Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
A secure optimization routing algorithm for mobile ad hoc networks
Mobile ad hoc networks (MANET) are self-organizing, rapidly deployable wireless networks
excellent for outdoor events, communications in places lacking radio infrastructure …
excellent for outdoor events, communications in places lacking radio infrastructure …
Blockchain-assisted secure routing protocol for cluster-based mobile-ad hoc networks
MANETs aredecentralized network that involves mobile nodes. As the overall network is
mobile and has no centralization, network management, routing, and security become very …
mobile and has no centralization, network management, routing, and security become very …
Adaptive trust-based secure and optimal route selection algorithm for MANET using hybrid fuzzy optimization
Due to the dynamic nature of network topology, routing has been recently identified as the
most serious challenge in MANET. For effective routing in MANET, route discovery and …
most serious challenge in MANET. For effective routing in MANET, route discovery and …
[PDF][PDF] A survey on security challenges in the current MANET routing protocols
FC Korir, W Cheruiyot - Global Journal of Engineering and …, 2022 - academia.edu
Wireless communication employs radio technology to facilitate data transmission without
any fixed infrastructures. A mobile ad hoc network is an example of this data transmission …
any fixed infrastructures. A mobile ad hoc network is an example of this data transmission …
A novel DAG-blockchain structure for trusted routing in secure MANET-IoT environment
Different physical objects can be employed in the modern technological environment to
facilitate human activity. In order to connect physical objects with the universe of digital using …
facilitate human activity. In order to connect physical objects with the universe of digital using …
Enhancement of Network Security in MANET Using Refined Adaptive Harris Hawks Optimization Algorithm (RAHHO) for IoT Applications
The proliferation of Internet of Things (IoT) devices in Mobile Ad-Hoc Networks (MANETs)
has introduced complex security challenges, demanding innovative solutions to safeguard …
has introduced complex security challenges, demanding innovative solutions to safeguard …
Facial emotion recognition using geometrical features based deep learning techniques
In recent years, intelligent emotion recognition is active research in computer vision to
understand the dynamic communication between machines and humans. As a result …
understand the dynamic communication between machines and humans. As a result …
Generating optimal test case generation using shuffled shepherd flamingo search model
Software testing is considered as the basic procedure and it is genuinely supportive for
several software developers. Develo** an automatic test case generation helps the …
several software developers. Develo** an automatic test case generation helps the …
A Hybrid Approach for Detecting and Preventing Security Attacks in MANETs
MANETs are new sort of organizational network that works in a profoundly powerful and
unusual atmosphere. Though the flexible nature of MANET is attractive, the dynamic …
unusual atmosphere. Though the flexible nature of MANET is attractive, the dynamic …
Hybrid cat and mouse-based dolphin swarm optimization strategy for intelligent routing in wireless sensor network applicable for iot applications
Abstract Wireless Sensor Network (WSN), a group of small sensor nodes with lower energy
states are widely used for the purpose of communication. While designing the WSN system …
states are widely used for the purpose of communication. While designing the WSN system …