Journal articles on the topic 'Mobile Adhoc Network's'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Mobile Adhoc Network's.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Veepin Kumar and Sanjay Singla. "A Performance Analysis of MANET Routing Protocols." international journal of engineering technology and management sciences 6, no. 6 (2022): 173–80. http://dx.doi.org/10.46647/ijetms.2022.v06i06.027.
Full textSrikanth G. K. "Analysis of Mobile ADHOC Network's Unipath and Multipath Routing Protocols." Journal of Electrical Systems 20, no. 4s (2024): 2388–96. http://dx.doi.org/10.52783/jes.2444.
Full textM., Anugraha, and Dr Krishnaveni S.H. "In Mobile Adhoc Networks, a Trustworithness of Data Transmission Using HTCMR." Webology 19, no. 1 (2022): 2152–63. http://dx.doi.org/10.14704/web/v19i1/web19145.
Full textAnandakrishnan, N., and Neena Roshini. "A STUDY ON GEOGRAPHICAL ROUTING WITH ADAPTIVE POSITION UPDATE." International Journal of Engineering Technologies and Management Research 5, no. 3 (2020): 108–15. http://dx.doi.org/10.29121/ijetmr.v5.i3.2018.181.
Full textDavinder Singh and Dr. Mohit Gupta. "An Analysis of Routing Protocol in Mobile Adhoc Networks and its Applications." Journal of Advances and Scholarly Researches in Allied Education 21, no. 1 (2024): 87–91. http://dx.doi.org/10.29070/6fshs522.
Full textGanpat Joshi, Gurpreet Singh,. "A Novel Statistical Adhoc On-Demand Distance Vector Routing Protocol Technique is using for Preventing the Mobile Adhoc Network from Flooding Attack." Turkish Journal of Computer and Mathematics Education (TURCOMAT) 12, no. 6 (2021): 1753–65. http://dx.doi.org/10.17762/turcomat.v12i6.3779.
Full textMurugan, S., and Dr M. Jeyakarthic. "Optimal Deep Neural Network based Classification Model for Intrusion Detection in Mobile Adhoc Networks." Journal of Advanced Research in Dynamical and Control Systems 11, no. 10-SPECIAL ISSUE (2019): 1374–87. http://dx.doi.org/10.5373/jardcs/v11sp10/20192983.
Full textVeena, Veena, Tanushree Aggarwal, and Nisha Charaya. "Efficient Zone based Multicast RoutingProtocol for Mobile Adhoc Networks." International Journal of Scientific Research 3, no. 7 (2012): 161–64. http://dx.doi.org/10.15373/22778179/july2014/52.
Full textZemrane, Hamza, Youssef Baddi, and Abderrahim Hasbi. "Mobile Ad Hoc Network Routing Protocols for Intelligent Transportation Systems." International Journal of Smart Security Technologies 8, no. 1 (2021): 35–48. http://dx.doi.org/10.4018/ijsst.2021010103.
Full textKumawat, Madhur. "Attacks in Mobile Adhoc-Networks." International Journal for Research in Applied Science and Engineering Technology 6, no. 4 (2018): 2768–71. http://dx.doi.org/10.22214/ijraset.2018.4463.
Full textSaxena, Deepak. "SECURITY IN MOBILE ADHOC NETWORKS." Globus An International Journal of Management & IT 11, no. 1 (2020): 53. http://dx.doi.org/10.46360/globus.120192010.
Full textManpreet, Kaur, Rajni, and Singh Parminder. "An Encryption Algorithm to Evaluate Performance of V2V Communication in Vanet." International Journal on Cryptography and Information Security (IJCIS) 3, no. 2 (2020): 15–22. https://doi.org/10.5281/zenodo.4005540.
Full textM, Thebiga, and Suji R. Pramila. "Reliable and Hybridized Trust Based Algorithm to Thwart Blackhole Attacks in MANETs using Network Preponderant Determinants." International Journal of Interactive Mobile Technologies (iJIM) 14, no. 19 (2020): 42. http://dx.doi.org/10.3991/ijim.v14i19.16391.
Full textVenkatasubramanian, S., and N. P. Gopalan. "A QoS-Based Robust Multipath Routing Protocol for Mobile Adhoc Networks." International Journal of Engineering and Technology 1, no. 5 (2009): 391–96. http://dx.doi.org/10.7763/ijet.2009.v1.74.
Full textChauhan, Naveen, Lalit K. Awasthi, and Narottam Chand. "Cache Replacement in Mobile Adhoc Networks." International Journal of Distributed Systems and Technologies 3, no. 2 (2012): 22–38. http://dx.doi.org/10.4018/jdst.2012040102.
Full textKumar. "GROUP MANAGEMENT IN MOBILE ADHOC NETWORKS." American Journal of Applied Sciences 11, no. 7 (2014): 1059–64. http://dx.doi.org/10.3844/ajassp.2014.1059.1064.
Full textK.C.Maheswari, P. B. Selvapriya,. "Performance Issues in Mobile Adhoc Networks." International Journal of Innovative Research in Computer and Communication Engineering 03, no. 02 (2015): 1033–38. http://dx.doi.org/10.15680/ijircce.2015.0302045.
Full textBhatt, Dharmesh, and Bijendra Agrawal. "Major challenges of Mobile Adhoc Networks." Oriental journal of computer science and technology 10, no. 2 (2017): 417–21. http://dx.doi.org/10.13005/ojcst/10.02.23.
Full textDr., M. Pushpavalli, and Janani G. "A Survey: Trust Based Task Assignment in Service Oriented ADHOC Networks with Energy Efficient Optimization." Journal of Control System and Control Instrumentation 1, no. 1 (2019): 1–8. https://doi.org/10.5281/zenodo.2575420.
Full textDivya, gautam. "SECURING MOBILE ADHOC NETWORKS AND CLOUD ENVIRONMENT." INTERNATIONAL JOURNAL OF ENGINEERING TECHNOLOGIES AND MANAGEMENT RESEARCH 5, no. 2 :SE (2018): 84–89. https://doi.org/10.5281/zenodo.1197527.
Full textDr.S.Brilly, Sangeetha. "CHALLENGES FACING ADHOC NETWORKS Vs ROUTING." International Journal of Advances in Engineering & Scientific Research 2, no. 9 (2024): 43–65. https://doi.org/10.5281/zenodo.10746325.
Full textSuguna, A. B., and B. S. Thabasukannan. "Analytical Framework for Path Reliability and Load Balancing in Mobile Adhoc Networks." Bonfring International Journal of Research in Communication Engineering 5, no. 1 (2015): 01–06. http://dx.doi.org/10.9756/bijrce.7005.
Full textThebiga, M., and R. Suji Pramila. "Queue Based Energy Efficient Routing with Dynamic Resource Allocation in Mobile Adhoc Networks." International Journal of Engineering & Technology 7, no. 3.6 (2018): 343. http://dx.doi.org/10.14419/ijet.v7i3.6.15129.
Full textGautam, Divya. "SECURING MOBILE ADHOC NETWORKS AND CLOUD ENVIRONMENT." International Journal of Engineering Technologies and Management Research 5, no. 2 (2020): 84–89. http://dx.doi.org/10.29121/ijetmr.v5.i2.2018.617.
Full textjatha, B. Su. "Independent Robust Mesh for Mobile Adhoc Networks." International Journal of Innovative Research in Science, Engineering and Technology 4, no. 11 (2015): 10998–1003. http://dx.doi.org/10.15680/ijirset.2015.0411145.
Full textRavi, Y., V. VenkataRamana, M. V. Rathnamma, and P. Chenna Reddy. "Position based Routing in Mobile Adhoc Networks." International Journal of Computer Applications 55, no. 5 (2012): 12–16. http://dx.doi.org/10.5120/8750-2638.
Full textSundarraj, P. Daniel. "SECURED DATA TRANSMISSION IN MOBILE ADHOC NETWORKS." International Journal of Advanced Research in Computer Science 8, no. 9 (2017): 422–24. http://dx.doi.org/10.26483/ijarcs.v8i9.5100.
Full textHoque, E., R. Potharaju, C. Nita-Rotaru, S. Sarkar, and S. S. Venkatesh. "Taming epidemic outbreaks in mobile adhoc networks." Ad Hoc Networks 24 (January 2015): 57–72. http://dx.doi.org/10.1016/j.adhoc.2014.07.031.
Full textDivakara, Madhurya Kodialbail, and A. R. Abdul Rajak. "Throughput analysis in mobile adhoc network: a literature survey." MATEC Web of Conferences 167 (2018): 01004. http://dx.doi.org/10.1051/matecconf/201816701004.
Full textM.S, Brindha. "A Survey on Cross Layer Distributed Topology Control in Mobile Adhoc Network." Bonfring International Journal of Networking Technologies and Applications 04, no. 01 (2017): 01–03. http://dx.doi.org/10.9756/bijnta.8346.
Full textM, Thebiga, and Suji Pramila. "A Survey on Assorted Subsisting Approaches to Recognize and Preclude Black Hole Attacks in Mobile Adhoc Networks." International Journal of Interactive Mobile Technologies (iJIM) 14, no. 01 (2020): 96. http://dx.doi.org/10.3991/ijim.v14i01.11329.
Full textDr., Opinder Singh. "A NOVEL MECHANISM FOR DETECTING DENIAL OF SERVICE ATTACKS IN MOBILE ADHOC NETWORKS." GLOBAL JOURNAL OF ENGINEERING SCIENCE AND RESEARCHES 6, no. 1 (2019): 50–56. https://doi.org/10.5281/zenodo.2537886.
Full textVELU, CM, and P. Venkateswara Rao. "Transmission of secure data in Mobile Adhoc Networks." International Journal of Smart Device and Appliance 4, no. 1 (2016): 9–14. http://dx.doi.org/10.21742/ijsda.2016.4.1.02.
Full textDave, Viranchee, and H. B. Bhadka. "Location Aware Routing Schemes for Mobile Adhoc Networks." International Journal of Computer Sciences and Engineering 7, no. 3 (2019): 1012–14. http://dx.doi.org/10.26438/ijcse/v7i3.10121014.
Full textSikamani, K. Thirunadana, and N. Kirubananda Sarathy. "Study For Congestion Control in Mobile Adhoc Networks." International Journal of MC Square Scientific Research 2, no. 1 (2010): 41–49. http://dx.doi.org/10.20894/ijmsr.117.002.001.006.
Full textRuxanayasmin, B., B. Ananda Krishna, and T. Subhashini. "Minimization of Power Consumption in Mobile Adhoc Networks." International Journal of Computer Network and Information Security 6, no. 2 (2014): 38–44. http://dx.doi.org/10.5815/ijcnis.2014.02.06.
Full textShobha.K.R and K. Rajanikanth. "Adaptive AODV Routing Protocol for Mobile ADHOC Networks." International Journal of Ad hoc, Sensor & Ubiquitous Computing 2, no. 1 (2011): 125–37. http://dx.doi.org/10.5121/ijasuc.2011.2111.
Full textHaboub, Rachid. "Secure And Reliable Routing In Mobile Adhoc Networks." International Journal of Computer Science & Engineering Survey 3, no. 1 (2012): 53–64. http://dx.doi.org/10.5121/ijcses.2012.3105.
Full textSingh, Gurpreet, Amanpreet Kaur, Aashdeep Singh, and Rohan Gupta. "Ant Based Zonal Routing in Mobile Adhoc Networks." International Journal of Engineering & Technology 7, no. 3.1 (2018): 46. http://dx.doi.org/10.14419/ijet.v7i3.1.16795.
Full textKhamayseh, Yaesr, Muneer Bani Yassein, and Mai Abu-Jazoh. "Intelligent black hole detection in mobile AdHoc networks." International Journal of Electrical and Computer Engineering (IJECE) 9, no. 3 (2019): 1968. http://dx.doi.org/10.11591/ijece.v9i3.pp1968-1977.
Full textChinthireddy, Ms Rasagna, and Dr S. Arvind. "Robust Intrusion Detection Mechanism for Mobile Adhoc Networks." International Journal of Computer Trends and Technology 14, no. 3 (2014): 135–40. http://dx.doi.org/10.14445/22312803/ijctt-v14p129.
Full textChinthireddy, Ms Rasagna, and Mr S. Aravind. "Robust Intrusion Detection Mechanism for Mobile Adhoc Networks." International Journal of Engineering Trends and Technology 14, no. 4 (2014): 202–7. http://dx.doi.org/10.14445/22315381/ijett-v14p240.
Full textdevi, S. jyothsna, and G. pram eswar. "A New Rebroadcast Protocol for Mobile Adhoc Networks." International Journal of Engineering Trends and Technology 28, no. 9 (2015): 473–79. http://dx.doi.org/10.14445/22315381/ijett-v28p290.
Full textMoses, G. Jose, P. Suresh Varma, N. Supriya, and G. NagaSatish. "Security Aspects and Challenges in Mobile Adhoc Networks." International Journal of Computer Network and Information Security 4, no. 6 (2012): 26–32. http://dx.doi.org/10.5815/ijcnis.2012.06.04.
Full textSingh, Sugandha. "Cache Strategy for Internet based Mobile Adhoc Networks." Advances in Science, Technology and Engineering Systems Journal 8, no. 3 (2023): 63–68. http://dx.doi.org/10.25046/aj080308.
Full textYaser, Khamayseh, Bani Yassein Muneer, and Abu-Jazoh Mai. "Intelligent black hole detection in mobile AdHoc networks." International Journal of Electrical and Computer Engineering (IJECE) 9, no. 3 (2019): 1968–77. https://doi.org/10.11591/ijece.v9i3.pp1968-1977.
Full textThakur, Priyanka, and Sukhpreet Kaur. "Optimized Routing Protocols- Enhancement in Mobile Adhoc Network." CGC International Journal of Contemporary Technology and Research 4, no. 1 (2021): 253–60. http://dx.doi.org/10.46860/cgcijctr.2021.12.31.253.
Full textK., Mani, and Prasath Sivasubramanian S. "Trust Based Secure Routing Mechanism in Mobile Adhoc Networks for Enhancing the Routing Performances." International Journal of Engineering and Advanced Technology (IJEAT) 9, no. 3 (2020): 1921–27. https://doi.org/10.35940/ijeat.C5492.029320.
Full textThebiga, M., and R. Suji Pramila. "A Survey to Monitor and Defend Against Blackhole Attacks in Mobile Adhoc Networks." International Journal of Engineering & Technology 7, no. 3.6 (2018): 337. http://dx.doi.org/10.14419/ijet.v7i3.6.15127.
Full textBapu, Tapas, Anitha R, Soundararajan S, Nagaraju V, Partheeban Nagappan, and Daniel A. "GAMAN – Genetic Algorithm in Mobile Adhoc Networks for Creating Systematic QoS." ECS Transactions 107, no. 1 (2022): 3599–607. http://dx.doi.org/10.1149/10701.3599ecst.
Full text