Academic literature on the topic 'ADHOC ON-DEMAND DISTANCE VECTOR'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'ADHOC ON-DEMAND DISTANCE VECTOR.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "ADHOC ON-DEMAND DISTANCE VECTOR"

1

AmitMaheshbhai, Lathigara, and K. H. Wandra. "Adhoc On-demand Distance Vector: Energy Efficient Approach." International Journal of Computer Applications 102, no. 8 (2014): 40–45. http://dx.doi.org/10.5120/17839-8725.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

G Patel, Vallabh, and Nishant P. Makwana. "Optimized Adhoc On demand Distance Vector (O-AODV)." International Journal of Engineering Trends and Technology 35, no. 1 (2016): 12–18. http://dx.doi.org/10.14445/22315381/ijett-v35p203.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Ganpat Joshi, Gurpreet Singh,. "A Novel Statistical Adhoc On-Demand Distance Vector Routing Protocol Technique is using for Preventing the Mobile Adhoc Network from Flooding Attack." Turkish Journal of Computer and Mathematics Education (TURCOMAT) 12, no. 6 (2021): 1753–65. http://dx.doi.org/10.17762/turcomat.v12i6.3779.

Full text
Abstract:
The Mobile Adhoc Networks are more vulnerable because in the (MANET) Mobile Adhoc Network all node works as data sink, transmitter, router. There is no centralized system in the Mobile Adhoc network, so the chances of the vulnerabilities are very high in the network. There are various security issues in the Mobile Adhoc Network. From the various attacks the flooding attacks are most difficult attacks that extremely affect in Mobile Adhoc Network. In this paper, a new statistical based technique is planned, which is used to discover the flooding attack in an positive approach than other approac
APA, Harvard, Vancouver, ISO, and other styles
4

dhao, A. P. Ja, and Dr D. N. Chaudhari. "Security Aware Adhoc on Demand Distance Vector Routing Protocol in Vehicular Adhoc Network." International Journal of Innovative Research in Computer and Communication Engineering 02, no. 12 (2014): 7258–63. http://dx.doi.org/10.15680/ijircce.2014.0212019.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Veepin Kumar and Sanjay Singla. "A Performance Analysis of MANET Routing Protocols." international journal of engineering technology and management sciences 6, no. 6 (2022): 173–80. http://dx.doi.org/10.46647/ijetms.2022.v06i06.027.

Full text
Abstract:
A group of mobile nodes creates an arrangement connected to a remote media, forming a dynamic topology. In adhoc networks, Any time a device sends data to another node, that node uses energy, and occasionally the data transmission will halt when all the power is used up. The difficulty with MANET is reducing the energy consumption of the network's intermediary devices so that the network is active during data transmission because Mobile Adhoc Network (MANET) devices are often power-driven. Then, using performance measurements, a performance analysis is carried out across several routing protoc
APA, Harvard, Vancouver, ISO, and other styles
6

Mano, Reji, P. C. Kishore Raja, Christeena Joseph, and Radhika Baskar. "Hardware Implementation of Intrusion Detection System for Ad-Hoc Network." International Journal of Reconfigurable and Embedded Systems (IJRES) 5, no. 3 (2016): 158. http://dx.doi.org/10.11591/ijres.v5.i3.pp158-164.

Full text
Abstract:
<p>New technologies have been developed in wireless adhoc network need more security. To widespread the adhoc networks we turn in the attention of wireless hand held device mobile phones communicate with short distance using wireless lan card or Bluetooth. The performance of mobile phone are improved greatly for last few years .so security is more important for mobile networks In this paper hardware implementation of single hop ad-hoc network is implemented and analysed using microcontroller. The protocol implemented in this paper is primarily based on, Ad hoc On-Demand Distance Vector r
APA, Harvard, Vancouver, ISO, and other styles
7

Soundararajan, S., B. R. Tapas Bapu, C. Kotteeswaran, S. Venkatasubramanian, P. J. Sathish Kumar, and Ahmed Mudassar Ali. "Modified Adhoc On-Demand Distance Vector for Trust Evaluation And Attack Detection." Intelligent Automation & Soft Computing 36, no. 2 (2023): 1227–40. http://dx.doi.org/10.32604/iasc.2023.025752.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Sultana, Jeenat, and Tasnuva Ahmed. "Elliptic Curve Cryptography Based Data Transmission against Blackhole Attack in MANET." International Journal of Electrical and Computer Engineering (IJECE) 8, no. 6 (2018): 4412. http://dx.doi.org/10.11591/ijece.v8i6.pp4412-4422.

Full text
Abstract:
Mobile nodes roaming around in the hostile environment of mobile adhoc network (MANET) play the role of router as well as terminal. While acting as a router, a node needs to choose a reliable routing protocol. Besides, an encryption algorithm is needed to secure data to be conveyed through the unfriendly atmosphere while acting as a terminal. We have implemented Elliptic Curve Cryptography (ECC) along with Adhoc On Demand Multipath Distance Vector (AOMDV) routing protocol to secure data transmission against blackhole attack in a MANET. ECC, a public key cryptography that works on discrete loga
APA, Harvard, Vancouver, ISO, and other styles
9

Sultana, Jeenat, and Tasnuva Ahmed. "Elliptic Curve Cryptography Based Data Transmission against Blackhole Attack in MANET." International Journal of Electrical and Computer Engineering (IJECE) 8, no. 6 (2020): 4412–22. https://doi.org/10.11591/ijece.v8i6.pp4412-4422.

Full text
Abstract:
Mobile nodes roaming around in the hostile environment of mobile adhoc network (MANET) play the role of router as well as terminal. While acting as a router, a node needs to choose a reliable routing protocol. Besides, an encryption algorithm is needed to secure data to be conveyed through the unfriendly atmosphere while acting as a terminal. We have implemented Elliptic Curve Cryptography (ECC) along with Adhoc On Demand Multipath Distance Vector (AOMDV) routing protocol to secure data transmission against blackhole attack in a MANET. ECC, a public key cryptography that works on discrete loga
APA, Harvard, Vancouver, ISO, and other styles
10

Patel, Manoj, Dr Maneesh Shrivastava, and Kavita Deshmukh. "Simulation And Auditing Of Network Security Based On Probabilistic Neural Network Approach." INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 3, no. 1 (2012): 91–94. http://dx.doi.org/10.24297/ijct.v3i1b.2746.

Full text
Abstract:
: Probabilistic Neural Network approach used for mobile adhoc network is more efficient way to estimate the network security. In this paper, we are using an Adhoc On Demand Distance Vector (AODV) protocol based mobile adhoc network. In our Proposed Method we are considering the multiple characteristics of nodes. In this we use all the parameter that is necessary in AODV. For simulation purpose we use the probabilistic neural network approach that gives more efficient and accurate results as comparison to the clustering algorithm in the previous systems was used. The performance of PNN (probabi
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "ADHOC ON-DEMAND DISTANCE VECTOR"

1

Miško, Lukáš. "Optimalizace směrování v protokolu Ad hoc On-Demand Distance Vector." Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2020. http://www.nusl.cz/ntk/nusl-413102.

Full text
Abstract:
This thesis contains a theoretical basis for MANET networks. The main focus of the thesis is principles of these networks, their routing protocols and especially on Ad hoc On-Demand Distance Vector (AODV), implementation of this protocol and implementation of new mechanis for peer selection. Thesis contains ETX metric basic and implementation of this metric to AODV protocol. There is a demonstration of simulation of AODV protocol and simulation of AODV-ETX protocol. Simulations are run in Network Simulator 3. AODV and AODV-ETX comparasion are included in thesis.
APA, Harvard, Vancouver, ISO, and other styles
2

Balagam, Satya. "Enhancement of ad hoc On-Demand Distance Vector protocol security using Secure Message Transmission." Thesis, Wichita State University, 2011. http://hdl.handle.net/10057/5160.

Full text
Abstract:
The ad hoc on-demand distance vector (AODV) routing protocol offers quick adaptation to dynamic link changes, incurs low processing and memory overhead, has a low initial setup while connecting to networks, and determines unicast routes to destinations within the ad hoc network. This routing protocol allows for efficient and reliable discovery of routes. Although the connection setup delay is lower for the AODV protocol compared to other ad hoc routing protocols, such as the dynamic source routing (DSR) protocol and destination sequenced distance vector (DSDV) protocol, the AODV routing protoc
APA, Harvard, Vancouver, ISO, and other styles
3

Jayakeerthy, Arunkumar Thippur Lim Alvin S. "Query-localized route repair mechanism for ad-hoc on-demand distance vector routing algorithm." Auburn, Ala, 2009. http://hdl.handle.net/10415/1608.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Zahary, Ammar Thabit. "Improving routing performance of multipath ad hoc on-demand distance vector in mobile add hoc networks." Thesis, De Montfort University, 2008. http://hdl.handle.net/2086/4277.

Full text
Abstract:
The aim of this research is to improve routing fault tolerance in Mobile Ad hoc Networks (MANETs) by optimising mUltipath routing in a well-studied reactive and single path routing protocol known as Ad hoc On-demand Distance Vector (AODV). The research also aims to prove the effect of varying waiting time of Route Reply (RREP) procedure and utilising the concept of efficient routes on the performance of multipath extensions to AODV. Two novel multipath routing approaches are developed in this thesis as new extensions to AODV to optimise routing overhead by improving Route Discovery Process (RD
APA, Harvard, Vancouver, ISO, and other styles
5

Sama, Aravind Reddy. "AOD²V : Ad Hoc On Demand and Delay Constrained Distance Vector Routing for mobile sensor/actor networks /." Available to subscribers only, 2008. http://proquest.umi.com/pqdweb?did=1619624051&sid=12&Fmt=2&clientId=1509&RQT=309&VName=PQD.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Theriot, Tyrone P. "Simulation and performance analysis of the AD HOC On-Demand Distance Vector Routing Protocol for tactical mobile ad hoc networks." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2000. http://handle.dtic.mil/100.2/ADA388021.

Full text
Abstract:
Thesis (M.S. in Electrical Engineering) Naval Postgraduate School, Dec. 2000.<br>Thesis advisor(s): Tummala, Murali. "December 2000." Includes bibliographical references (p. 81-82). Also available in print.
APA, Harvard, Vancouver, ISO, and other styles
7

El, Moutia Abdallah. "Energy-aware Ad Hoc on-demand distance vector routing protocol and optimizing the blocking problem induced in wireless Ad Hoc networks." FIU Digital Commons, 2004. http://digitalcommons.fiu.edu/etd/3124.

Full text
Abstract:
The purpose of this thesis was to investigate some of the issues related to routing and medium access control protocol in ad hoc networks. In routing protocol, the goal is to tackle the power consumption problem and to present a case for using new cost energy-aware metric for Ad Hoc On-Demand Distance Vector (AODV). The idea of the new cost metric is to be able to avoid routes with a low energy capacity. By using this approach, high efficiency in energy consumption can be achieved in Ad-Hoc networks. The second goal of this thesis was to investigate the blocking problem induced by Request-to-S
APA, Harvard, Vancouver, ISO, and other styles
8

Aymak, Onur. "Ad Hoc Packet Routing Simulation And Tactical Picture Display Tool For Navy." Master's thesis, METU, 2004. http://etd.lib.metu.edu.tr/upload/2/12605266/index.pdf.

Full text
Abstract:
The importance of communication is vital in wartime. The capability of having all the position information of the allied and enemy forces in a single Tactical Information Display System (TIDS), maintains a great advantage for deciding what to do before the enemy reacts. A Naval Information Distributing System (NIDS) is developed for building an effective communication infrastructure between the war ships. In the designed network, besides the mobile platforms (ships), some fixed platforms (land stations) are used to transfer the information coming from these mobile platforms to all the other pl
APA, Harvard, Vancouver, ISO, and other styles
9

Peng, Wendi Surveying &amp Spatial Information Systems Faculty of Engineering UNSW. "Roles of factors in simulation of parking guidance and information systems." Publisher:University of New South Wales. Surveying & Spatial Information Systems, 2008. http://handle.unsw.edu.au/1959.4/42788.

Full text
Abstract:
The Parking Guidance and Information (PGI) system is an important application of Intelligent Transport System (ITS), which has been shown to be an effect service for traffic information and parking management. The roadside Variable Message Sign (VMS) board has been the usual media for the publication of parking information in early PGI systems, and its performance over the years has been studied via simulations and questionnaire surveys. However, survey results show significant discrepancies across various traffic networks in different areas. More recently, parking information services have be
APA, Harvard, Vancouver, ISO, and other styles
10

ARORA, JATIN. "ENERGY PRESERVING ADHOC ON-DEMAND DISTANCE VECTOR." Thesis, 2014. http://dspace.dtu.ac.in:8080/jspui/handle/repository/15460.

Full text
Abstract:
Wireless devices use has been increased drastically in the last decade. To provide communication between the node which are mobile in nature and using wireless network some protocols were developed to provide faster transmission between the nodes in the network. But most of them lack in conserving the energy of the nodes to maximize the network lifetime. Energy is the main constraint in a wireless network. Each network device is running on the battery which is always limited source of energy. Hence the routing protocol should take energy of nodes as a valuable metric to perform routing w
APA, Harvard, Vancouver, ISO, and other styles
More sources

Books on the topic "ADHOC ON-DEMAND DISTANCE VECTOR"

1

QoS Analysis of AdHoc On-Demand Distance Vector Routing Protocol: Theory and Experimental Analysis by TigerHATS. LAP Lambert Academic Publishing, 2012.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Simulation and Performance Analysis of the AD HOC On-Demand Distance Vector Routing Protocol for Tactical Mobile AD HOC Networks. Storming Media, 2000.

Find full text
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "ADHOC ON-DEMAND DISTANCE VECTOR"

1

Vinoth Kumar, V., and S. Ramamoorthy. "Secure Adhoc On-Demand Multipath Distance Vector Routing in MANET." In Proceedings of the International Conference on Computing and Communication Systems. Springer Singapore, 2018. http://dx.doi.org/10.1007/978-981-10-6890-4_5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Amin, Noorul, Nizamuddin, and Abdelmuttlib Ibrahim. "ECAODV: Enhanced Classified Ad-Hoc on Demand Distance Vector Routing Protocol." In Communications in Computer and Information Science. Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-28962-0_10.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Sachan, Preeti, and Pabitra Mohan Khilar. "Authenticated Routing for Ad-Hoc On-Demand Distance Vector Routing Protocol." In Advances in Network Security and Applications. Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-22540-6_35.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Naidu, P. Priya, and Meenu Chawla. "Enhanced Ad Hoc on Demand Distance Vector Local Repair Trial for MANET." In Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering. Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-27308-7_36.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Lin, Deyu, and Xiaojing Meng. "Optimization and Realization of Ad Hoc On-Demand Distance Vector Routing Based on NS2." In Communications in Computer and Information Science. Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-34038-3_73.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Ali, Sara. "An Enhanced Virtual Private Network Authenticated Ad Hoc On-Demand Distance Vector Routing." In Learning and Analytics in Intelligent Systems. Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-24322-7_25.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Khimsara, Siddharth, Kashyap K. R. Kambhatla, June Hwang, Sunil Kumar, and John D. Matyjas. "AM-AOMDV: Adaptive Multi-metric Ad-Hoc On-Demand Multipath Distance Vector Routing." In Ad Hoc Networks. Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-11723-7_61.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Ács, Gergely, Levente Buttyán, and István Vajda. "Provable Security of On-Demand Distance Vector Routing in Wireless Ad Hoc Networks." In Security and Privacy in Ad-hoc and Sensor Networks. Springer Berlin Heidelberg, 2005. http://dx.doi.org/10.1007/11601494_10.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Soni, Brijesh, Biplab Kumar Sarkar, and Arjun Rajput. "Improvising the Ad hoc on Demand Distance Vector Routing Protocol When Nodes or Links Fails." In Proceedings of All India Seminar on Biomedical Engineering 2012 (AISOBE 2012). Springer India, 2012. http://dx.doi.org/10.1007/978-81-322-0970-6_32.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Goyal, Monika, Deepak Goyal, and Sandeep Kumar. "Dragon-AODV: Efficient Ad Hoc On-Demand Distance Vector Routing Protocol Using Dragon Fly Algorithm." In Advances in Intelligent Systems and Computing. Springer Singapore, 2020. http://dx.doi.org/10.1007/978-981-15-0751-9_17.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "ADHOC ON-DEMAND DISTANCE VECTOR"

1

Abagonie, Kindu Tigabu, Addisalem Genta, Ermias Kassahun, Emiyamrew Azmeraw, and Awoke Berara. "Secure Ad hoc On-demand Distance Vector Routing Protocol for WirelessSensor Networks Data Transmission." In 2024 International Conference on Information and Communication Technology for Development for Africa (ICT4DA). IEEE, 2024. https://doi.org/10.1109/ict4da62874.2024.10777204.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Wariyal, Suresh Chandra, Nitin Pandey, Deepak Negi, and Ashish B. Khare. "Assessing Performance of Wireless Sensor Networks Using Ad-Hoc On-Demand Distance Vector Routing." In 2024 OPJU International Technology Conference (OTCON) on Smart Computing for Innovation and Advancement in Industry 4.0. IEEE, 2024. http://dx.doi.org/10.1109/otcon60325.2024.10687794.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Gailbreath, Gage, Andre Koka, Mohammed Gharib, Alireza Ebrahimi, and Fatemeh Afghah. "Development of a Mobile Ad-Hoc Network Testbed: Modular Implementation of Ad-Hoc On-Demand Distance Vector Routing." In 2024 20th International Conference on Distributed Computing in Smart Systems and the Internet of Things (DCOSS-IoT). IEEE, 2024. http://dx.doi.org/10.1109/dcoss-iot61029.2024.00079.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Samsudiat, Muhammad Haidar Ali, Hafni Ferdian, and Riri Fitri Sari. "Performance Improvement of Ad-hoc On-demand Distance Vector (AODV) Routing Protocol Using K-Means Clustering in Flying Ad-hoc Network." In 2024 International Conference on Radar, Antenna, Microwave, Electronics, and Telecommunications (ICRAMET). IEEE, 2024. https://doi.org/10.1109/icramet62801.2024.10809170.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Prasad, P. Dilli, R. Balamanigandan, R. Mahaveerakannan, and A. AntoSagaya Priscilla. "Design of Enhanced Dynamic Video Streaming Mechanism for Improving the Throughput Comparing with Ad Hoc on-Demand Distance Vector Routing Mechanism in Video Streaming Application." In 2024 5th International Conference on Electronics and Sustainable Communication Systems (ICESC). IEEE, 2024. http://dx.doi.org/10.1109/icesc60852.2024.10690120.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Mangrulkar, R. S., and Mohammad Atique. "Trust based secured adhoc On demand Distance Vector Routing protocol for mobile adhoc network." In 2010 Sixth International Conference on Wireless Communication and Sensor Networks (WCSN). IEEE, 2010. http://dx.doi.org/10.1109/wcsn.2010.5712310.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Alkhamisi, Abrar Omar, and Seyed M. Buhari. "Trusted Secure Adhoc On-demand Multipath Distance Vector Routing in MANET." In 2016 IEEE 30th International Conference on Advanced Information Networking and Applications (AINA). IEEE, 2016. http://dx.doi.org/10.1109/aina.2016.105.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Pawar, Mahesh, Narayan Patidar, Kashif Khan, Shuja Kashif Khan, and Ausaf Umar Khan. "Congestion Avoidance Mechanism in Adhoc On-Demand Distance Vector Routing Protocol for Mobile AdHoc Networks." In 2022 International Conference on Electronics and Renewable Systems (ICEARS). IEEE, 2022. http://dx.doi.org/10.1109/icears53579.2022.9752198.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Nancharaiah, B., and B. Chandra Mohan. "Modified Ant Colony Optimization to enhance MANET routing in Adhoc on demand Distance Vector." In 2014 2nd International Conference on Business and Information Management (ICBIM). IEEE, 2014. http://dx.doi.org/10.1109/icbim.2014.6970938.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Khan, Ausaf Umar, Manish Devendra Chawhan, Milind Madhukar Mushrif, and Bhumika Neole. "Performance Analysis of Adhoc On-demand Distance Vector Protocol under the influence of Black-Hole, Gray-Hole and Worm-Hole Attacks in Mobile Adhoc Network." In 2021 5th International Conference on Intelligent Computing and Control Systems (ICICCS). IEEE, 2021. http://dx.doi.org/10.1109/iciccs51141.2021.9432072.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "ADHOC ON-DEMAND DISTANCE VECTOR"

1

Perkins, C., E. Belding-Royer, and S. Das. Ad hoc On-Demand Distance Vector (AODV) Routing. RFC Editor, 2003. http://dx.doi.org/10.17487/rfc3561.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Fernández Gómez, Jorge. Outlook for the development of international trade in hydrogen and related products. Potential implications for shipping ports. Edited by Patricia Canto. Universidad de Deusto, 2025. https://doi.org/10.18543/trvq8033.

Full text
Abstract:
In this report we analyze the current prospects for the development of international trade in renewable hydrogen and related products and their implications for shipping ports. In order to do this, we conducted a non-systematic review of academic and non-academic literature (with special emphasis on relevant international institutions). The preliminary literature review allows us to identify the most relevant challenges for the development of a global hydrogen market, including (a) the expected evolution of demand and supply of renewable hydrogen in the medium to long term; (b) production cost
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!