Routing protocols in manet: An overview

G Kaur, P Thakur - 2019 2nd International Conference on …, 2019 - ieeexplore.ieee.org
Mobile Ad-hoc Networks also known as MANETs belong to a collaborative collection of
different mobile devices from a heterogeneous network, the prolific feature is the capability …

Application of bee colony algorithm for FANET routing

AV Leonov - 2016 17th International conference of young …, 2016 - ieeexplore.ieee.org
FANET are wireless ad hoc networks on unmanned aerial vehicles, and are characterized
by high nodes mobility, dynamically changing topology and movement in 3D-space. FANET …

Enhance congestion control multipath routing with ANT optimization in Mobile ad hoc Network

S Rathore, MR Khan - 2016 International Conference on ICT in …, 2016 - ieeexplore.ieee.org
The routing in MANET is not easy to maintained strong link in between sender to receive.
The availability bandwidth in MANET is fixed, that is creating the problem of link blockage …

[PDF][PDF] Higher priority selection message (hpsm) for data transmission in fly ad hoc network

A Godbole, K Rai - Journal of Data Acquisition and Processing, 2023 - sjcjycl.cn
Email: kalpanarai2961@ gmail. com Abstract-Flying Ad Hoc Networks (FANETs) need a set
of parameters that are specific to the application. One of these parameters is energy, which …

Dynamic Key Distribution Management Using Key Escrow Based ECC Algorithm in Manets

B Vanathy, M Ramakrishnan - International Journal of Advanced …, 2020 - papers.ssrn.com
Abstract In the Information and Communication (ICT) Era, the data transmission through
wireless communication has become most proficient and rapid tool around the world. IEEE …

A Relative Study on Cellular, WSN and Manets

S Kausar Fatima, S Gauhar Fatima… - … Journal of Advanced …, 2019 - papers.ssrn.com
A cellular network is an asymmetric radio network which is made up of fixed transceivers or
nodes, maintain the signal while the mobile transceiver which is using the network is in the …

[PDF][PDF] International Journal of Computer Engineering & Technology (ijcet)

S Kumaraswamy, SH Manjula, KR Venugopal… - Journal Impact …, 2013 - researchgate.net
Cryptographic approaches are traditional and preferred methodologies used to preserve the
privacy of data released for analysis. Privacy Preserving Data Mining (PPDM) is a new trend …

[PDF][PDF] INTERNATIONAL JOURNAL OF COMPUTER APPLICATIONS (IJCA)

P Gite, S Thakur - academia.edu
Researchers and engineers are making efforts to design and implement a high secure,
efficient and reliable network for next generation. One of the efforts that are well known in …

[PDF][PDF] HANDS-FREE MOBILE HANDLING: AN INNOVATIVE MOBILE MANAGEMENT

S Saxena - academia.edu
Today nearly every other person has a smart phone. In today's era where connectivity is of
real importance, smart phones have crowded the market. The most advanced and common …

[PDF][PDF] INTERNATIONAL JOURNAL OF COMPUTER ENGINEERING & TECHNOLOGY (IJCET)

C COMPUTING - Journal Impact Factor, 2014 - academia.edu
The hardware-software partitioning problem is a key aspect of co-design of digital electronic
systems; extensive research has been performed with diverse definitions of partitioning …