NETorium: high-fidelity scalable wireless network emulator

K Akashi, T Inoue, S Yasuda, Y Takano… - Proceedings of the 12th …, 2016 - dl.acm.org
Wireless networks take advantage of various technologies that wired networks do not use,
such as authentication and ad hoc networks. Although it is important to verify such wireless …

Signal strength and residual power based optimum transmission power routing for mobile ad hoc networks

P Ramachandran, M Dinakaran - Procedia Computer Science, 2016 - Elsevier
In general, mobile nodes operate with limited batter power which needs to be fairly utilized
in order to perform network functioning activities such as routing, increasing network lifetime …

An energy-aware random multi-path routing protocol for MANETs

SL Peng, YH Chen, RS Chang… - 2015 IEEE International …, 2015 - ieeexplore.ieee.org
Because of the success of wired network, the protocols proposed for MANETs in the past are
based on shortest path algorithm such as AODV or DSR. Although it brings better data …

[PDF][PDF] Improving the Performance of MANETs using the Feedback Based Adaptive Speedy TCP applied with Adept Route Yielding Algorithm

A Deshpande, A Kaushal - Int. J. Appl. Eng. Res, 2017 - researchgate.net
The fast-paced digitization of the world including the explosive growth of IoT, has resulted in
an imminent need towards improving the efficiency of Ad-Hoc Networks driving them. In the …

Feedback-based adaptive speedy transmission (FAST) control protocol to improve the performance of TCP over Ad-Hoc networks

A Deshpande, A Kaushal - 2016 International Conference on …, 2016 - ieeexplore.ieee.org
The main purpose of this research is to develop the performance improvement solution for
use of TCP over Ad-Hoc networks. This research is implemented in Network Simulator2 …

Passive incidental alertness—based link visualization for secure data transmission in manet

S Uma, SP Shantharajah, C Rani - Journal of Applied Security …, 2017 - Taylor & Francis
Connectivity visualization plays the major role in the transmission of status information of
network parameters to the control center in order to assure security. The high mobility of …

[PDF][PDF] Cluster Head Election Approach based on Weighted Clustering Algorithm for MANET

V Chourey, P Kala - International Journal of Computer Applications, 2015 - academia.edu
The mobile ad hoc network is self-configurable network technology where not any fixed
infrastructure is available. Due to frequent mobility and dynamic topology the network suffers …

[PDF][PDF] SDVCA–A Robust and Secure Data Communication Protocol for Manet

A Kannan, N Manikandan, M Nandi, M Chaitanya… - 2021 - scholar.archive.org
The existence of intruders is a threat factor in any network. Degradation of the network
operation occur which include delay in transmission, reduced network energy level, low …

[PDF][PDF] Network Security Based Authenticated Routing Protocol

V Sreevani, N Nitheesha, K Samitha - Chief Editor Dr. A …, 2022 - researchgate.net
This work explains about the trust and secure communication process in the mobile ad-hoc
networks. The trust establishment process and the relevant steps like encryption …

以自適應混合式路由協定建構永不死亡的行動隨意式網路提升災害復原之能力

王渝鈞 - 2018 - airitilibrary.com
**年來由於地球氣候急速變遷, 使得極端氣候出現的頻率逐年上升, 而這類氣候往往造成嚴重的
災害, 導致災害發生時因通訊中斷民眾難以求援. 但若能讓災害發生時資訊聯絡的網路能**常 …