Journal articles on the topic 'Mobile adhoc networks'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Mobile adhoc networks.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Ganpat Joshi, Gurpreet Singh,. "A Novel Statistical Adhoc On-Demand Distance Vector Routing Protocol Technique is using for Preventing the Mobile Adhoc Network from Flooding Attack." Turkish Journal of Computer and Mathematics Education (TURCOMAT) 12, no. 6 (April 5, 2021): 1753–65. http://dx.doi.org/10.17762/turcomat.v12i6.3779.
Full textZemrane, Hamza, Youssef Baddi, and Abderrahim Hasbi. "Mobile Ad Hoc Network Routing Protocols for Intelligent Transportation Systems." International Journal of Smart Security Technologies 8, no. 1 (January 2021): 35–48. http://dx.doi.org/10.4018/ijsst.2021010103.
Full textKumawat, Madhur. "Attacks in Mobile Adhoc-Networks." International Journal for Research in Applied Science and Engineering Technology 6, no. 4 (April 30, 2018): 2768–71. http://dx.doi.org/10.22214/ijraset.2018.4463.
Full textSaxena, Deepak. "SECURITY IN MOBILE ADHOC NETWORKS." Globus An International Journal of Management & IT 11, no. 1 (February 15, 2020): 53. http://dx.doi.org/10.46360/globus.120192010.
Full textM, Thebiga, and Suji R. Pramila. "Reliable and Hybridized Trust Based Algorithm to Thwart Blackhole Attacks in MANETs using Network Preponderant Determinants." International Journal of Interactive Mobile Technologies (iJIM) 14, no. 19 (November 24, 2020): 42. http://dx.doi.org/10.3991/ijim.v14i19.16391.
Full textChauhan, Naveen, Lalit K. Awasthi, and Narottam Chand. "Cache Replacement in Mobile Adhoc Networks." International Journal of Distributed Systems and Technologies 3, no. 2 (April 2012): 22–38. http://dx.doi.org/10.4018/jdst.2012040102.
Full textKumar. "GROUP MANAGEMENT IN MOBILE ADHOC NETWORKS." American Journal of Applied Sciences 11, no. 7 (July 1, 2014): 1059–64. http://dx.doi.org/10.3844/ajassp.2014.1059.1064.
Full textK.C.Maheswari, P. B. Selvapriya,. "Performance Issues in Mobile Adhoc Networks." International Journal of Innovative Research in Computer and Communication Engineering 03, no. 02 (February 28, 2015): 1033–38. http://dx.doi.org/10.15680/ijircce.2015.0302045.
Full textBhatt, Dharmesh, and Bijendra Agrawal. "Major challenges of Mobile Adhoc Networks." Oriental journal of computer science and technology 10, no. 2 (June 18, 2017): 417–21. http://dx.doi.org/10.13005/ojcst/10.02.23.
Full textVeena, Veena, Tanushree Aggarwal, and Nisha Charaya. "Efficient Zone based Multicast RoutingProtocol for Mobile Adhoc Networks." International Journal of Scientific Research 3, no. 7 (June 1, 2012): 161–64. http://dx.doi.org/10.15373/22778179/july2014/52.
Full textThebiga, M., and R. Suji Pramila. "Queue Based Energy Efficient Routing with Dynamic Resource Allocation in Mobile Adhoc Networks." International Journal of Engineering & Technology 7, no. 3.6 (July 4, 2018): 343. http://dx.doi.org/10.14419/ijet.v7i3.6.15129.
Full textGautam, Divya. "SECURING MOBILE ADHOC NETWORKS AND CLOUD ENVIRONMENT." International Journal of Engineering Technologies and Management Research 5, no. 2 (April 27, 2020): 84–89. http://dx.doi.org/10.29121/ijetmr.v5.i2.2018.617.
Full textDivakara, Madhurya Kodialbail, and A. R. Abdul Rajak. "Throughput analysis in mobile adhoc network: a literature survey." MATEC Web of Conferences 167 (2018): 01004. http://dx.doi.org/10.1051/matecconf/201816701004.
Full textM., Anugraha, and Dr Krishnaveni S.H. "In Mobile Adhoc Networks, a Trustworithness of Data Transmission Using HTCMR." Webology 19, no. 1 (January 20, 2022): 2152–63. http://dx.doi.org/10.14704/web/v19i1/web19145.
Full textM, Thebiga, and Suji Pramila. "A Survey on Assorted Subsisting Approaches to Recognize and Preclude Black Hole Attacks in Mobile Adhoc Networks." International Journal of Interactive Mobile Technologies (iJIM) 14, no. 01 (January 20, 2020): 96. http://dx.doi.org/10.3991/ijim.v14i01.11329.
Full textjatha, B. Su. "Independent Robust Mesh for Mobile Adhoc Networks." International Journal of Innovative Research in Science, Engineering and Technology 4, no. 11 (November 15, 2015): 10998–1003. http://dx.doi.org/10.15680/ijirset.2015.0411145.
Full textRavi, Y., V. VenkataRamana, M. V. Rathnamma, and P. Chenna Reddy. "Position based Routing in Mobile Adhoc Networks." International Journal of Computer Applications 55, no. 5 (October 20, 2012): 12–16. http://dx.doi.org/10.5120/8750-2638.
Full textSundarraj, P. Daniel. "SECURED DATA TRANSMISSION IN MOBILE ADHOC NETWORKS." International Journal of Advanced Research in Computer Science 8, no. 9 (September 30, 2017): 422–24. http://dx.doi.org/10.26483/ijarcs.v8i9.5100.
Full textHoque, E., R. Potharaju, C. Nita-Rotaru, S. Sarkar, and S. S. Venkatesh. "Taming epidemic outbreaks in mobile adhoc networks." Ad Hoc Networks 24 (January 2015): 57–72. http://dx.doi.org/10.1016/j.adhoc.2014.07.031.
Full textMurugan, S., and Dr M. Jeyakarthic. "Optimal Deep Neural Network based Classification Model for Intrusion Detection in Mobile Adhoc Networks." Journal of Advanced Research in Dynamical and Control Systems 11, no. 10-SPECIAL ISSUE (October 31, 2019): 1374–87. http://dx.doi.org/10.5373/jardcs/v11sp10/20192983.
Full textPatel, Deepak Kumar, and Rakesh Kumar. "A Review Of Internet Gateway Discovery Approaches For Mobile Adhoc Networks." INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 4, no. 2 (October 30, 2005): 495–508. http://dx.doi.org/10.24297/ijct.v4i2b2.3315.
Full textVeepin Kumar and Sanjay Singla. "A Performance Analysis of MANET Routing Protocols." international journal of engineering technology and management sciences 6, no. 6 (November 28, 2022): 173–80. http://dx.doi.org/10.46647/ijetms.2022.v06i06.027.
Full textP, Bharathisindhu, and Dr S.SelvaBrunda. "Probability Model for Intrusion Detection System in Mobile Adhoc Network." International Journal of Engineering & Technology 7, no. 2.20 (April 18, 2018): 302. http://dx.doi.org/10.14419/ijet.v7i2.20.16722.
Full textThebiga, M., and R. Suji Pramila. "A Survey to Monitor and Defend Against Blackhole Attacks in Mobile Adhoc Networks." International Journal of Engineering & Technology 7, no. 3.6 (July 4, 2018): 337. http://dx.doi.org/10.14419/ijet.v7i3.6.15127.
Full textDurachman, Yusuf. "Analysis of Learning Techniques for Performance Prediction in Mobile Adhoc Networks." International Innovative Research Journal of Engineering and Technology 6, no. 2 (December 30, 2020): IS—46—IS—53. http://dx.doi.org/10.32595/iirjet.org/v6i2.2020.141.
Full textVenkatasubramanian, S., and N. P. Gopalan. "A QoS-Based Robust Multipath Routing Protocol for Mobile Adhoc Networks." International Journal of Engineering and Technology 1, no. 5 (2009): 391–96. http://dx.doi.org/10.7763/ijet.2009.v1.74.
Full textTheerthagiri, Prasanna Venkatesan. "Imposing Packet Relaying for Mobile Adhoc Networks Using Genetic Algorithm." International Journal of Sensors, Wireless Communications and Control 10, no. 4 (December 18, 2020): 617–24. http://dx.doi.org/10.2174/2210327910666200320090234.
Full textVELU, CM, and P. Venkateswara Rao. "Transmission of secure data in Mobile Adhoc Networks." International Journal of Smart Device and Appliance 4, no. 1 (June 30, 2016): 9–14. http://dx.doi.org/10.21742/ijsda.2016.4.1.02.
Full textDave, Viranchee, and H. B. Bhadka. "Location Aware Routing Schemes for Mobile Adhoc Networks." International Journal of Computer Sciences and Engineering 7, no. 3 (March 31, 2019): 1012–14. http://dx.doi.org/10.26438/ijcse/v7i3.10121014.
Full textSikamani, K. Thirunadana, and N. Kirubananda Sarathy. "Study For Congestion Control in Mobile Adhoc Networks." International Journal of MC Square Scientific Research 2, no. 1 (July 15, 2010): 41–49. http://dx.doi.org/10.20894/ijmsr.117.002.001.006.
Full textRuxanayasmin, B., B. Ananda Krishna, and T. Subhashini. "Minimization of Power Consumption in Mobile Adhoc Networks." International Journal of Computer Network and Information Security 6, no. 2 (January 8, 2014): 38–44. http://dx.doi.org/10.5815/ijcnis.2014.02.06.
Full textShobha.K.R and K. Rajanikanth. "Adaptive AODV Routing Protocol for Mobile ADHOC Networks." International Journal of Ad hoc, Sensor & Ubiquitous Computing 2, no. 1 (March 24, 2011): 125–37. http://dx.doi.org/10.5121/ijasuc.2011.2111.
Full textHaboub, Rachid. "Secure And Reliable Routing In Mobile Adhoc Networks." International Journal of Computer Science & Engineering Survey 3, no. 1 (February 29, 2012): 53–64. http://dx.doi.org/10.5121/ijcses.2012.3105.
Full textSingh, Gurpreet, Amanpreet Kaur, Aashdeep Singh, and Rohan Gupta. "Ant Based Zonal Routing in Mobile Adhoc Networks." International Journal of Engineering & Technology 7, no. 3.1 (August 4, 2018): 46. http://dx.doi.org/10.14419/ijet.v7i3.1.16795.
Full textKhamayseh, Yaesr, Muneer Bani Yassein, and Mai Abu-Jazoh. "Intelligent black hole detection in mobile AdHoc networks." International Journal of Electrical and Computer Engineering (IJECE) 9, no. 3 (June 1, 2019): 1968. http://dx.doi.org/10.11591/ijece.v9i3.pp1968-1977.
Full textChinthireddy, Ms Rasagna, and Dr S. Arvind. "Robust Intrusion Detection Mechanism for Mobile Adhoc Networks." International Journal of Computer Trends and Technology 14, no. 3 (August 25, 2014): 135–40. http://dx.doi.org/10.14445/22312803/ijctt-v14p129.
Full textChinthireddy, Ms Rasagna, and Mr S. Aravind. "Robust Intrusion Detection Mechanism for Mobile Adhoc Networks." International Journal of Engineering Trends and Technology 14, no. 4 (August 25, 2014): 202–7. http://dx.doi.org/10.14445/22315381/ijett-v14p240.
Full textdevi, S. jyothsna, and G. pram eswar. "A New Rebroadcast Protocol for Mobile Adhoc Networks." International Journal of Engineering Trends and Technology 28, no. 9 (October 25, 2015): 473–79. http://dx.doi.org/10.14445/22315381/ijett-v28p290.
Full textMoses, G. Jose, P. Suresh Varma, N. Supriya, and G. NagaSatish. "Security Aspects and Challenges in Mobile Adhoc Networks." International Journal of Computer Network and Information Security 4, no. 6 (June 26, 2012): 26–32. http://dx.doi.org/10.5815/ijcnis.2012.06.04.
Full textSingh, Sugandha. "Cache Strategy for Internet based Mobile Adhoc Networks." Advances in Science, Technology and Engineering Systems Journal 8, no. 3 (May 2023): 63–68. http://dx.doi.org/10.25046/aj080308.
Full textM, Duraipandian. "PERFORMANCE EVALUATION OF ROUTING ALGORITHM FOR MANET BASED ON THE MACHINE LEARNING TECHNIQUES." Journal of Trends in Computer Science and Smart Technology 01, no. 01 (September 12, 2019): 25–38. http://dx.doi.org/10.36548/jtcsst.2019.1.003.
Full textSuguna, A. B., and B. S. Thabasukannan. "Analytical Framework for Path Reliability and Load Balancing in Mobile Adhoc Networks." Bonfring International Journal of Research in Communication Engineering 5, no. 1 (February 28, 2015): 01–06. http://dx.doi.org/10.9756/bijrce.7005.
Full textBabu, Erukala Suresh, C. Nagaraju, and M. H. M. Krishna Prasad. "IPHDBCM." International Journal of Information Security and Privacy 10, no. 3 (July 2016): 42–66. http://dx.doi.org/10.4018/ijisp.2016070104.
Full textKrishna Karne, Radha, Dudimetla Prasad, Uzma Naseem, Ashok Battula, and Karthik Kumar Vaigandla. "GENETIC ALGORITHM FOR WIRELESS SENSOR NETWORKS." International Journal of Engineering Applied Sciences and Technology 6, no. 8 (December 1, 2021): 97–103. http://dx.doi.org/10.33564/ijeast.2021.v06i08.018.
Full textFelemban, Emad, Adil A. Sheikh, and Atif Naseer. "Improving Response Time for Crowd Management in Hajj." Computers 10, no. 4 (April 6, 2021): 46. http://dx.doi.org/10.3390/computers10040046.
Full textMano, Reji, P. C. Kishore Raja, Christeena Joseph, and Radhika Baskar. "Hardware Implementation of Intrusion Detection System for Ad-Hoc Network." International Journal of Reconfigurable and Embedded Systems (IJRES) 5, no. 3 (November 1, 2016): 158. http://dx.doi.org/10.11591/ijres.v5.i3.pp158-164.
Full textSadiq, Muhammad, Abdul Majid, Amir Naveed, Muhammad Arif, Muhammad Asif, and Amjad Ullah Khattak. "Effects of Nodes Mobility on the Energy Consumption of Routing Protocols (AODV, DSDV) in Adhoc Networks." Pakistan Journal of Scientific & Industrial Research Series A: Physical Sciences 65, no. 1 (February 22, 2022): 74–79. http://dx.doi.org/10.52763/pjsir.phys.sci.65.1.2022.74.79.
Full textDeepa, S., Kamal Raj S, and Sridhar K.P. "Development of mobile adhoc network using leader Selection algorithm." International Journal of Engineering & Technology 7, no. 2.9 (April 10, 2018): 6. http://dx.doi.org/10.14419/ijet.v7i2.9.9929.
Full textThakur, Priyanka, and Sukhpreet Kaur. "Optimized Routing Protocols- Enhancement in Mobile Adhoc Network." CGC International Journal of Contemporary Technology and Research 4, no. 1 (December 30, 2021): 253–60. http://dx.doi.org/10.46860/cgcijctr.2021.12.31.253.
Full textMuruganandam, D., and J. Martin Leo Manickam. "Detection and Countermeasure of Packet Misrouting in Wireless Adhoc Networks." Sensor Letters 17, no. 9 (September 1, 2019): 696–700. http://dx.doi.org/10.1166/sl.2019.4127.
Full text