[HTML][HTML] MTPKM: Multipart trust based public key management technique to reduce security vulnerability in mobile ad-hoc networks

Y Harold Robinson, E Golden Julie - Wireless Personal Communications, 2019 - Springer
A mobile ad hoc network (MANET) is a collection of self-configured movable nodes. Keys
have to be securely handled and maintained and there are various techniques available in …

[HTML][HTML] Hybrid optimization routing management for autonomous underwater vehicle in the internet of underwater things

YH Robinson, S Vimal, EG Julie, M Khari… - Earth Science …, 2021 - Springer
Abstract Internet of Underwater Things (IoUTs) is completely embraced by acoustic sensor
nodes that are commonly battery consumption. The sensor's battery life is restricted and it is …

[HTML][HTML] An effective congestion control scheme for MANET with relative traffic link matrix routing

D Krishnamoorthy, P Vaiyapuri, A Ayyanar… - Arabian Journal for …, 2020 - Springer
In mobile ad hoc networks (MANETs), obstacle happens owing to the loss of packet, which
could be effectively minimized by linking congestion control schemes (comprising of routing …

[HTML][HTML] A secure trusted multipath routing and optimal fuzzy logic for enhancing QoS in MANETs

M Rajashanthi, K Valarmathi - Wireless Personal Communications, 2020 - Springer
Abstract Wireless Mobile Ad Hoc Network (MANET) is an independentmethod of mobile
nodes. The multipath routing in MANET is the most important pertains for securable …

FPSOEE: Fuzzy-enabled particle swarm optimization-based energy-efficient algorithm in mobile ad-hoc networks

YH Robinson, S Balaji, EG Julie - Journal of Intelligent & …, 2019 - content.iospress.com
Abstract Mobile Ad-hoc Network (MANET) desires a well-organized algorithm for increasing
the network connectivity using Multipath routing technique. In MANET, the identification of …

An adaptive vulture based deep belief mechanism for searching user's resources in mobile P2P environment

M Vijaya Lakshmi, A Naveena, M Vijaya Lakshmi - Cluster Computing, 2024 - Springer
Mobile devices are pervasive in today's world, and the ability to create ad-hoc networks
among these devices enables increased connectivity. Peer-to-peer (P2P) Mobile Ad-hoc …

[HTML][HTML] Hybrid cache management in ad hoc networks

CG Krishnan, YH Robinson, EG Julie… - Wireless Personal …, 2021 - Springer
With the consistent growing maneuver and applications of mobile technologies, dynamic
handling of queries related to information on electronic media (Broadcast Queries) plays a …

A neuro-fuzzy approach for multipoint data prediction in passive clustered wireless sensor networks

J Carmalatta, S Diwakaran… - Journal of Intelligent …, 2023 - content.iospress.com
In Passive Clustered Wireless Sensor Networks (WSNs), energy is lost in a sensor node
during the data transmission. In order to avoid the energy loss due to data transmission, a …

GBMS: A New Centralized Graph Based Mirror System Approach to Prevent Evaders for Data Handling with Arithmetic Coding in Wireless Sensor Networks.

S Balaji, YH Robinson, EG Julie - Ingénierie des Systèmes d …, 2019 - search.ebscohost.com
In wireless sensor networks (WSNs), the data packets are aggregated and compressed
before being sent to the base station, aiming to keep the data secure in the transmission …

Hadoop MapReduce and dynamic intelligent splitter for efficient and speed transmission of cloud-based video transforming

YH Robinson, IJ Jacob, EG Julie… - 2019 3rd International …, 2019 - ieeexplore.ieee.org
Cloud-based video transmission includes the multimedia data with variant specifications in
mobile devices. Video transforming contains the vital role in video streaming for media …