Journal articles on the topic 'ADHOC ON-DEMAND DISTANCE VECTOR'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'ADHOC ON-DEMAND DISTANCE VECTOR.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
AmitMaheshbhai, Lathigara, and K. H. Wandra. "Adhoc On-demand Distance Vector: Energy Efficient Approach." International Journal of Computer Applications 102, no. 8 (2014): 40–45. http://dx.doi.org/10.5120/17839-8725.
Full textG Patel, Vallabh, and Nishant P. Makwana. "Optimized Adhoc On demand Distance Vector (O-AODV)." International Journal of Engineering Trends and Technology 35, no. 1 (2016): 12–18. http://dx.doi.org/10.14445/22315381/ijett-v35p203.
Full textGanpat Joshi, Gurpreet Singh,. "A Novel Statistical Adhoc On-Demand Distance Vector Routing Protocol Technique is using for Preventing the Mobile Adhoc Network from Flooding Attack." Turkish Journal of Computer and Mathematics Education (TURCOMAT) 12, no. 6 (2021): 1753–65. http://dx.doi.org/10.17762/turcomat.v12i6.3779.
Full textdhao, A. P. Ja, and Dr D. N. Chaudhari. "Security Aware Adhoc on Demand Distance Vector Routing Protocol in Vehicular Adhoc Network." International Journal of Innovative Research in Computer and Communication Engineering 02, no. 12 (2014): 7258–63. http://dx.doi.org/10.15680/ijircce.2014.0212019.
Full textVeepin Kumar and Sanjay Singla. "A Performance Analysis of MANET Routing Protocols." international journal of engineering technology and management sciences 6, no. 6 (2022): 173–80. http://dx.doi.org/10.46647/ijetms.2022.v06i06.027.
Full textMano, Reji, P. C. Kishore Raja, Christeena Joseph, and Radhika Baskar. "Hardware Implementation of Intrusion Detection System for Ad-Hoc Network." International Journal of Reconfigurable and Embedded Systems (IJRES) 5, no. 3 (2016): 158. http://dx.doi.org/10.11591/ijres.v5.i3.pp158-164.
Full textSoundararajan, S., B. R. Tapas Bapu, C. Kotteeswaran, S. Venkatasubramanian, P. J. Sathish Kumar, and Ahmed Mudassar Ali. "Modified Adhoc On-Demand Distance Vector for Trust Evaluation And Attack Detection." Intelligent Automation & Soft Computing 36, no. 2 (2023): 1227–40. http://dx.doi.org/10.32604/iasc.2023.025752.
Full textSultana, Jeenat, and Tasnuva Ahmed. "Elliptic Curve Cryptography Based Data Transmission against Blackhole Attack in MANET." International Journal of Electrical and Computer Engineering (IJECE) 8, no. 6 (2018): 4412. http://dx.doi.org/10.11591/ijece.v8i6.pp4412-4422.
Full textSultana, Jeenat, and Tasnuva Ahmed. "Elliptic Curve Cryptography Based Data Transmission against Blackhole Attack in MANET." International Journal of Electrical and Computer Engineering (IJECE) 8, no. 6 (2020): 4412–22. https://doi.org/10.11591/ijece.v8i6.pp4412-4422.
Full textPatel, Manoj, Dr Maneesh Shrivastava, and Kavita Deshmukh. "Simulation And Auditing Of Network Security Based On Probabilistic Neural Network Approach." INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 3, no. 1 (2012): 91–94. http://dx.doi.org/10.24297/ijct.v3i1b.2746.
Full textGupta, Ekta, and Akhilesh Tiwari. "BPAODV: Black Hole Prevention Using Trust Adhoc on Demand Distance Vector Routing Protocol." International Journal of Future Generation Communication and Networking 7, no. 6 (2014): 103–18. http://dx.doi.org/10.14257/ijfgcn.2014.7.6.11.
Full textUmaparvathi, M., and Dharmishtan K. Varughese. "Secure Video Transmission Against Black Hole Attack in MANETs." International Journal of Business Data Communications and Networking 7, no. 4 (2011): 1–17. http://dx.doi.org/10.4018/jbdcn.2011100101.
Full textC, Mohanadevi, and Sweatha Selvakumar. "An Effective Encryption Mechanism for Security Issues in Adhoc Networks." ECS Transactions 107, no. 1 (2022): 17465–74. http://dx.doi.org/10.1149/10701.17465ecst.
Full textAhmed. "PERFORMANCE ANALYSIS OF ADHOC ON DEMAND DISTANCE VECTOR PROTOCOL WITH BLACKHOLE ATTACK IN WSN." Journal of Computer Science 10, no. 8 (2014): 1466–72. http://dx.doi.org/10.3844/jcssp.2014.1466.1472.
Full textAhmed, Shadab. "Ad_Hoc on Demand Distance Vector Routing using MANET." IJARCCE 6, no. 3 (2017): 944–48. http://dx.doi.org/10.17148/ijarcce.2017.63220.
Full textSrikanth, Pala, Maddula Prasad, Sree Pokkuluri Kiran, Pattem Sunil, Rao Kurada Ramachandra, and Yadavalli Ramu. "Detection and avoidance of black-hole attack in mobile adhoc network using bee-ad-hoc on-demand distance vector." IAES International Journal of Artificial Intelligence (IJ-AI) 14, no. 1 (2025): 822–32. https://doi.org/10.11591/ijai.v14.i1.pp822-832.
Full textPamungkas, Dimas W. L., and Radityo Anggoro. "An Improvement of Ant Colony Adhoc On-Demand Vector (ANT-AODV) with K-Means Clustering Nodes Method in Mobile Adhoc Network (MANET) Environment." Journal of Development Research 5, no. 1 (2021): 1–6. http://dx.doi.org/10.28926/jdr.v5i1.133.
Full textRahman, Md Abdur, Md Mizanur Rahman, and Md Abdul Alim. "Design and Performance Analysis of an In-Band Full-Duplex MAC Protocol for Ad Hoc Networks." Telecom 4, no. 1 (2023): 100–117. http://dx.doi.org/10.3390/telecom4010007.
Full textSumathi. "EVALUATING AN AUTHENTICATED TRUST BASED ADHOC ON DEMAND DISTANCE VECTOR FOR MALICIOUS NODES ISOLATION IN MANET." Journal of Computer Science 10, no. 9 (2014): 1859–64. http://dx.doi.org/10.3844/jcssp.2014.1859.1864.
Full textKaushal, Payal, Meenu Khurana, and Ketti Ramchandran Ramkumar. "Comparative analysis of reactive routing protocols for vehicular adhoc network communications." Bulletin of Electrical Engineering and Informatics 13, no. 3 (2024): 1621–30. http://dx.doi.org/10.11591/eei.v13i3.5322.
Full textPatel, Surabhi, and Heman Pathak. "Improvising QoS through Cross-Layer Optimization in MANETs." International Journal of Computer Network and Information Security 15, no. 6 (2023): 52–63. http://dx.doi.org/10.5815/ijcnis.2023.06.05.
Full textV. Rajesh, Kannan. "On-demand based wireless with hybrid cryptography in MANET." i-manager’s Journal on Wireless Communication Networks 10, no. 2 (2022): 8. http://dx.doi.org/10.26634/jwcn.10.2.18937.
Full textDeepa, M., and P. Krishna Priya. "Secure Enhanced Reactive Routing Protocol for Manet Using Two Fish Algorithm." International Journal of Engineering & Technology 7, no. 3.12 (2018): 621. http://dx.doi.org/10.14419/ijet.v7i3.12.16441.
Full textMohammed, Tarique, and Islam Rumana. "Performances of Ad Hoc Networks Under Deterministic and Probabilistic Channel Conditions : Cases for Single Path and Multipath Routing Protocols." International Journal of Computer Networks & Communications (IJCNC) 10, no. 4 (2018): 1–21. https://doi.org/10.5281/zenodo.1327358.
Full textMohammed, Tarique, and Islam Rumana. "Performances of Ad Hoc Networks Under Deterministic and Probabilistic Channel Conditions : Cases for Single Path and Multipath Routing Protocols." International Journal of Computer Networks & Communications (IJCNC) 10, no. 4 (2018): 1–21. https://doi.org/10.5121/ijcnc.2018.10401.
Full textPala, Srikanth, Prasad Maddula, Kiran Sree Pokkuluri, Sunil Pattem, Ramachandra Rao Kurada, and Ramu Yadavalli. "Detection and avoidance of black-hole attack in mobile adhoc network using bee-ad-hoc on-demand distance vector." IAES International Journal of Artificial Intelligence (IJ-AI) 14, no. 1 (2025): 822. http://dx.doi.org/10.11591/ijai.v14.i1.pp822-832.
Full textShruti, Singhroy, and Zade PL. "Performance Evaluation of Routing Protocols in Cognitive Radio Network." European Journal of Advances in Engineering and Technology 5, no. 4 (2018): 288–95. https://doi.org/10.5281/zenodo.10708467.
Full textRATNASIH, RATNASIH, RISKI MUKTIARTO NUGROHO AJINEGORO, and DOAN PERDANA. "Analisis Kinerja Protokol Routing AOMDV pada VANET dengan Serangan Rushing." ELKOMIKA: Jurnal Teknik Energi Elektrik, Teknik Telekomunikasi, & Teknik Elektronika 6, no. 2 (2018): 232. http://dx.doi.org/10.26760/elkomika.v6i2.232.
Full textAbul, Hassan Muhammad, Syed Irfan Ullah, Abdus Salam, Arbab Wajid Ullah, Muhammad Imad, and Farhat Ullah. "Energy efficient hierarchical based fish eye state routing protocol for flying Ad-hoc networks." Indonesian Journal of Electrical Engineering and Computer Science 21, no. 1 (2021): 465–71. https://doi.org/10.11591/ijeecs.v21.i1.pp465-471.
Full textMurty, M. V. D. S. Krishna, and Dr Lakshmi Rajamani. "Neighbour Node Ratio AODV (NNR-AODV) Routing Protocol for Wormhole Attack Detection in Manets." International Journal of Emerging Science and Engineering 11, no. 4 (2023): 1–9. http://dx.doi.org/10.35940/ijese.d2547.0311423.
Full textAbul Hassan, Muhammad, Syed Irfan Ullah, Abdus Salam, Arbab Wajid Ullah, Muhammad Imad, and Farhat Ullah. "Energy efficient hierarchical based fish eye state routing protocol for flying Ad-hoc networks." Indonesian Journal of Electrical Engineering and Computer Science 21, no. 1 (2021): 465. http://dx.doi.org/10.11591/ijeecs.v21.i1.pp465-471.
Full textM, V. D. S. Krishna Murty. "Neighbour Node Ratio AODV (NNR-AODV) Routing Protocol for Wormhole Attack Detection in Manets." International Journal of Emerging Science and Engineering (IJESE) 11, no. 4 (2023): 1–9. https://doi.org/10.35940/ijese.D2547.0311423.
Full textVasundra, S., and D. Venkatesh. "Performance Evaluation of Routing Protocols for Voice and Video Traffics." Asian Journal of Computer Science and Technology 7, no. 3 (2018): 86–90. http://dx.doi.org/10.51983/ajcst-2018.7.3.1890.
Full textBharadwaj, Priyanka, and Surjeet Balhara. "A Bandwidth and Energy Aware QoS Routing Protocol for Enhanced Performance in Ad-hoc Networks." International Journal of Sensors, Wireless Communications and Control 9, no. 2 (2019): 203–13. http://dx.doi.org/10.2174/2210327908666180801125735.
Full textMakani, Ruchi, and Busi V. Ramana Reddy. "Performance Evaluation of Cognitive Internet on Things Under Routing Attacks." International Journal of Sensors, Wireless Communications and Control 10, no. 1 (2020): 15–24. http://dx.doi.org/10.2174/2210327909666181217122655.
Full textPrajapati, Meenakshi. "An Implementation and Modification of Routing Protocol Against Vehicular Adhoc Network." International Journal for Research in Applied Science and Engineering Technology 9, no. 10 (2021): 1777–80. http://dx.doi.org/10.22214/ijraset.2021.38680.
Full textS., Dr Smys, and Dr Jennifer S. Raj. "Performance Improvement in Conventional AODV Using Energy Efficient, Manifold Route Discovery Scheme." Journal of ISMAC 2, no. 2 (2020): 129–39. http://dx.doi.org/10.36548/jismac.2020.2.006.
Full textMurty, M. V. D. S. Krishna, and Dr Lakshmi Rajamani. "Secure and Light Weight Aodv (Slw-Aodv) Routing Protocol for Resilience Against Blackhole Attack in Manets." International Journal of Soft Computing and Engineering 13, no. 1 (2023): 1–9. http://dx.doi.org/10.35940/ijsce.a3592.0313123.
Full textM, V. D. S. Krishna Murty, and Lakshmi Rajamani Dr. "Secure and Light Weight Aodv (Slw-Aodv) Routing Protocol for Resilience Against Blackhole Attack in Manets." International Journal of Soft Computing and Engineering (IJSCE) 13, no. 1 (2023): 1–9. https://doi.org/10.35940/ijsce.A3592.0313123.
Full textKumar Singh Yadav, Ajit, and Rajesh K. Yadav. "A Reliable and Secure AODV Protocol for MANETs." International Journal of Engineering & Technology 7, no. 4.38 (2018): 893. http://dx.doi.org/10.14419/ijet.v7i4.38.27603.
Full textGeetha, M. "Performance and analysis of Adhoc On Demand Multipath Distance Vector Routing Protocol ( AOMDV) and Enhanced Multipath MPR AODV Routing Protocol(EMMDV) in MANET." International Journal of Computer Sciences and Engineering 6, no. 7 (2018): 413–18. http://dx.doi.org/10.26438/ijcse/v6i7.413418.
Full textJ, Viji Gripsy, Jayanthiladevi A, Mahendiran N, and Sheela Rini A. "SRDAODV: A Hybrid Secure Routing Protocol for Mobile Ad-Hoc Networks." Indian Journal of Science and Technology 16, no. 32 (2023): 2574–79. https://doi.org/10.17485/IJST/v16i32.1240.
Full textAldabbagh, Ghadah, Peer Azmat Shah, Halabi B. Hasbullah, Farhan Aadil, Khalid Mahmood Awan, and Farman Marwat. "Fuzzy Logic Based Enhanced AOMDV with Link Status Classification for Efficient Multi-Path Routing in Multi-Hop Wireless Networks." Journal of Computational and Theoretical Nanoscience 14, no. 1 (2017): 620–30. http://dx.doi.org/10.1166/jctn.2017.6252.
Full textVivek Sharma. "Secure and Energy Efficient Routing Approach for Wireless Sensor Networks to Counter Flooding Attack." Journal of Information Systems Engineering and Management 10, no. 4s (2025): 558–66. https://doi.org/10.52783/jisem.v10i4s.566.
Full textM, V. Narayana, Narsimha Dr.G, and SSVN Sarma Prof. "IMPLEMENTATION OF MANET CONTROL PACKET DROP USING BAIT DETECTION APPROACH." International Journal of Engineering Sciences & Research Technology 5, no. 3 (2016): 147–55. https://doi.org/10.5281/zenodo.47008.
Full textAsha Latha, S., and A. Sivabalan. "Efficient Security Authentication Protocol in Wireless Sensor Networks." Applied Mechanics and Materials 573 (June 2014): 418–23. http://dx.doi.org/10.4028/www.scientific.net/amm.573.418.
Full textRaghavendar Raju, L., and C. R. K. Reddy. "Security Improvisation through Node Trust Prediction Approach in Mobile Ad Hoc Networks." International Journal of Interactive Mobile Technologies (iJIM) 13, no. 09 (2019): 40. http://dx.doi.org/10.3991/ijim.v13i09.9329.
Full textFatima, Lubna Naaz, Syeda Hajra Mahin, and Fahmina Taranum. "Efficient strategies to reduce power consumption in MANETs." PeerJ Computer Science 5 (November 18, 2019): e228. http://dx.doi.org/10.7717/peerj-cs.228.
Full textRath, Mamata, Binod Kumar Pattanayak, and Bibudhendu Pati. "Energy Competent Routing Protocol Design in MANET with Real Time Application Provision." International Journal of Business Data Communications and Networking 11, no. 1 (2015): 50–60. http://dx.doi.org/10.4018/ijbdcn.2015010105.
Full textYoon Khang, Adam Wong, Arnidza Ramli, Shamsul J. Elias, et al. "Self-configuration and self-optimization process with taguchi method in hybrid optical wireless network." Indonesian Journal of Electrical Engineering and Computer Science 19, no. 2 (2020): 870. http://dx.doi.org/10.11591/ijeecs.v19.i2.pp870-878.
Full text