main problem due to several reasons
such as lack of static infrastructure, exposed transmission medium, energetic network …
such as lack of static infrastructure, exposed transmission medium, energetic network …
Prevention of ant mills in pheromone-based search algorithm for robot swarms
Computer scientists use animal-based phenomenon as source of inspiration to develop
swarm algorithm and simulate their behaviors. One example is ants foraging. For finding …
swarm algorithm and simulate their behaviors. One example is ants foraging. For finding …
Analysis of denial of service impact on data routing in mobile eHealth wireless mesh network
S Alanazi, K Saleem, J Al-Muhtadi… - Mobile Information …, 2016 - Wiley Online Library
Wireless mesh networks (WMNs) are a promising technology that has emerged with the
combination of several wireless networks. These wireless networks and devices …
combination of several wireless networks. These wireless networks and devices …
Monitoring and management of peer-to-peer systems
KG Graffi - 2010 - tuprints.ulb.tu-darmstadt.de
The peer-to-peer paradigm has had large success in content distribution and multimedia
communication applications on the Internet. In a peer-to-peer network, the participating …
communication applications on the Internet. In a peer-to-peer network, the participating …
[PDF][PDF] A survey of reputation based schemes for MANET
Abstract___ In multihop networks such as mobile ad hoc networks selfish or misbehaving
nodes can disrupt the whole network and severely degrade network performance …
nodes can disrupt the whole network and severely degrade network performance …
A security framework for wireless mesh networks
Abstract The class of Wireless Mesh Networks (WMN) supports an ample set of applications
including wireless community networks, radio access networks in rural or metropolitan …
including wireless community networks, radio access networks in rural or metropolitan …
Dealing with collusion attack in a trust-based manet
R Abassi - Cybernetics and Systems, 2018 - Taylor & Francis
Trust allows collaborating entities to cope with their uncertainty especially when these
collaborations are the bedrock of the network existence such as in Mobile Ad hoc NETworks …
collaborations are the bedrock of the network existence such as in Mobile Ad hoc NETworks …
Thwarting Sybil attackers in reputation-based scheme in mobile ad hoc networks
Routing in mobile ad hoc networks is performed in a distributed fashion where each node
acts as host and router, such that it forwards incoming packets for others without relying on a …
acts as host and router, such that it forwards incoming packets for others without relying on a …
Group rekeying based on member join history
This paper presents GREP, a novel group rekeying scheme that leverages the history of join
events in order to achieve efficiency and high scalability. GREP rekeys the group with only …
events in order to achieve efficiency and high scalability. GREP rekeys the group with only …