Journal articles on the topic 'ADHOC ON-DEMAND DISTANCE VECTOR'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'ADHOC ON-DEMAND DISTANCE VECTOR.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
AmitMaheshbhai, Lathigara, and K. H. Wandra. "Adhoc On-demand Distance Vector: Energy Efficient Approach." International Journal of Computer Applications 102, no. 8 (September 18, 2014): 40–45. http://dx.doi.org/10.5120/17839-8725.
Full textG Patel, Vallabh, and Nishant P. Makwana. "Optimized Adhoc On demand Distance Vector (O-AODV)." International Journal of Engineering Trends and Technology 35, no. 1 (May 25, 2016): 12–18. http://dx.doi.org/10.14445/22315381/ijett-v35p203.
Full textdhao, A. P. Ja, and Dr D. N. Chaudhari. "Security Aware Adhoc on Demand Distance Vector Routing Protocol in Vehicular Adhoc Network." International Journal of Innovative Research in Computer and Communication Engineering 02, no. 12 (December 30, 2014): 7258–63. http://dx.doi.org/10.15680/ijircce.2014.0212019.
Full textGanpat Joshi, Gurpreet Singh,. "A Novel Statistical Adhoc On-Demand Distance Vector Routing Protocol Technique is using for Preventing the Mobile Adhoc Network from Flooding Attack." Turkish Journal of Computer and Mathematics Education (TURCOMAT) 12, no. 6 (April 5, 2021): 1753–65. http://dx.doi.org/10.17762/turcomat.v12i6.3779.
Full textVeepin Kumar and Sanjay Singla. "A Performance Analysis of MANET Routing Protocols." international journal of engineering technology and management sciences 6, no. 6 (November 28, 2022): 173–80. http://dx.doi.org/10.46647/ijetms.2022.v06i06.027.
Full textMano, Reji, P. C. Kishore Raja, Christeena Joseph, and Radhika Baskar. "Hardware Implementation of Intrusion Detection System for Ad-Hoc Network." International Journal of Reconfigurable and Embedded Systems (IJRES) 5, no. 3 (November 1, 2016): 158. http://dx.doi.org/10.11591/ijres.v5.i3.pp158-164.
Full textSoundararajan, S., B. R. Tapas Bapu, C. Kotteeswaran, S. Venkatasubramanian, P. J. Sathish Kumar, and Ahmed Mudassar Ali. "Modified Adhoc On-Demand Distance Vector for Trust Evaluation And Attack Detection." Intelligent Automation & Soft Computing 36, no. 2 (2023): 1227–40. http://dx.doi.org/10.32604/iasc.2023.025752.
Full textSultana, Jeenat, and Tasnuva Ahmed. "Elliptic Curve Cryptography Based Data Transmission against Blackhole Attack in MANET." International Journal of Electrical and Computer Engineering (IJECE) 8, no. 6 (December 1, 2018): 4412. http://dx.doi.org/10.11591/ijece.v8i6.pp4412-4422.
Full textGupta, Ekta, and Akhilesh Tiwari. "BPAODV: Black Hole Prevention Using Trust Adhoc on Demand Distance Vector Routing Protocol." International Journal of Future Generation Communication and Networking 7, no. 6 (December 31, 2014): 103–18. http://dx.doi.org/10.14257/ijfgcn.2014.7.6.11.
Full textPatel, Manoj, Dr Maneesh Shrivastava, and Kavita Deshmukh. "Simulation And Auditing Of Network Security Based On Probabilistic Neural Network Approach." INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 3, no. 1 (August 1, 2012): 91–94. http://dx.doi.org/10.24297/ijct.v3i1b.2746.
Full textUmaparvathi, M., and Dharmishtan K. Varughese. "Secure Video Transmission Against Black Hole Attack in MANETs." International Journal of Business Data Communications and Networking 7, no. 4 (October 2011): 1–17. http://dx.doi.org/10.4018/jbdcn.2011100101.
Full textAhmed. "PERFORMANCE ANALYSIS OF ADHOC ON DEMAND DISTANCE VECTOR PROTOCOL WITH BLACKHOLE ATTACK IN WSN." Journal of Computer Science 10, no. 8 (August 1, 2014): 1466–72. http://dx.doi.org/10.3844/jcssp.2014.1466.1472.
Full textC, Mohanadevi, and Sweatha Selvakumar. "An Effective Encryption Mechanism for Security Issues in Adhoc Networks." ECS Transactions 107, no. 1 (April 24, 2022): 17465–74. http://dx.doi.org/10.1149/10701.17465ecst.
Full textAhmed, Shadab. "Ad_Hoc on Demand Distance Vector Routing using MANET." IJARCCE 6, no. 3 (March 30, 2017): 944–48. http://dx.doi.org/10.17148/ijarcce.2017.63220.
Full textPamungkas, Dimas W. L., and Radityo Anggoro. "An Improvement of Ant Colony Adhoc On-Demand Vector (ANT-AODV) with K-Means Clustering Nodes Method in Mobile Adhoc Network (MANET) Environment." Journal of Development Research 5, no. 1 (May 31, 2021): 1–6. http://dx.doi.org/10.28926/jdr.v5i1.133.
Full textSumathi. "EVALUATING AN AUTHENTICATED TRUST BASED ADHOC ON DEMAND DISTANCE VECTOR FOR MALICIOUS NODES ISOLATION IN MANET." Journal of Computer Science 10, no. 9 (September 1, 2014): 1859–64. http://dx.doi.org/10.3844/jcssp.2014.1859.1864.
Full textRahman, Md Abdur, Md Mizanur Rahman, and Md Abdul Alim. "Design and Performance Analysis of an In-Band Full-Duplex MAC Protocol for Ad Hoc Networks." Telecom 4, no. 1 (January 18, 2023): 100–117. http://dx.doi.org/10.3390/telecom4010007.
Full textV. Rajesh, Kannan. "On-demand based wireless with hybrid cryptography in MANET." i-manager’s Journal on Wireless Communication Networks 10, no. 2 (2022): 8. http://dx.doi.org/10.26634/jwcn.10.2.18937.
Full textDeepa, M., and P. Krishna Priya. "Secure Enhanced Reactive Routing Protocol for Manet Using Two Fish Algorithm." International Journal of Engineering & Technology 7, no. 3.12 (July 20, 2018): 621. http://dx.doi.org/10.14419/ijet.v7i3.12.16441.
Full textRATNASIH, RATNASIH, RISKI MUKTIARTO NUGROHO AJINEGORO, and DOAN PERDANA. "Analisis Kinerja Protokol Routing AOMDV pada VANET dengan Serangan Rushing." ELKOMIKA: Jurnal Teknik Energi Elektrik, Teknik Telekomunikasi, & Teknik Elektronika 6, no. 2 (July 9, 2018): 232. http://dx.doi.org/10.26760/elkomika.v6i2.232.
Full textMurty, M. V. D. S. Krishna, and Dr Lakshmi Rajamani. "Neighbour Node Ratio AODV (NNR-AODV) Routing Protocol for Wormhole Attack Detection in Manets." International Journal of Emerging Science and Engineering 11, no. 4 (March 30, 2023): 1–9. http://dx.doi.org/10.35940/ijese.d2547.0311423.
Full textAbul Hassan, Muhammad, Syed Irfan Ullah, Abdus Salam, Arbab Wajid Ullah, Muhammad Imad, and Farhat Ullah. "Energy efficient hierarchical based fish eye state routing protocol for flying Ad-hoc networks." Indonesian Journal of Electrical Engineering and Computer Science 21, no. 1 (January 1, 2021): 465. http://dx.doi.org/10.11591/ijeecs.v21.i1.pp465-471.
Full textBharadwaj, Priyanka, and Surjeet Balhara. "A Bandwidth and Energy Aware QoS Routing Protocol for Enhanced Performance in Ad-hoc Networks." International Journal of Sensors, Wireless Communications and Control 9, no. 2 (October 25, 2019): 203–13. http://dx.doi.org/10.2174/2210327908666180801125735.
Full textVasundra, S., and D. Venkatesh. "Performance Evaluation of Routing Protocols for Voice and Video Traffics." Asian Journal of Computer Science and Technology 7, no. 3 (November 5, 2018): 86–90. http://dx.doi.org/10.51983/ajcst-2018.7.3.1890.
Full textMakani, Ruchi, and Busi V. Ramana Reddy. "Performance Evaluation of Cognitive Internet on Things Under Routing Attacks." International Journal of Sensors, Wireless Communications and Control 10, no. 1 (February 7, 2020): 15–24. http://dx.doi.org/10.2174/2210327909666181217122655.
Full textMurty, M. V. D. S. Krishna, and Dr Lakshmi Rajamani. "Secure and Light Weight Aodv (Slw-Aodv) Routing Protocol for Resilience Against Blackhole Attack in Manets." International Journal of Soft Computing and Engineering 13, no. 1 (March 30, 2023): 1–9. http://dx.doi.org/10.35940/ijsce.a3592.0313123.
Full textS., Dr Smys, and Dr Jennifer S. Raj. "Performance Improvement in Conventional AODV Using Energy Efficient, Manifold Route Discovery Scheme." Journal of ISMAC 2, no. 2 (May 14, 2020): 129–39. http://dx.doi.org/10.36548/jismac.2020.2.006.
Full textPrajapati, Meenakshi. "An Implementation and Modification of Routing Protocol Against Vehicular Adhoc Network." International Journal for Research in Applied Science and Engineering Technology 9, no. 10 (October 31, 2021): 1777–80. http://dx.doi.org/10.22214/ijraset.2021.38680.
Full textKumar Singh Yadav, Ajit, and Rajesh K. Yadav. "A Reliable and Secure AODV Protocol for MANETs." International Journal of Engineering & Technology 7, no. 4.38 (December 3, 2018): 893. http://dx.doi.org/10.14419/ijet.v7i4.38.27603.
Full textGeetha, M. "Performance and analysis of Adhoc On Demand Multipath Distance Vector Routing Protocol ( AOMDV) and Enhanced Multipath MPR AODV Routing Protocol(EMMDV) in MANET." International Journal of Computer Sciences and Engineering 6, no. 7 (July 31, 2018): 413–18. http://dx.doi.org/10.26438/ijcse/v6i7.413418.
Full textAldabbagh, Ghadah, Peer Azmat Shah, Halabi B. Hasbullah, Farhan Aadil, Khalid Mahmood Awan, and Farman Marwat. "Fuzzy Logic Based Enhanced AOMDV with Link Status Classification for Efficient Multi-Path Routing in Multi-Hop Wireless Networks." Journal of Computational and Theoretical Nanoscience 14, no. 1 (January 1, 2017): 620–30. http://dx.doi.org/10.1166/jctn.2017.6252.
Full textAsha Latha, S., and A. Sivabalan. "Efficient Security Authentication Protocol in Wireless Sensor Networks." Applied Mechanics and Materials 573 (June 2014): 418–23. http://dx.doi.org/10.4028/www.scientific.net/amm.573.418.
Full textRaghavendar Raju, L., and C. R. K. Reddy. "Security Improvisation through Node Trust Prediction Approach in Mobile Ad Hoc Networks." International Journal of Interactive Mobile Technologies (iJIM) 13, no. 09 (September 5, 2019): 40. http://dx.doi.org/10.3991/ijim.v13i09.9329.
Full textFatima, Lubna Naaz, Syeda Hajra Mahin, and Fahmina Taranum. "Efficient strategies to reduce power consumption in MANETs." PeerJ Computer Science 5 (November 18, 2019): e228. http://dx.doi.org/10.7717/peerj-cs.228.
Full textRath, Mamata, Binod Kumar Pattanayak, and Bibudhendu Pati. "Energy Competent Routing Protocol Design in MANET with Real Time Application Provision." International Journal of Business Data Communications and Networking 11, no. 1 (January 2015): 50–60. http://dx.doi.org/10.4018/ijbdcn.2015010105.
Full textBhardwaja, Manish, and Anil Ahlawat. "Evaluation of Maximum Lifetime Power Efficient Routing in Ad hoc Network Using Magnetic Resonance Concept." Recent Patents on Engineering 13, no. 3 (September 19, 2019): 256–60. http://dx.doi.org/10.2174/1872212112666180815120447.
Full textYoon Khang, Adam Wong, Arnidza Ramli, Shamsul J. Elias, J. Pusppanathan, Jamil Abedalrahim Jamil Alsayaydeh, Fatin Hamimi Mustafa, Win Adiyansyah Indra, and Johar Akbar Mohamat Gani. "Self-configuration and self-optimization process with taguchi method in hybrid optical wireless network." Indonesian Journal of Electrical Engineering and Computer Science 19, no. 2 (August 1, 2020): 870. http://dx.doi.org/10.11591/ijeecs.v19.i2.pp870-878.
Full textJoseph, Abin John, R. Asaletha, V. J. Manoj, and R. Nishanth. "Enhancing the network lifetime of a wireless sensor network using modified k-means Firefly Optimization." Journal of Physics: Conference Series 2466, no. 1 (March 1, 2023): 012019. http://dx.doi.org/10.1088/1742-6596/2466/1/012019.
Full textMartinaa, M., B. Santhi, and A. Raghunathan. "An energy-efficient and novel populated cluster aware routing protocol (PCRP) for wireless sensor networks (WSN)." Journal of Intelligent & Fuzzy Systems 39, no. 6 (December 4, 2020): 8529–42. http://dx.doi.org/10.3233/jifs-189170.
Full textSharma, Sharad, Shakti Kumar, and Brahmjit Singh. "AntMeshNet." International Journal of Applied Metaheuristic Computing 5, no. 1 (January 2014): 20–45. http://dx.doi.org/10.4018/ijamc.2014010102.
Full textJuneja, Kapil. "DRI Table Based Traffic-Behaviour Analysis Approach for Detection of Blackhole Attack." International Journal of Sensors, Wireless Communications and Control 10, no. 1 (February 7, 2020): 79–93. http://dx.doi.org/10.2174/2210327909666190208154847.
Full textPrashanthi, V., D. Suresh Babu, and C. V. Guru Rao. "Network Coding aware Routing for Efficient Communication in Mobile Ad-hoc Networks." International Journal of Engineering & Technology 7, no. 3 (July 11, 2018): 1474. http://dx.doi.org/10.14419/ijet.v7i3.12928.
Full textM, Thebiga, and Suji Pramila. "A Survey on Assorted Subsisting Approaches to Recognize and Preclude Black Hole Attacks in Mobile Adhoc Networks." International Journal of Interactive Mobile Technologies (iJIM) 14, no. 01 (January 20, 2020): 96. http://dx.doi.org/10.3991/ijim.v14i01.11329.
Full textMarina, Mahesh K., and Samir R. Das. "Ad hoc on-demand multipath distance vector routing." ACM SIGMOBILE Mobile Computing and Communications Review 6, no. 3 (June 2002): 92–93. http://dx.doi.org/10.1145/581291.581305.
Full textLee, Sung-Ju, Elizabeth M. Belding-Royer, and Charles E. Perkins. "Ad hoc on-demand distance-vector routing scalability." ACM SIGMOBILE Mobile Computing and Communications Review 6, no. 3 (June 2002): 94–95. http://dx.doi.org/10.1145/581291.581306.
Full textZapata, Manel Guerrero. "Secure ad hoc on-demand distance vector routing." ACM SIGMOBILE Mobile Computing and Communications Review 6, no. 3 (June 2002): 106–7. http://dx.doi.org/10.1145/581291.581312.
Full textMarina, Mahesh K., and Samir R. Das. "Ad hoc on-demand multipath distance vector routing." Wireless Communications and Mobile Computing 6, no. 7 (2006): 969–88. http://dx.doi.org/10.1002/wcm.432.
Full textLalwani, Praveen, Mahesh Motwani, and Piyush Kumar Shukla. "Optimized Ad-hoc on Demand Distance Vector Routing Protocol." International Journal of Computer Applications 55, no. 4 (October 20, 2012): 13–17. http://dx.doi.org/10.5120/8742-2614.
Full textSingh, Virendra, and Dhanroop Mal. "Modified Ad Hoc On-Demand Distance Vector Routing Protocols." International Journal of Computer Applications 130, no. 12 (November 17, 2015): 1–6. http://dx.doi.org/10.5120/ijca2015907111.
Full textSingh, Meeta, and Sudeep Kumar. "A Survey: Ad-hoc on Demand Distance Vector (AODV) Protocol." International Journal of Computer Applications 161, no. 1 (March 15, 2017): 38–44. http://dx.doi.org/10.5120/ijca2017913109.
Full text