A multi-parameter comparative study of manet routing protocols

IA Alameri, J Komarkova - 2020 15th Iberian Conference on …, 2020 - ieeexplore.ieee.org
The process of selecting the routing protocols is one of the most critical choices to be made
during the design of an advert hoc network Several things are essential to be known to …

Energy efficient adaptive clustering hierarchy approach for wireless sensor networks

S El Khediri, RU Khan, N Nasri… - International Journal of …, 2021 - Taylor & Francis
Hierarchical architecture, in combination with static structure, is a productive approach to
Wireless Sensor Networks (WSNs) scalability as well as efficiency. Sensor nodes, a dual …

3l-aodv: Three layer security protocol for grayhole attack mitigation in manet

MBM Kamel, WD Abdullah, AK Hamoud… - … Congress on Information …, 2023 - Springer
As the mobile ad hoc networks infrastructure has no centralized points of connections, the
traffic from a source to a destination passes through number of intermediate nodes. When …

Cognitive Radio for Smart Grid: A Decentralized Emergency Management Approach

H Rajab, MBM Kamel, AK Hamoud… - 2022 32nd …, 2022 - ieeexplore.ieee.org
With the remarkable advancements in wireless technology, the scarcity of the available
spectrum has become more severe. Cognitive Radio (CR) technology is introduced as an …

[PDF][PDF] An Оverview of the Мultipath Тechnologies, their Importance and Types

NA Jabbar, G Lencse - Proceedings of The Technical University of …, 2022 - researchgate.net
One of the challenges for networks that operate according to traditional protocols is to solve
the limitations of the single interface or the single path. Especially in mobile phone networks …

[PDF][PDF] Comparative study and analysis of wireless mobile adhoc networks routing protocols

IA Alameri, J Komarkova - … conference for phd students and young …, 2019 - researchgate.net
The process of selecting the routing protocols is one of the most important decisions to be
made in the design of an Ad hoc network. There are many characteristics that mainly affect …

Optimized image processing and clustering to mitigate security threats in mobile ad hoc network

IAS Alameri, JK Mutar, AN Onaizah… - Telkomnika, volume 18 …, 2020 - dk.upce.cz
Since there are provisions of many attributes that are not possible or difficult to follow by
networks conventionally, mobile ad-hoc networks are extensively deployed. This application …

[PDF][PDF] BIG-BOSS EYE CONCEPT FOR ENERGY EFFICIENT APPROACH IN WIRELESS SENSOR NETWORKS

H Morwani, M Agarwal - Journal of the Maharaja Sayajirao University of … - researchgate.net
The development of wireless sensor networks was originally motivated by military
applications such as battlefield surveillance. However, wireless sensor networks are now …

[PDF][PDF] MMK 2015

MMK PRO, DAMV PRACOVNÍKY - 2015 - researchgate.net
This article deals with theoretical definition of mutual relations of national, international and
European law, as well as with a critical assessment of the implementation of these relations …