To see the other types of publications on this topic, follow the link: MobileAd-hoc network.

Journal articles on the topic 'MobileAd-hoc network'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 19 journal articles for your research on the topic 'MobileAd-hoc network.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Yamini, K. Anish Pon, Suthendran Kannan, and Arivoli Thangadurai. "Handling Selfishness over Collaborative Mechanism in a MobileAd hoc Network." Journal of Cyber Security and Mobility 7, no. 1 (2018): 39–52. http://dx.doi.org/10.13052/jcsm2245-1439.714.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Gupta, Bhavana, Vikas Jian, and Rajesh Tiwari. "Black hole Attack Detection in AODV-BTR MANET." INTERNATIONAL JOURNAL OF MANAGEMENT & INFORMATION TECHNOLOGY 10, no. 10 (2015): 2570–79. http://dx.doi.org/10.24297/ijmit.v10i10.5134.

Full text
Abstract:
Security is a vital requirement in mobile ad hoc networks to provide secured communication among mobile nodes. Due to different characteristics of MANETS, it creates a number of consequential challenges to its security design. To overcome the challenges, there is a need to build a powerful security solution that achieves both broad protection and desirable network performance. Mobile Ad hoc Network (MANET) has emerged as a new leading edge of technology to provide communication wherever and whenever required. As the wired network needs established infrastructure for communication but the mobil
APA, Harvard, Vancouver, ISO, and other styles
3

Komninos, Nikos, Dimitrios D. Vergados, and Christos Douligeris. "Multifold node authentication in mobilead hoc networks." International Journal of Communication Systems 20, no. 12 (2007): 1391–406. http://dx.doi.org/10.1002/dac.882.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Richard Yu, F., Helen Tang, Victor C. M. Leung, Jie Liu, and Chung-Horng Lung. "Biometric-based user authentication in mobilead hoc networks." Security and Communication Networks 1, no. 1 (2008): 5–16. http://dx.doi.org/10.1002/sec.6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Low, Chor Ping, and Chau Yuen. "Energy efficient broadcast routing in mobilead hoc networks." International Journal of Communication Systems 17, no. 4 (2004): 375–88. http://dx.doi.org/10.1002/dac.649.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Zhang, Zhensheng, and Qian Zhang. "Delay/disruption tolerant mobilead hoc networks: latest developments." Wireless Communications and Mobile Computing 7, no. 10 (2007): 1219–32. http://dx.doi.org/10.1002/wcm.518.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Kim, Ji-Hoon, and Sung-Bong Yang. "Double-layered Peer-to-Peer Systems in MobileAd-hoc Networks." KIPS Transactions:PartC 17C, no. 1 (2010): 61–68. http://dx.doi.org/10.3745/kipstc.2010.17c.1.061.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Papanastasiou, Stylianos, and Mohamed Ould-Khaoua. "Exploring the performance of TCP vegas in mobilead hoc networks." International Journal of Communication Systems 17, no. 2 (2004): 163–77. http://dx.doi.org/10.1002/dac.638.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Zhai, Hongqiang, Jianfeng Wang, Xiang Chen, and Yuguang Fang. "Medium access control in mobilead hoc networks: challenges and solutions." Wireless Communications and Mobile Computing 6, no. 2 (2006): 151–70. http://dx.doi.org/10.1002/wcm.376.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Mizanur Rahman, Sk Md, Nidal Nasser, Atsuo Inomata, Takeshi Okamoto, Masahiro Mambo, and Eiji Okamoto. "Anonymous authentication and secure communication protocol for wireless mobilead hoc networks." Security and Communication Networks 1, no. 2 (2008): 179–89. http://dx.doi.org/10.1002/sec.4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
11

Chand, Narottam, R. C. Joshi, and Manoj Misra. "A zone co-operation approach for efficient caching in mobilead hoc networks." International Journal of Communication Systems 19, no. 9 (2006): 1009–28. http://dx.doi.org/10.1002/dac.795.

Full text
APA, Harvard, Vancouver, ISO, and other styles
12

Kannhavong, Bounpadith, Hidehisa Nakayama, Nei Kato, Abbas Jamalipour, and Yoshiaki Nemoto. "A study of a routing attack in OLSR-based mobilead hoc networks." International Journal of Communication Systems 20, no. 11 (2007): 1245–61. http://dx.doi.org/10.1002/dac.870.

Full text
APA, Harvard, Vancouver, ISO, and other styles
13

Ghafouri, Arash, Ahmad Ghasemi, and Mohammad Reza Hasani Ahangar. "A Power-based Method for Improving the ODMRP Protocol Performance in MobileAd-hoc Networks." International Journal of Wireless and Microwave Technologies 8, no. 2 (2018): 27–36. http://dx.doi.org/10.5815/ijwmt.2018.02.03.

Full text
APA, Harvard, Vancouver, ISO, and other styles
14

Tseng, Yu-Chee, Shih-Lin Wu, Chih-Min Chao, and Jang-Ping Sheu. "An efficient MAC protocol for multi-channel mobilead hoc networks based on location information." International Journal of Communication Systems 19, no. 8 (2006): 877–96. http://dx.doi.org/10.1002/dac.774.

Full text
APA, Harvard, Vancouver, ISO, and other styles
15

Ammari, Habib M. "A survey of current architectures for connecting wireless mobilead hoc networks to the Internet." International Journal of Communication Systems 20, no. 8 (2007): 943–68. http://dx.doi.org/10.1002/dac.854.

Full text
APA, Harvard, Vancouver, ISO, and other styles
16

Hassanein, Hossam, and Ahmed Safwat. "Virtual base stations for wireless mobilead hoc communications: an infrastructure for the infrastructure-less." International Journal of Communication Systems 14, no. 8 (2001): 763–82. http://dx.doi.org/10.1002/dac.506.

Full text
APA, Harvard, Vancouver, ISO, and other styles
17

An, Beongku, and Symeon Papavassiliou. "A mobility-based clustering approach to support mobility management and multicast routing in mobilead-hoc wireless networks." International Journal of Network Management 11, no. 6 (2001): 387–95. http://dx.doi.org/10.1002/nem.415.

Full text
APA, Harvard, Vancouver, ISO, and other styles
18

Ammari, Habib M. "Using group mobility and multihomed mobile gateways to connect mobilead hoc networks to the global IP Internet." International Journal of Communication Systems 19, no. 10 (2006): 1137–65. http://dx.doi.org/10.1002/dac.805.

Full text
APA, Harvard, Vancouver, ISO, and other styles
19

Sayani, Sil, and Das Sukanta. "An Energy Efficient Algorithm for Distributed Mutual Exclusion in Mobile Ad-hoc Networks." April 27, 2010. https://doi.org/10.5281/zenodo.1058559.

Full text
Abstract:
This paper reports a distributed mutual exclusion algorithm for mobile Ad-hoc networks. The network is clustered hierarchically. The proposed algorithm considers the clustered network as a logical tree and develops a token passing scheme to get the mutual exclusion. The performance analysis and simulation results show that its message requirement is optimal, and thus the algorithm is energy efficient.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!