To see the other types of publications on this topic, follow the link: Hybrid Protocols.

Journal articles on the topic 'Hybrid Protocols'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Hybrid Protocols.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Goyal, Dinesh, Anil Kumar, Yatin Gandhi, and Vinit Khetani. "Securing wireless sensor networks with novel hybrid lightweight cryptographic protocols." Journal of Discrete Mathematical Sciences and Cryptography 27, no. 2-B (2024): 703–14. http://dx.doi.org/10.47974/jdmsc-1921.

Full text
Abstract:
WSN are essential in the Internet of Things (IoT) framework as they enable the gathering and transmission of data in different fields. The limited resources of sensor nodes in these networks require security protocols that are lightweight, striking a balance between data protection and efficiency. This research paper introduces a new hybrid cryptographic protocol called AES-128-CCM + Diffie-Hellman (ACDH), which aims to tackle the security issues encountered by WSN. Here present thorough assessment of the ACDH protocol, with a specific emphasis on critical factors including Security Strength,
APA, Harvard, Vancouver, ISO, and other styles
2

Uday, Singh Kushwaha, Jain Neelesh, Malviya Jaya, and Dhummerkar Mohini. "Comparative Analysis of DSR, AODV, AOMDV and AOMDV-LR in VANET by Increasing the Number of Nodes and Speed." Indian Journal of Science and Technology 16, no. 14 (2023): 1099–106. https://doi.org/10.17485/IJST/v16i14.2446.

Full text
Abstract:
Abstract <strong>Objectives:</strong>&nbsp;To analyze different VANET routing methods.&nbsp;<strong>Methods:</strong>&nbsp;The simulation result of reactive, proactive and hybrid multipath routing protocols is obtained in NS-2.34 by increasing the number of nodes and mobility. The outcomes are summarized in tables and figures.&nbsp;<strong>Findings:</strong>&nbsp;After simulation and comparison of existing protocols and the latest hybrid protocol, we found that the latest hybrid routing protocol gives the best result in the case of a higher number of participants and of high speed with minimum
APA, Harvard, Vancouver, ISO, and other styles
3

Kurniawan, Denny, Muhammad Ashar, and Harits Ar Rosyid. "Hybrid NarrowBand-internet of things protocol for real time data optimization." International Journal of Electrical and Computer Engineering (IJECE) 13, no. 3 (2023): 2827. http://dx.doi.org/10.11591/ijece.v13i3.pp2827-2836.

Full text
Abstract:
The level of dependence on data communication in the modern era is increasing exponentially. The internet of things (IoT) plays a very important role in the advancement of the industrial revolution 4.0 that utilizes data communication systems. IoT deployments require data communication protocols, such as hypertext transfer protocol (HTTP), and message queuing telemetry transport (MQTT) as well as network communication protocols (wireless) to meet the network needs of devices with limited resources. Optimization of data communication in IoT is needed to maintain the quality of sending and recei
APA, Harvard, Vancouver, ISO, and other styles
4

Denny, Kurniawan, Ashar Muhammad, and Ar Rosyid Harits. "10.11591/ijece.v13i3.pp2827-2836." International Journal of Electrical and Computer Engineering (IJECE) 13, no. 3 (2023): 2827–36. https://doi.org/10.11591/ijece.v13i3.pp2827-2836.

Full text
Abstract:
The level of dependence on data communication in the modern era is increasing exponentially. The internet of things (IoT) plays a very important role in the advancement of the industrial revolution 4.0 that utilizes data communication systems. IoT deployments require data communication protocols, such as hypertext transfer protocol (HTTP), and message queuing telemetry transport (MQTT) as well as network communication protocols (wireless) to meet the network needs of devices with limited resources. Optimization of data communication in IoT is needed to maintain the quality of sending and recei
APA, Harvard, Vancouver, ISO, and other styles
5

Ruay-Shiung Chang, Wei-Yeh Chen, and Yean-Fu Wen. "Hybrid wireless network protocols." IEEE Transactions on Vehicular Technology 52, no. 4 (2003): 1099–109. http://dx.doi.org/10.1109/tvt.2002.807126.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Byun, Ilmu. "Cooperative Hybrid-ARQ Protocols: Unified Frameworks for Protocol Analysis." ETRI Journal 33, no. 5 (2011): 759–69. http://dx.doi.org/10.4218/etrij.11.0110.0630.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Baryun, Abdussalam Nuri, Khalid Al Begain, and David Villa. "A Hybrid Network Emergency Communication Model." International Journal of Handheld Computing Research 4, no. 2 (2013): 17–39. http://dx.doi.org/10.4018/jhcr.2013040102.

Full text
Abstract:
To communicate within disaster scenarios, different devices/systems need to cooperate with specific protocols. The key communication protocol needs to provide interoperability among these systems and provide the solution for emergency services. The paper studies the hybrid network disaster recovery (HNDR) systems and classifies its communication scenarios and requirements. The authors propose a new networking protocol for the hybrid network, with ability to forward sessions and messages through different transport protocols, and copes with node mobility and node failure. The paper considers he
APA, Harvard, Vancouver, ISO, and other styles
8

Zafar, Sherin, and Neha Sharma. "Inculcating Trust in Hybrid Routing Approach for Securing MANET." International Journal of End-User Computing and Development 8, no. 2 (2019): 18–28. http://dx.doi.org/10.4018/ijeucd.2019070102.

Full text
Abstract:
The rudimentary notion of using MANET is that the exchange of information in between the portable nodes count on the swift arrangement of a momentary network. Also, each node in a MANET can travel spontaneously in any direction and can change its links to the other nodes repeatedly. In hybrid protocols, initially, the routing is established with the help of some proactively prospected routes and later on serves the request with the help of reactive flooding. In MANET, the security and the routing are the two most crucial and challenging aspects that open up a vast area for improvement. Securit
APA, Harvard, Vancouver, ISO, and other styles
9

Punia, Divya, and Rajender Kumar. "A Kalman Filter Based Hybrid Routing Protocol for Efficient Vehicle Connectivity and Traffic Management." Transport and Telecommunication Journal 23, no. 1 (2022): 25–32. http://dx.doi.org/10.2478/ttj-2022-0003.

Full text
Abstract:
Abstract The geographic routing protocols in Vehicular Ad Hoc Networks (VANETs) are contemplated as most efficacious protocols. Though, such types of protocols communicate a huge quantity of data that influence the network connectivity negatively. Also, out of bound issue is the second major disadvantage of geographic routing protocols. To provide a solution to these impediments, a novel K-PGRP (Kalman filter-Predictive Geographic Routing Protocol) routing protocol is proposed in this paper. K-PGRP is an improvement to PGRP (Predictive Geographic Routing Protocol) routing protocol and wields K
APA, Harvard, Vancouver, ISO, and other styles
10

Santhosh Katragadda. "Enhancing fault tolerance in RDMA systems through hybrid protocol models." World Journal of Biology Pharmacy and Health Sciences 20, no. 2 (2024): 220–31. https://doi.org/10.30574/gjeta.2024.20.2.0140.

Full text
Abstract:
Remote Direct Memory Access (RDMA) has become a critical technology in high-performance computing (HPC), cloud environments, and distributed systems due to its ability to provide low-latency, high-throughput data transfer by bypassing the operating system. However, ensuring fault tolerance in RDMA systems remains a significant challenge, particularly in scenarios involving network failures, node crashes, or memory corruption. This paper proposes a novel approach to enhancing fault tolerance in RDMA systems using hybrid protocol models. By combining the efficiency of RDMA protocols with the rel
APA, Harvard, Vancouver, ISO, and other styles
11

Santhosh, Katragadda. "Enhancing fault tolerance in RDMA systems through hybrid protocol models." Global Journal of Engineering and Technology Advances 20, no. 2 (2024): 220–31. https://doi.org/10.5281/zenodo.14921791.

Full text
Abstract:
Remote Direct Memory Access (RDMA) has become a critical technology in high-performance computing (HPC), cloud environments, and distributed systems due to its ability to provide low-latency, high-throughput data transfer by bypassing the operating system. However, ensuring fault tolerance in RDMA systems remains a significant challenge, particularly in scenarios involving network failures, node crashes, or memory corruption. This paper proposes a novel approach to enhancing fault tolerance in RDMA systems using hybrid protocol models. By combining the efficiency of RDMA protocols with the rel
APA, Harvard, Vancouver, ISO, and other styles
12

Alomari, Saleh. "An Effective Hybrid Harmonic Staircase Broadcasting Protocol (HaSB) for Video-on-Demand System." International Journal of Interactive Mobile Technologies (iJIM) 19, no. 11 (2025): 203–26. https://doi.org/10.3991/ijim.v19i11.52257.

Full text
Abstract:
Video on demand (VoD) system is a service that enables the users to choose a video at any time and watch it. VoD systems have different protocols with different strategies for dividing the video segment and sending it by channels. The protocols in VoD have different analyses depending on several metrics that assess the performance, such as server bandwidth, client waiting time, and client buffer requirement. That can help the user to watch the video at any time they are needed, which reduces the waiting time when they select the video and start watching it. This paper proposes a new hybrid bro
APA, Harvard, Vancouver, ISO, and other styles
13

Yaser, Khamayseh, Bani Yassein Muneer, and Abu-Jazoh Mai. "Intelligent black hole detection in mobile AdHoc networks." International Journal of Electrical and Computer Engineering (IJECE) 9, no. 3 (2019): 1968–77. https://doi.org/10.11591/ijece.v9i3.pp1968-1977.

Full text
Abstract:
Security is a critical and challenging issue in MANET due to its open-nature characteristics such as: mobility, wireless communications, self-organizing and dynamic topology. MANETs are commonly the target of black hole attacks. These are launched by malicious nodes that join the network to sabotage and drain it of its resources. Black hole nodes intercept exchanged data packets and simply drop them. The black hole node uses vulnerabilities in the routing protocol of MANETS to declare itself as the closest relay node to any destination. This work proposed two detection protocols based on the c
APA, Harvard, Vancouver, ISO, and other styles
14

Sankhyan, Bhanu, Anupam Baliyan, and Abhishek Kumar. "Design of a Hybrid Security Protocol based on Cryptographic Algorithms." International Journal for Research in Applied Science and Engineering Technology 12, no. 3 (2024): 2240–47. http://dx.doi.org/10.22214/ijraset.2024.59335.

Full text
Abstract:
Abstract: With increase in the use of the internet, the need to secure data is also increased. The present symmetric and asymmetric algorithms provide secure systems, but with many limitations. In the emerging world need for rapid accessing the data is increasing, a blend of both efficiency and security is required to cater the day-to-day needs. To ensure efficiency and security of the message hybrid security protocols are developed. Hybrid security protocol combines the advantages of traditional algorithms, such that more secure and efficient systems can be developed. A new hybrid protocol is
APA, Harvard, Vancouver, ISO, and other styles
15

Djordjevic, Ivan B. "Hybrid QKD Protocol Outperforming Both DV- and CV-QKD Protocols." IEEE Photonics Journal 12, no. 1 (2020): 1–8. http://dx.doi.org/10.1109/jphot.2019.2946910.

Full text
APA, Harvard, Vancouver, ISO, and other styles
16

Kim, Jongwan. "Hybrid Dynamic-Binary ALOHA Anti-Collision Protocol in RFID Systems." International Journal of Engineering & Technology 7, no. 2.15 (2018): 171. http://dx.doi.org/10.14419/ijet.v7i2.15.12566.

Full text
Abstract:
The main techniques for identifying objects in an Internet of things environment are based on radio frequency identification, in which a specific object is identified by the reader through the tag mounted on the object. When there are multiple tags in the reader’s interrogation zone, they respond simultaneously to the reader’s request, thus causing a collision between the signals sent simultaneously to the reader from those tags. Such collisions reduce the data accuracy and prolong the identification time, thus making it difficult to provide a rapid service. This paper explores a hybrid anti-c
APA, Harvard, Vancouver, ISO, and other styles
17

Pandeeswaran, Chelliah, Natrajan Papa, and Sundar G. Jayesh. "EE-Hybrid MAC Protocol for Wireless Sensor Networks." Applied Mechanics and Materials 573 (June 2014): 407–11. http://dx.doi.org/10.4028/www.scientific.net/amm.573.407.

Full text
Abstract:
MAC protocol design in Wireless sensor networks becomes vibrant research field for the past several years. In this paper an EE-Hybrid MAC protocol (Energy efficient hybrid Medium Access Control) has been proposed, which is energy efficient and low latency MAC protocol, which uses interrupt method to assign priority for certain wireless sensor nodes assumed to be present in critical loops of industrial process control domain. EE-Hybrid MAC overcomes some of the limitations in the existing approaches. Industrial wireless sensor network require a suitable MAC protocol which offers energy efficien
APA, Harvard, Vancouver, ISO, and other styles
18

Akande, Damilare Oluwole, Olasunkanmi Fatai Oseni, Festus Kehinde Ojo, Job Adedamola Adeleke, and Ayobami Olatunde Fawole. "Outage Probability Performance of Hybrid Time-Power Splitting Relaying Protocol with Interferers Presence." ABUAD Journal of Engineering Research and Development (AJERD) 8, no. 1 (2025): 324–32. https://doi.org/10.53982/ajerd.2025.0801.33-j.

Full text
Abstract:
Combining simultaneous wireless information and power transfer with full-duplex communication at the energy-constrained relay terminal is a practical way of improving the lifespan and data rates performance of cooperative wireless networks. However, employing the two most common radio frequency energy harvesting protocols namely: time-switching and power splitting in full duplex mode is limited in outage probability performance for 5G network and beyond. The deployment of hybrid time-power splitting relaying protocol in full-duplex mode with decodes and forward relaying is a promising solution
APA, Harvard, Vancouver, ISO, and other styles
19

Singh, Barjinder, and Rishma Chawla. "Performance quantification of Wireless Sensor Networks by implementing ZRP." INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 2, no. 3 (2012): 86–91. http://dx.doi.org/10.24297/ijct.v2i3b.2695.

Full text
Abstract:
sensor network is composed of a largenumber of autonomous sensor nodes, which are denselydeployed in the area of interest i.e either inside thephenomenon or very close to it. Routing is an importantoperation, being the foundation of data exchangingbetween wireless devices.Zone Routing Protocol was thefirst hybrid routing protocol with both a proactive and areactive routing component. ZRP was proposed to reducethe control overhead of proactive routing protocols anddecrease the latency caused by route discovery in reactiverouting protocols. ZRP defines a zone around each nodeconsisting of the nu
APA, Harvard, Vancouver, ISO, and other styles
20

Pawale, Sushma P., and Poornima G. Patil. "A Comprehensive Analysis of Multi-Channel Mac and Clustering Protocols for Robust and Energy-Efficient Wireless Sensor Networks." Informatics and Automation 24, no. 3 (2025): 828–55. https://doi.org/10.15622/ia.24.3.4.

Full text
Abstract:
Wireless Sensor Networks have become indispensable in various applications, from environmental monitoring to health tracking. As they continue to evolve, security and energy efficiency remain paramount. This analysis paper compares contemporary techniques within two significant protocol categories: Multi-Channel Medium Access Control (MAC) protocols and Cluster-Based protocols. The evaluation focuses on various channel assignment strategies and clustering methods, including static and dynamic allocation of communication resources, adaptive methodologies, and hybrid approaches, alongside strate
APA, Harvard, Vancouver, ISO, and other styles
21

Arshad, J., Q. Akram, F. Adeeba, A. Dilawari, and Y. Saleem. "MAC PROTOCOLS FOR WIRELESS SENSOR NETWORK (WSN): A COMPARATIVE STUDY." Nucleus 51, no. 2 (2014): 163–69. https://doi.org/10.71330/thenucleus.2014.700.

Full text
Abstract:
Data communication between nodes is carried out under Medium Access Control (MAC) protocol which is defined at data link layer. The MAC protocols are responsible to communicate and coordinate between nodes according to the defined standards in WSN (Wireless Sensor Networks). The design of a MAC protocol should also address the issues of energy efficiency and transmission efficiency. There are number of MAC protocols that exist in the literature proposed for WSN. In this paper, nine MAC protocols which includes S-MAC, T-MAC, Wise-MAC, Mu-MAC, Z-MAC, A-MAC, D-MAC, B-MAC and B-MAC+ for WSN have b
APA, Harvard, Vancouver, ISO, and other styles
22

Iqbal, Muddesar, Muhammad Shafiq, Jin-Ghoo Choi, Hasina Attaullah, Khawar Akram, and Xingheng Wang. "Design and Analysis of a Novel Hybrid Wireless Mesh Network Routing Protocol." International Journal of Adaptive, Resilient and Autonomic Systems 5, no. 3 (2014): 20–39. http://dx.doi.org/10.4018/ijaras.2014070102.

Full text
Abstract:
Wireless mesh network (WMN) operates both in infrastructure and ad-hoc mode. It provides extended network coverage based on heterogeneous wireless technologies through multi-hop communications. In WMNs, the routing mechanisms and network organization need to be improved so that optimal path discovery or different protocols adaptability can be achieved. Hybrid routing is a demanding issue to be discussed these days as need of higher mobility management in the diverse situations and environments. It's required to improve the older schemes for higher data rate and minimum energy consumptions. The
APA, Harvard, Vancouver, ISO, and other styles
23

Sengupta, Saumendra, Chen-Fu Chiang, Bruno Andriamanalimanana, Jorge Novillo, and Ali Tekeoglu. "A Hybrid Adaptive Transaction Injection Protocol and Its Optimization for Verification-Based Decentralized System." Future Internet 11, no. 8 (2019): 167. http://dx.doi.org/10.3390/fi11080167.

Full text
Abstract:
Latency is a critical issue that impacts the performance of decentralized systems. Recently we designed various protocols to regulate the injection rate of unverified transactions into the system to improve system performance. Each of the protocols is designed to address issues related to some particular network traffic syndrome. In this work, we first provide the review of our prior protocols. We then provide a hybrid scheme that combines our transaction injection protocols and provides an optimal linear combination of the protocols based on the syndromes in the network. The goal is to speed
APA, Harvard, Vancouver, ISO, and other styles
24

Gaurvi Shukla. "Study of Light Weighted Protocols in Integrated MANET-WSN Setting in Urban Environment." Journal of Information Systems Engineering and Management 10, no. 43s (2025): 27–33. https://doi.org/10.52783/jisem.v10i43s.8301.

Full text
Abstract:
For the development of urban area with scalable, reliable and efficient infrastructure, the setting and study of light weighted protocols in Integrated MANET-WSN architecture is crucial. The challenges like energy efficiency of node, maintaining dynamic topology, packet latency, MANET node density and the need of uninterrupted secured real time communication. In this situation, lightweight communication protocols are needed to minimize latency, reduce overhead and in this way extend the battery life of sensor nodes. Protocols like ZigBee, RPL, DASH7 and Bluetooth LE must be optimized while mai
APA, Harvard, Vancouver, ISO, and other styles
25

Manhar, Advin, and Dr Deepak Dembla. "Improved Hybrid Routing Protocol (IHRP) in MANETs Based on Situation Based Adaptive Routing." International Journal of Electrical and Electronics Research 11, no. 1 (2023): 15–24. http://dx.doi.org/10.37391/ijeer.110103.

Full text
Abstract:
Without the need of a fixed foundation or base station, the Mobile Ad hoc Network creates its own wireless network. One of the most troublesome aspects of Mobile Ad hoc Network (MANET) is the occurrence of unexpected loss of network connectivity. As a result of this problem, packets continue to drop, and we must restore the connection by sending Route Request (RREQ) and Route Reply (RREP). As a result, network performance will suffer yet another setback. We used the scenario routing technique to combine the Dream Multipath Routing (DMR), Ad hoc on-demand multipath distance vector (AOMDV), Opti
APA, Harvard, Vancouver, ISO, and other styles
26

Yan, Xinqing, and Zhouping Yin. "QTDFS-ALOHA." International Journal of Applied Logistics 1, no. 1 (2010): 67–82. http://dx.doi.org/10.4018/jal.2010090205.

Full text
Abstract:
Proposed protocols work clumsily in resolving the collisions occurred in dense RFID tag environment. QTDFS-ALOHA, a hybrid protocol which combines the query tree protocol and the dynamic frame slot ALOHA protocol, is proposed. In each frame of this protocol, only tags in the active set are allowed to answer in randomly selected slots. Afterwards, the population of tags in the active set is estimated. According to the identification accuracy required, the protocol may choose to continue the identification of the active set with delicately calculated frame length, or to divide the active set int
APA, Harvard, Vancouver, ISO, and other styles
27

Tsuneizumi, Isamu, Ailixier Aikebaier, Makoto Ikeda, Tomoya Enokido, and Makoto Takizawa. "Design and Implementation of Hybrid Time (HT) Group Communication Protocol for Homogeneous Broadcast Groups." International Journal of Distributed Systems and Technologies 2, no. 3 (2011): 37–48. http://dx.doi.org/10.4018/jdst.2011070103.

Full text
Abstract:
To realize the cooperation of a group of multiple peer processes (peers), messages sent by peers must be causally delivered to every peer. In a scalable group, it is necessary to reduce the communication overhead to causally deliver messages. In this paper, the authors take advantage of the linear time (LT) and physical time (PT) protocols, as the message length is O(n) for the number n of peers. However, some pairs are unnecessarily ordered, that is, even if a pair of messages is ordered in the protocols, the messages may not be causally ordered. The greater the number of messages that are un
APA, Harvard, Vancouver, ISO, and other styles
28

Khamayseh, Yaesr, Muneer Bani Yassein, and Mai Abu-Jazoh. "Intelligent black hole detection in mobile AdHoc networks." International Journal of Electrical and Computer Engineering (IJECE) 9, no. 3 (2019): 1968. http://dx.doi.org/10.11591/ijece.v9i3.pp1968-1977.

Full text
Abstract:
&lt;div class="WordSection1"&gt;&lt;p&gt;Security is a critical and challenging issue in MANET due to its open-nature characteristics such as: mobility, wireless communications, self-organizing and dynamic topology. MANETs are commonly the target of black hole attacks. These are launched by malicious nodes that join the network to sabotage and drain it of its resources. Black hole nodes intercept exchanged data packets and simply drop them. The black hole node uses vulnerabilities in the routing protocol of MANETS to declare itself as the closest relay node to any destination. This work propos
APA, Harvard, Vancouver, ISO, and other styles
29

Yu, Tianxiang, Yang Xin, Yuexin Tao, Bingqing Hou, and Hongliang Zhu. "Network Communication Protocol Reverse Engineering Based on Auto-Encoder." Security and Communication Networks 2022 (October 6, 2022): 1–14. http://dx.doi.org/10.1155/2022/2924479.

Full text
Abstract:
Network communication protocol reverse engineering is useful for network security, including protocol fuzz testing, botnet command infiltration, and service script generation. Many models have been proposed to generate field boundary, field semantic, state machine, and some other format information from network trace and program execution for text-based protocol and hybrid protocols. However, how to extract format information from network trace data for binary-based protocol still remains a challenging issue. Existing network-trace-based models focus on text-based and hybrid protocols, using t
APA, Harvard, Vancouver, ISO, and other styles
30

Ragab, Ahmed Refaat, and Pablo Flores. "Adapting Ad-hoc Routing Protocol for Unmanned Aerial Vehicle Systems." International Journal of Data Science 2, no. 1 (2021): 1–8. http://dx.doi.org/10.18517/ijods.2.1.1-8.2021.

Full text
Abstract:
The field of the ad-hoc network and its routing protocols had attracted a lot of researchers for many years, due to the various usage of the ad-hoc networks in many fields and especially the field of Unmanned Aerial Vehicles (UAVs). Routing protocols in the ad-hoc network are the main focused problem, for their characteristics and role during the communication process of the ad-hoc networks, with its different types. In this paper, we are going to analyze and sheds the light on the performance of ad-hoc routing protocols, for both Flying ad-hoc network (FANET) and vehicle ad-hoc network (VANET
APA, Harvard, Vancouver, ISO, and other styles
31

Velliangiri, S., R. Rajagopal, and P. Karthikeyan. "Trust Factor Based Key Distribution Protocol in Hybrid Cloud Environment." Scalable Computing: Practice and Experience 20, no. 2 (2019): 349–64. http://dx.doi.org/10.12694/scpe.v20i2.1529.

Full text
Abstract:
In the Hybrid cloud deployment model, security is essential to restrict access while using resources such as virtual machine, platform, and application. Many protocols were developed to provide security via the cryptography technique, but these protocols rarely considered the trust factor which is an essential factor for cloud security. The existing Elliptic Curve Cryptography and Diffie Hellman key distribution mechanism failed to stress the trust factor, and further, they have provided not only higher complexity but also lower security and reliability. The proposed method comprised two stage
APA, Harvard, Vancouver, ISO, and other styles
32

Kaur, Jaspreet, and Amit Kumar Bindal. "Resource Aware Hybrid Energy Harvesting for Wireless Sensor Networks." Journal of Computational and Theoretical Nanoscience 16, no. 10 (2019): 4117–24. http://dx.doi.org/10.1166/jctn.2019.8490.

Full text
Abstract:
Sensors consume the resources to perform different operations, and energy of the nodes may be depleted due to excessive computational load; thus, may reduce the overall network lifespan as well as coverage area. Traditional energy harvesting schemes provides energy to the nodes in linear way but these schemes depend over a single source as well as these do not interact with the routing protocol. In this paper, a Hybrid Energy Harvester scheme for wireless sensor network is introduced which can utilize multiple energy sources for harvesting and also interact with the routing protocols to fulfil
APA, Harvard, Vancouver, ISO, and other styles
33

Selim, Ibrahim Mohsen, Naglaa Sayed Abdelrehem, Walaa M. Alayed, Hesham M. Elbadawy, and Rowayda A. Sadek. "MANET Routing Protocols’ Performance Assessment Under Dynamic Network Conditions." Applied Sciences 15, no. 6 (2025): 2891. https://doi.org/10.3390/app15062891.

Full text
Abstract:
Mobile Ad Hoc Networks (MANETs) are decentralized wireless networks characterized by dynamic topologies and the absence of fixed infrastructure. These unique features make MANETs critical for applications such as disaster recovery, military operations, and IoT systems. However, they also pose significant challenges for efficient and effective routing. This study evaluates the performance of eight MANET routing protocols: Optimized Link State Routing (OLSR), Destination-Sequenced Distance Vector (DSDV), Ad Hoc On-Demand Distance Vector (AODV), Dynamic Source Routing (DSR), Ad Hoc On-Demand Mult
APA, Harvard, Vancouver, ISO, and other styles
34

S., Prakasam, and Lavanya S. "Performance Analysis of Energy Efficient and Reliable Protocols for Intra & Inter-Cluster Communications in Wireless Sensor Networks." International Journal of Engineering and Advanced Technology (IJEAT) 9, no. 5 (2020): 216–20. https://doi.org/10.35940/ijeat.C6290.069520.

Full text
Abstract:
The discovery and the use of many wireless technologies are paving way for new remote monitoring applications. The sensing devices are becoming popular because of their flexibility, performance, low cost and portability. Wireless Sensor Networks (WSN) is a good alternative to wired systems because of easy deployment in remote areas. Wireless Sensor Networks are used in different domains for various applications because of their salient characteristics like reduced power consumption, scalability, ability to respond immediately within a short span of time, reliability, dynamic in nature, low cos
APA, Harvard, Vancouver, ISO, and other styles
35

Alam, Md Nasre, and Young-Chon Kim. "Efficient MAC Protocol for Hybrid Wireless Network with Heterogeneous Sensor Nodes." Journal of Sensors 2016 (2016): 1–16. http://dx.doi.org/10.1155/2016/7951965.

Full text
Abstract:
Although several Directional Medium Access Control (DMAC) protocols have been designed for use with homogeneous networks, it can take a substantial amount of time to change sensor nodes that are equipped with an omnidirectional antenna for sensor nodes with a directional antenna. Thus, we require a novel MAC protocol for use with an intermediate wireless network that consists of heterogeneous sensor nodes equipped with either an omnidirectional antenna or a directional antenna. The MAC protocols that have been designed for use in homogeneous networks are not suitable for use in a hybrid networ
APA, Harvard, Vancouver, ISO, and other styles
36

Han, Guangzhi, Haifeng Jiang, Liansheng Lu, Shanshan Ma, and Shuo Xiao. "Physarum-inspired multi-parameter adaptive routing protocol for coal mine hybrid wireless mesh networks." International Journal of Distributed Sensor Networks 14, no. 2 (2018): 155014771875921. http://dx.doi.org/10.1177/1550147718759217.

Full text
Abstract:
Hybrid wireless mesh networks are suitable for complex environment communication in coal mine. Mesh clients with application service and routing function in hybrid wireless mesh networks can form a highly robust hybrid network with mesh routers. The processes of nutrient flux transfer and path choice in Physarum network are similar to data transmission and routing selection in hybrid wireless mesh networks. In this article, we use Physarum-inspired autonomic optimization model to design a Physarum-inspired multi-parameter adaptive routing protocol to improve the service quality of coal mine hy
APA, Harvard, Vancouver, ISO, and other styles
37

Narula, Mr Rajneesh, and Mr Kaushal Gandhi. "Performance Analysis and Evaluation of Hybrid Network using different Integrated Routing Protocols." INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 11, no. 10 (2013): 3090–100. http://dx.doi.org/10.24297/ijct.v11i10.2978.

Full text
Abstract:
The increasing demand of computer communication networks are growing rapidly day by day. With the growing need to distribute applications across multiple networks and the availability of high capacity, high-performance intermediate switching nodes, and networks, an efficient routing mechanism has become the core requirement. This research primarily focuses on the design and performance of Hybrid Network incorporating different intra-domain routing algorithms. The performance evaluation of different routing algorithms for the transmission of video- and voice-data streams over Hybrid network is
APA, Harvard, Vancouver, ISO, and other styles
38

Praba. R, Sedhuvignesh. M, Vishal, and Sedhu. "Enhanced Hybrid Routing Protocol for Energy-Efficient Multipath Routing in Manets." International Journal of Scientific Research in Computer Science, Engineering and Information Technology 10, no. 3 (2024): 691–23. http://dx.doi.org/10.32628/cseit24103212.

Full text
Abstract:
Mobile Ad Hoc Networks (MANETs) pose challenges in managing dynamic energy consumption and optimizing network lifetime. This study proposes an improved hybrid routing protocol by integrating situation-adaptive routing and energy-efficient multipath routing strategies. We identified two promising routing protocols, FF-AOMDV and STFDR. While FF-AOMDV minimizes energy consumption, it ignores loss of power, resulting in link failures and reduced MANET lifetime. To address this, we introduce PLA-AOMDV, which efficiently manages power loss and outperforms FF-AOMDV in experimental results. However, P
APA, Harvard, Vancouver, ISO, and other styles
39

Helal, Heba, Farag Sallabi, Mohamed A. Sharaf, Saad Harous, Mohammad Hayajneh, and Heba Khater. "HCEL: Hybrid Clustering Approach for Extending WBAN Lifetime." Mathematics 12, no. 7 (2024): 1067. http://dx.doi.org/10.3390/math12071067.

Full text
Abstract:
Wireless body area networks (WBANs) have emerged as a promising solution for addressing challenges faced by elderly individuals, limited medical facilities, and various chronic medical conditions. WBANs consist of wearable sensing and computing devices interconnected through wireless communication channels, enabling the collection and transmission of vital physiological data. However, the energy constraints of the battery-powered sensor nodes in WBANs pose a significant challenge to ensuring long-term operational efficiency. Two-hop routing protocols have been suggested to extend the stability
APA, Harvard, Vancouver, ISO, and other styles
40

Tahir, Sabeen, Ghadah Abdullah Aldabbagh, Sheikh Tahir Bakhsh, and Abass Md Said. "Hybrid Congestion Sharing and Route Repairing Protocol for Bluetooth Networks." WSEAS TRANSACTIONS ON COMPUTERS 20 (April 27, 2021): 49–55. http://dx.doi.org/10.37394/23205.2021.20.6.

Full text
Abstract:
Bluetooth is a widespread wireless technology standard for limited wireless networks that permits Bluetooth devices to create a one-hop (piconet) or multi-hop (scatternet) network. During data transmission, a large number of links passing through a single master or bridge device may create congestion problems in a Bluetooth network. Therefore, routing in a multi-hop dynamic Bluetooth network, where a number of routing masters and routing bridges exist, sometimes create technical problems in a scatternet. Mobility and failure of routing devices disconnects the routing links and link reconstruct
APA, Harvard, Vancouver, ISO, and other styles
41

BONASTRE, O. M., S. NEVILLE, and C. E. PALAU. "MULTICAST CONGESTION CONTROL SRMSH APPROACH USING COMMUNICATING REAL-TIME STATE MACHINES." International Journal of Bifurcation and Chaos 20, no. 09 (2010): 2965–73. http://dx.doi.org/10.1142/s0218127410027519.

Full text
Abstract:
New real-time applications frequently involve timing constraints related to accurate services from communication protocols. Concretely, real-time communication protocols utilize timers to implement these constraints between system event occurrences. In this context, the study of congestion control for Internet reliable multicast is at present an active research field related to real-time protocols. In this paper, the authors present an innovative real-time transport protocol named Scalable Reliable Multicast Stair Hybrid (SRMSH) as new hybrid multiple layer mechanism for multicast congestion c
APA, Harvard, Vancouver, ISO, and other styles
42

Ummul Khair and Dedi Tri Laksono. "Simulasi Hybrid Relay Protocol Pada Sistem Komunikasi Kooperatif Dengan Maximum Ratio Combining." Jurnal Rekayasa Proses dan Industri Terapan 1, no. 2 (2023): 11–20. http://dx.doi.org/10.59061/repit.v1i2.176.

Full text
Abstract:
The cooperative communication system functions to eliminate the effect of fading on the wireless channel. In a cooperative communication system, there are a number of relay nodes assigned to help the source transmit information to the destination. Hybrid Relay Protocol (HRP) is a combination of cooperative communication system protocols, namely AF and DF where the relay will choose one of the protocols using hybrid relay selection (HRS). Selection of the type of relay protocol used is based on the largest SNR. In this study, a performance simulation of the HRS cooperative communication system
APA, Harvard, Vancouver, ISO, and other styles
43

Tyshсhenko, D., T. Franchuk, R. Zakharov, and V. Moskalenko. "SUPPORTING DYNAMIC SECURITY NEEDS WITH VPN TOOLS." Системи управління, навігації та зв’язку. Збірник наукових праць 3, no. 77 (2024): 149–52. http://dx.doi.org/10.26906/sunz.2024.3.149.

Full text
Abstract:
The article examines the problems of supporting the dynamic security needs of a hybrid environment. It was determined that an important aspect of remote work is the training of employees on common cyber security threats. Threat types such as phishing attacks, social engineering, and malware are explored. The components of information technology security in a hybrid working environment are defined. The levels of protection of corporate information were studied. VPN features are analyzed. Security procedures for using VPN, which creates opportunities to reduce the risks of hacking a remote work
APA, Harvard, Vancouver, ISO, and other styles
44

Binti Dona, Sufiana, Dewa Made Wiharta, and Ngurah Indra ER. "ANALISIS KINERJA PROTOKOL ROUTING DINAMIS IS-IS UNTUK MENINGKATKAN PERFORMANSI JARINGAN HYBRID KAMPUS UNUD DENPASAR." Jurnal SPEKTRUM 10, no. 4 (2023): 348. http://dx.doi.org/10.24843/spektrum.2023.v10.i04.p40.

Full text
Abstract:
As a center for Information and Communication Technology services, the Global Distance Learning Network (GDLN) of Udayana University must reconsider the implementation of static routing protocols that have been applied to meet the increasing demands of computer networks. Dynamic routing protocols, such as Intermediate System to Intermediate System (IS-IS), can be used to address the challenges currently faced with static routing, and serve as a more viable option for larger network requirements. This research evaluates the implementation of static routing protocols and IS-IS at the UNUD Denpas
APA, Harvard, Vancouver, ISO, and other styles
45

Salkica, Nusret, Amela Begić, Adnan Beganović, et al. "Optimisation of the bone single photon emission computed tomography in oncology patients." Journal of Health Sciences 13, no. 3 (Suplement 1) (2024): 209–12. http://dx.doi.org/10.17532/jhs.2023.2596.

Full text
Abstract:
Introduction: The introduction of hybrid imaging systems such as Single Photon Emission Computed Tomography/Computed Tomography (SPECT/CT) has completely changed the scanning procedure of conventional diagnostic nuclear medicine protocols. Modern bone scintigraphy protocols include SUV quanitification and Whole Body (WB) SPECT/CT scanning modality. The major limitation of these new technologies is relatively long scanning time. New detector systems with modern reconstruction softwares have been developed for fast scanning SPECT protocolos. These new technologies can produce images of reduced a
APA, Harvard, Vancouver, ISO, and other styles
46

Jain, Neha, Ashish Payal, and Aarti Jain. "Effect of data packet size on the performance of RIP and OSPF routing protocols in hybrid networks." International Journal of Pervasive Computing and Communications 17, no. 4 (2021): 361–76. http://dx.doi.org/10.1108/ijpcc-02-2021-0036.

Full text
Abstract:
Purpose The purpose of this study is to calculate the effect of different packet sizes 256, 512, 1,024 and 2,048 bytes on a large-scale hybrid network and analysis and identifies which routing protocol is best for application throughput, application delay and network link parameters for different packet sizes. As the routing protocol is used to select the optimal path to transfer data packets from source to destination. It is always important to consider the performance of the routing protocol before the final network configuration. From the literature, it has been observed that RIP (Routing I
APA, Harvard, Vancouver, ISO, and other styles
47

AbdElminaam, DiaaSalama, Hatem M. Abdul Kader, Mohie M. Hadhoud, and Salah M. El-Sayed. "Developing and Evaluation of New Hybrid Encryption Algorithms." INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 13, no. 1 (2014): 4038–52. http://dx.doi.org/10.24297/ijct.v13i1.2926.

Full text
Abstract:
Wireless Sensor networks consist of hundreds or thousands of low cost, low power and self-organizing nodes which are highly distributed. As wireless sensor networks continue to grow, so does the need for effective security mechanisms because sensor networks may interact with sensitive data. Encryption algorithms play good roles in information security systems (ISS). Those algorithms consume a significant amount of computing resources such as battery power. Wireless Sensor networks are powered by a battery which is a very limited resource. At present, various types of cryptographic algorithms p
APA, Harvard, Vancouver, ISO, and other styles
48

Mahdi, Miaad Husam, and Ibrahim Adel Ibrahim. "Routing protocols for hybrid wireless networks: a brief review." Indonesian Journal of Electrical Engineering and Computer Science 27, no. 2 (2022): 842–48. https://doi.org/10.11591/ijeecs.v27.i2.pp842-848.

Full text
Abstract:
Hybrid wireless networks (HWNs) are resulted from the integration of a mobile Ad hoc networks (MANET) and an infrastructure wireless networks. These networks have received increasing interest from researchers for their superior performance and reliability. Packet routing protocols in hybrid wireless networks are important to increase the capacity and scalability of these networks, therefore, several routing protocols have been proposed. Routing protocols in HWNs are designed and implemented from combining the cellular transmission mode with the Ad hoc transmission mode. To route a message to t
APA, Harvard, Vancouver, ISO, and other styles
49

Donganont, Mana, Siriwan Intawichai, and Saranya Phongchan. "Finite-Time Scaled Consensus in Hybrid Multi-Agent Systems via Conjugate Gradient Methods." European Journal of Pure and Applied Mathematics 18, no. 2 (2025): 6163. https://doi.org/10.29020/nybg.ejpam.v18i2.6163.

Full text
Abstract:
This paper addresses the finite-time scaled consensus problem for hybrid multi-agent systems (HMASs) comprising both continuous-time and discrete-time agents. Motivated by the limitations of traditional consensus models that neglect scaling effects and hybrid dynamics, we propose a unified control framework under two sampling-based protocols. By modeling the system as a directed communication graph and formulating the consensus condition as a linear system, we employ the conjugate gradient method (CGM) to achieve exact convergence within at most \(N\) steps, where \(N\) is the number of agents
APA, Harvard, Vancouver, ISO, and other styles
50

Sultan, Mohamad T., Khaled N. Yasen, and Ali Q. Saeed. "Simulation-based Evaluation of Mobile Ad Hoc Network Routing Protocols: Ad hoc On-Demand Distance Vector, Fisheye State Routing, and Zone Routing Protocol." Cihan University-Erbil Scientific Journal 3, no. 2 (2019): 64–69. http://dx.doi.org/10.24086/cuesj.v3n2y2019.pp64-69.

Full text
Abstract:
Mobile ad hoc network (MANET) is an infrastructure-less and decentralized network without any physical connections. Nodes are mobile, free to move, and independent of each other which makes routing a difficult task. Hence, a dynamic routing protocol is needed to make MANET reliable and function properly. Several routing protocols have been proposed with different working mechanisms and performance levels. Therefore, the performance study of those protocols is needed. This paper evaluates the performance of MANET routing protocols using simulation based experiments to observe the behavior of th
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!