S Thirumurugan, EGDP Raj - … of the Second International Conference on …, 2012 - dl.acm.org
The present scenario has been conquered by the wireless network. It is well understood that the future will also be tied up by the same network. The ad hoc network plays a pivotal role …
Air pollution obtains a key concern in India owing to faster economic development, urbanisation and industrialisation connected with increased energy demands. But these …
S Balaji, V Priyadharsini - ICTACT Journal on Communication …, 2015 - ictactjournals.in
Mobile Adhoc network is an instantaneous wireless network that is dynamic in nature. It supports single hop and multihop communication. In this infrastructure less network …
Big data recently has gained tremendous importance in the way information is being disseminated. Transaction based data, unstructured data streaming to and fro from social …
H Wang, H Chen, L Song - CSQRWC 2012, 2012 - ieeexplore.ieee.org
In wireless self-organized network (WSON), AOW clustering algorithms can achieve better performance and high adaptability, but having limitations in certain circumstances. In this …
M Alinci, T Inaba, D Elmazi, E Spaho… - 2016 10th …, 2016 - ieeexplore.ieee.org
A Mobile Ad hoc Network (MANET) is a multi-hop wireless network in which the mobile nodes are dynamic in nature and has a limited bandwidth and minimum battery power. Due …
M Alinci, T Inaba, D Elmazi, E Spaho… - … on Network-Based …, 2016 - ieeexplore.ieee.org
A Mobile Ad hoc Network (MANET) is a multi-hop wireless network in which the mobile nodes are dynamic in nature and has a limited bandwidth and minimum battery power. Due …
RS Prabha, S Saraswathi - International Journal of Early …, 2022 - search.ebscohost.com
Today, it is crucial to maintain a high degree of security to enable the secure and reliable exchange of information between businesses. However, safe data exchange via the Internet …
K Gomathi, M Gandhi - 2011 Third International Conference on …, 2011 - ieeexplore.ieee.org
Key management is vital part of security; this issue is even bigger in wireless network compared to wired network. The distribution of keys in an authenticated manner is a difficult …