To see the other types of publications on this topic, follow the link: Manetho.

Journal articles on the topic 'Manetho'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Manetho.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

James, Peter, and Robert Morkot. "Two Studies in 21st Dynasty ChronologyI: Deconstructing Manetho’s 21st DynastyII: The Datelines of High Priest Menkheperre." Journal of Egyptian History 6, no. 2 (2013): 219–56. http://dx.doi.org/10.1163/18741665-12340005.

Full text
Abstract:
AbstractThere has never been any consensus on the nature, composition and chronology of the “21st Dynasty”. Recent research has produced an ever-increasing multiplicity of rival models, most still relying on the information given in the surviving epitomes of the Hellenistic scholar Manetho. The claim that the regnal years given by “Manetho” for the 21st Dynasty are corroborated by the monuments is completely unjustified and based on circular reasoning. Progress can only be made by completely abandoning reliance on Manetho (a hangover from early 19th century, pre-decipherment, scholarship) once and for all.
APA, Harvard, Vancouver, ISO, and other styles
2

Theis, Christoffer. "Bemerkungen zu Manetho und zur manethonischen Tradition." Die Welt des Orients 44, no. 1 (May 2014): 109–25. http://dx.doi.org/10.13109/wdor.2014.44.1.109.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Ferguson, Cameron Evan. "A Note on Contra Apionem 1.250: Further Evidence for Anti-Jewish Interpolation." Journal of Ancient Judaism 12, no. 2 (April 19, 2021): 205–16. http://dx.doi.org/10.30965/21967954-bja10005.

Full text
Abstract:
Abstract This article makes the case that the citation of Manetho’s Aegyptiaca found within Josephus’ Contra Apionem 1.250 is the work of a later anti-Jewish interpolator. Within the passage is an unnoticed chiasm that artificially binds the description of Osarsiph/Moses there with the Osarsephos introduced earlier in C. Ap. 1.238–9. It further suggests that the reason a negative depiction of Moses is not more fully integrated into Manetho’s story is the result of the interpolator inferring Manetho’s negative evaluation of the Jews as a result of his negative evaluation of the Hyksos. Manetho is, in other words, not the father of Egyptian anti-Judaism, though an anonymous editor may well be.
APA, Harvard, Vancouver, ISO, and other styles
4

Cook, David. "Berossus and Genesis, Manetho and Exodus ? By Russell Gmirkin." Religious Studies Review 33, no. 1 (January 2007): 64. http://dx.doi.org/10.1111/j.1748-0922.2007.00149_24.x.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Popko, Lutz. "Ammeris/Marrhos/Moiris:Herodot, Manetho, P.Lips. Inv. 590 und Diodors Neues Reich." Journal of Egyptian History 4, no. 1 (2011): 99–117. http://dx.doi.org/10.1163/187416611x580723.

Full text
Abstract:
AbstractPapyrus Lips. Inv. 590 contains the remains of an Egyptian king-list of the Late Period. Although it is highly fragmentary and its interpretation is difficult, a short sequence of kings plays a catalytic role in identifying some pharaohs in Manetho’s and Diodorus’ works. Furthermore, it is now possible to rehabilitate Diodorus’ Egyptian chronology in one aspect, and to explain some obvious discrepancies in Herodotus’ historical framework: Ammeris the Nubian is Kashta, Marrhos is Amenhotep III, and Moiris is an amalgam of Amenemhet III, Amenhotep III and Kashta.
APA, Harvard, Vancouver, ISO, and other styles
6

Elnozahy, E. N., and W. Zwaenepoel. "Manetho: transparent roll back-recovery with low overhead, limited rollback, and fast output commit." IEEE Transactions on Computers 41, no. 5 (May 1992): 526–31. http://dx.doi.org/10.1109/12.142678.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Bányai, Michael. "Merenptah und Amenmesse: Entwurf einer alternativen Chronologie." Journal of Egyptian History 12, no. 1 (April 29, 2019): 36–103. http://dx.doi.org/10.1163/18741665-12340051.

Full text
Abstract:
Abstract Die Frage nach der chronologischen Position von Amenmesse innerhalb der späten 19. Dynastie ist ungeachtet aller Versuche einer Klärung weiterhin eine stark debattierte Angelegenheit geblieben. Man konnte von bisher zwei grundsätzlichen Lösungsansätzen Amenmesse zu unterbringen, sprechen. Der vorliegende Artikel möchte, angesichts der vom Autor festgestellten Schwierigkeiten der bisherigen Versuche, die Regierungszeit von Amenmesse chronologisch zu unterbringen, einer weiteren, dritten Alternative, nachgehen. Diese zieht in Betracht—in Übereinstimmung mit der Aussage der Historien von Manetho—die Möglichkeit eines Aufstands von Amenmesse während der späteren Regierungszeit Merenptahs. Ebenso wird hier zum ersten Mal die Aussage der Elephantine Stele des Sethnacht sowie von pHarris I auf diese Periode bezogen.
APA, Harvard, Vancouver, ISO, and other styles
8

Ray, J. D. "Psammuthis and Hakoris." Journal of Egyptian Archaeology 72, no. 1 (August 1986): 149–58. http://dx.doi.org/10.1177/030751338607200112.

Full text
Abstract:
The evidence for the whole of dynasty XXIX is confusing, and one of the principal issues has been the relative order of the kings. In the case of Psammuthis and Hakoris there is the well-known discrepancy between the versions of Manetho on the one hand and the Demotic Chronicle on the other. In this paper the author analyses the surviving demotic contracts from the reign of Hakoris, and concludes that the short reign of Psammuthis fits best into the break between the former's second and third years; he also offers an analysis of the epithet wḤm-ḫ' used by Hakoris in his protocols, and suggests a new interpretation of the period as a whole.
APA, Harvard, Vancouver, ISO, and other styles
9

Van Seters, J. "Berossus and Genesis, Manetho and Exodus: Hellenistic Histories and the Date of the Pentateuch. By RUSSELL E. GMIRKIN." Journal of Theological Studies 59, no. 1 (February 6, 2008): 212–14. http://dx.doi.org/10.1093/jts/flm136.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Ladynin, Ivan, and Alexandr Nemirovsky. "Manetho and His Work in a New Monographic Study (Dillery, J. – Clio’s Other Sons. Berossus and Manetho. A Discussion of the First Written Histories of Babylon and Egypt. The University of Michigan Press, Ann Arbor, 2015. Pp. xxxviii, 494. ISBN 9780472052271)." Вестник древней истории 78, no. 4 (2018): 1034–54. http://dx.doi.org/10.31857/s032103910002918-2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
11

López-Ruiz, Carolina. "Clio’s Other Sons: Berossus and Manetho. By John Dillery. Ann Arbor: University of Michigan Press, 2015. Pp. [xxxviii] + 494." Classical Philology 112, no. 1 (January 2017): 103–8. http://dx.doi.org/10.1086/689611.

Full text
APA, Harvard, Vancouver, ISO, and other styles
12

Andersen, W. "Manet Manette." Common Knowledge 10, no. 1 (January 1, 2004): 162–63. http://dx.doi.org/10.1215/0961754x-10-1-162.

Full text
APA, Harvard, Vancouver, ISO, and other styles
13

LEWIS, ADRIAN. "MANET MANETTE." Art Book 13, no. 1 (February 2006): 43–45. http://dx.doi.org/10.1111/j.1467-8357.2006.00641.x.

Full text
APA, Harvard, Vancouver, ISO, and other styles
14

Sirajuddin, Mohammad, Ch Rupa, Celestine Iwendi, and Cresantus Biamba. "TBSMR: A Trust-Based Secure Multipath Routing Protocol for Enhancing the QoS of the Mobile Ad Hoc Network." Security and Communication Networks 2021 (April 21, 2021): 1–9. http://dx.doi.org/10.1155/2021/5521713.

Full text
Abstract:
Mobile ad hoc network (MANET) is a miscellany of versatile nodes that communicate without any fixed physical framework. MANETs gained popularity due to various notable features like dynamic topology, rapid setup, multihop data transmission, and so on. These prominent features make MANETs suitable for many real-time applications like environmental monitoring, disaster management, and covert and combat operations. Moreover, MANETs can also be integrated with emerging technologies like cloud computing, IoT, and machine learning algorithms to achieve the vision of Industry 4.0. All MANET-based sensitive real-time applications require secure and reliable data transmission that must meet the required QoS. In MANET, achieving secure and energy-efficient data transmission is a challenging task. To accomplish such challenging objectives, it is necessary to design a secure routing protocol that enhances the MANET’s QoS. In this paper, we proposed a trust-based multipath routing protocol called TBSMR to enhance the MANET’s overall performance. The main strength of the proposed protocol is that it considers multiple factors like congestion control, packet loss reduction, malicious node detection, and secure data transmission to intensify the MANET’s QoS. The performance of the proposed protocol is analyzed through the simulation in NS2. Our simulation results justify that the proposed routing protocol exhibits superior performance than the existing approaches.
APA, Harvard, Vancouver, ISO, and other styles
15

Stevens, Kathryn. "(J.) Dillery Clio's Other Sons: Berossus and Manetho, with an Afterword on Demetrius. Ann Arbor: University of Michigan Press, 2015. Pp. xxxviii + 494. $50. 9780472052271." Journal of Hellenic Studies 136 (2016): 242–43. http://dx.doi.org/10.1017/s0075426916000598.

Full text
APA, Harvard, Vancouver, ISO, and other styles
16

Wilks, John. "DATING THE PENTATEUCH Russell E. Gmirkin, Berossus and Genesis, Manetho and Exodus (LHBOTS 433; London: Continuum, 2006. £75.00. pp. xii + 332. ISBN 978—0—567—02592—0)." Expository Times 120, no. 5 (February 2009): 242. http://dx.doi.org/10.1177/00145246091200050702.

Full text
APA, Harvard, Vancouver, ISO, and other styles
17

Divya, K., and B. Srinivasan. "Trust Based Secure Multipath Routing Protocol for MANET." International Journal of Computer Science and Mobile Computing 10, no. 5 (May 30, 2021): 72–80. http://dx.doi.org/10.47760/ijcsmc.2021.v10i05.008.

Full text
Abstract:
MANETs gained popularity due to various notable features like dynamic topology, rapid setup, multihop data transmission, and so on. These prominent features make MANETs suitable for many real-time applications like environmental monitoring, disaster management, and covert and combat operations. Moreover, MANETs can also be integrated with emerging technologies like cloud computing, IoT, and machine learning algorithms to achieve the vision of Industry 4.0. All MANET-based sensitive real time applications require secure and reliable data transmission that must meet the required QoS. In MANET, achieving secure and energy-efficient data transmission is a challenging task. )e main strength of the proposed protocol is that it considers multiple factors like congestion control, packet loss reduction, malicious node detection, and secure data transmission to intensify the MANET’s QoS. The performance of the proposed protocol is analyzed through the simulation in NS2.
APA, Harvard, Vancouver, ISO, and other styles
18

Edwards, M. J. "(G.) Verbrugghe and (J.M.) Wickersham Tr. and comm. Berossus and Manetho, Native Tradition in Ancient Mesopotamia and Egypt. Ann Arbor: U Michigan P, 1996. Pp. x + 239. 0472107224." Journal of Hellenic Studies 119 (November 1999): 214–15. http://dx.doi.org/10.2307/632371.

Full text
APA, Harvard, Vancouver, ISO, and other styles
19

Kurni, Muralidhar, and Saritha K. "‘Power-as-a-Service’ – A Hierarchical On-Demand Charging Model for Recharging the Mobile Nodes of MANETs." International Journal of Interactive Mobile Technologies (iJIM) 15, no. 12 (June 18, 2021): 170. http://dx.doi.org/10.3991/ijim.v15i12.23081.

Full text
Abstract:
Battery energy is a crucial issue that limits battery-powered mobile devices’ operational efficiency in Mobile Ad hoc Networks (MANETs). Failure of a node affects both the lifetime and connectivity of a MANET, which has to initiate finding a new route from source to destination. This initiation causes more energy consumption in nodes. Failure of a node also causes network partitions, thereby resulting in sparse networks being formed. Existing energy-efficient strategies only defer the end of a node’s battery lifetime; they could not guarantee the MANET’s nonstop functioning. To address the issues caused by battery depletion, this paper proposes a “Cloud” oriented approach called Power-as-a-Service (PaaS), a hierarchical on-demand charging model for recharging the mobile nodes of the MANET. In PaaS, the MANET is alienated into non-overlapping disjoint zones, and for each zone, one Zone Charging Cloud Node (ZccN) is deployed to recharge the mobile nodes of that particular zone wirelessly. A High-power Charging Cloud Node (HccN) is deployed to wirelessly recharge the ZccNs in the MANET for the entire network. In PaaS, the ZccN recharges both the selected node for recharge and other nodes around the selected node that requested recharge and has higher power transfer efficiency. This strategy of PaaS improves the charging efficiency of cloud chargers by minimizing the urgent charging requests in the future, and thus the operational efficiency of the MANET improves. Extensive simulations indicate that the proposed PaaS model with a hierarchy of cloud chargers improves the operational efficiency of MANETs in terms of reducing the death rate of mobile nodes, thereby improving the lifetime and connectivity probability of MANETs.
APA, Harvard, Vancouver, ISO, and other styles
20

Phate, Neelam, and M. A. Rizvi. "CHALLENGES, CLASSIFICATION AND COMPARATIVE STUDY OF QOS SOLUTIONS IN MANET." INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 13, no. 6 (June 30, 2014): 4530–36. http://dx.doi.org/10.24297/ijct.v13i6.2514.

Full text
Abstract:
A mobile ad-hoc network (MANET) is composed of mobile nodes without any fixed infrastructure. Mobile nodes are communicating with each other over radio links. The large amount of real-time traffic involves high bandwidth and liable to congestion. Routing in MANET is a challenging task due to high mobility of nodes in a network. Quality of Service (QoS) is an important consideration in MANET. It is more difficult to guarantee QoS in MANETs than in other type of networks. To establish the routes and to secure the resources necessary to provide the QoS requires collaboration among the nodes. Therefore, QoS routing protocols face the challenge of delivering data to destinations. The appropriate QoS metrics should be used, such as bandwidth utilization, delay, packet delivery ratio (PDR) and jitter for QoS based routing. This paper provides the challenges, classification and comparison of some of the QoS solutions in MANET.Â
APA, Harvard, Vancouver, ISO, and other styles
21

Debnath, Sumon Kumar, Mousumi Saha, Md Manowarul Islam, Prodip Kumar Sarker, and Ileas Pramanik. "Evaluation of Multicast and Unicast Routing Protocols Performance for Group Communication with QoS Constraints in 802.11 Mobile Ad-hoc Networks." International Journal of Computer Network and Information Security 13, no. 1 (February 8, 2021): 1–15. http://dx.doi.org/10.5815/ijcnis.2021.01.01.

Full text
Abstract:
In Mobile Ad-hoc Network (MANET), portable devices like smartphones, or laptop PC can join together to make provisional networks without any infrastructure The objective of multicast or unicast protocols is to ensure an efficient route formation and flow control mechanism which is a very challenging issue for many group computing services in MANETs. MANETs can support several real-time applications like emergency rescue, and disaster relief operations which require minimum Quality of Service (QoS) to handle high traffic. Providing QoS for multimedia and group-oriented computing in MANETs becomes a real challenge due to the wireless medium and the mobility of operating nodes. Therefore, an investigation of routing protocols for one-to-many or many-to-many computing is important that supports acceptable QoS in MANETs. Numerous QoS metrics have been considered for the assessment like packet delivery ratio, latency, packet loss rate, control overhead, and throughput. By considering different network topologies and scenarios with different performance parameters, the primary goal of this study is to explore the challenges and factors for QoS services in MANET’s multicast communication. The outcomes of investigation can be used to design the future MANET protocol for multimedia applications. The performance results indicate that the increasing number of sending/receiving nodes may increase the overhead or latency of the network but capable of providing higher network throughput, carried out in NS-2. The results also indicate although MANETs can induce errors and packets are lost as part of the normal operating context, multicast AODV practice superior to the unicast protocol to various QoS in a wide range of scenarios with less overhead.
APA, Harvard, Vancouver, ISO, and other styles
22

Al Sharah, Ashraf, Taiwo Oyedare, and Sachin Shetty. "Detecting and Mitigating Smart Insider Jamming Attacks in MANETs Using Reputation-Based Coalition Game." Journal of Computer Networks and Communications 2016 (2016): 1–13. http://dx.doi.org/10.1155/2016/4289176.

Full text
Abstract:
Security in mobile ad hoc networks (MANETs) is challenging due to the ability of adversaries to gather necessary intelligence to launch insider jamming attacks. The solutions to prevent external attacks on MANET are not applicable for defense against insider jamming attacks. There is a need for a formal framework to characterize the information required by adversaries to launch insider jamming attacks. In this paper, we propose a novel reputation-based coalition game in MANETs to detect and mitigate insider jamming attacks. Since there is no centralized controller in MANETs, the nodes rely heavily on availability of transmission rates and a reputation for each individual node in the coalition to detect the presence of internal jamming node. The nodes will form a stable grand coalition in order to make a strategic security defense decision, maintain the grand coalition based on node reputation, and exclude any malicious node based on reputation value. Simulation results show that our approach provides a framework to quantify information needed by adversaries to launch insider attacks. The proposed approach will improve MANET’s defense against insider attacks, while also reducing incorrect classification of legitimate nodes as jammers.
APA, Harvard, Vancouver, ISO, and other styles
23

Jim, Lincy Elizebeth, and Mark A. Gregory. "Utilisation of DANGER and PAMP signals to detect a MANET Packet Storage Time Attack." Australian Journal of Telecommunications and the Digital Economy 5, no. 2 (June 5, 2017): 61. http://dx.doi.org/10.18080/ajtde.v5n2.100.

Full text
Abstract:
The dynamic distributed topology of a Mobile Ad Hoc Network (MANET) provides a number of challenges associated with decentralised infrastructure where each node can act as the source, destination and relay for traffic. MANET’s are a suitable solution for distributed regional, military and emergency networks. MANETs do not utilise fixed infrastructure except where connectivity to carrier networks is required and MANET nodes provide the transmission capability to receive, transmit and route traffic from a sender node to the destination node. In this paper, we present a Packet Storage Time (PST) routing attack where an attacking node modifies its storage time and thereby does not forward packets to the intended recipient nodes. In the Human Immune System, cells are able to distinguish between a range of issues including foreign body attacks as well as cellular senescence. This paper presents an approach using Artificial Immune System based Danger signal (DS) and Pathogen Associated Molecular Pattern (PAMP) signal to identify a PST routing attack.
APA, Harvard, Vancouver, ISO, and other styles
24

Jim, Lincy Elizebeth, and Mark A. Gregory. "Utilisation of DANGER and PAMP signals to detect a MANET Packet Storage Time Attack." Journal of Telecommunications and the Digital Economy 5, no. 2 (June 5, 2017): 61–74. http://dx.doi.org/10.18080/jtde.v5n2.100.

Full text
Abstract:
The dynamic distributed topology of a Mobile Ad Hoc Network (MANET) provides a number of challenges associated with decentralised infrastructure where each node can act as the source, destination and relay for traffic. MANET’s are a suitable solution for distributed regional, military and emergency networks. MANETs do not utilise fixed infrastructure except where connectivity to carrier networks is required and MANET nodes provide the transmission capability to receive, transmit and route traffic from a sender node to the destination node. In this paper, we present a Packet Storage Time (PST) routing attack where an attacking node modifies its storage time and thereby does not forward packets to the intended recipient nodes. In the Human Immune System, cells are able to distinguish between a range of issues including foreign body attacks as well as cellular senescence. This paper presents an approach using Artificial Immune System based Danger signal (DS) and Pathogen Associated Molecular Pattern (PAMP) signal to identify a PST routing attack.
APA, Harvard, Vancouver, ISO, and other styles
25

Katz, Maya Balakirsky. "Photography Versus Caricature: "Footnotes" on Manet's Zola and Zola's Manet." Nineteenth Century French Studies 34, no. 3 (2006): 323–37. http://dx.doi.org/10.1353/ncf.2006.0026.

Full text
APA, Harvard, Vancouver, ISO, and other styles
26

Park, Ik-Kyun, Nam-Hi Kang, and Young-Han Kim. "A MANET Routing Protocol using Address Autoconfiguration in Zone-based MANETs." KIPS Transactions:PartC 13C, no. 7 (December 31, 2006): 897–904. http://dx.doi.org/10.3745/kipstc.2006.13c.7.897.

Full text
APA, Harvard, Vancouver, ISO, and other styles
27

Mahmood, Z., A. Hashim, O. Khalifa, F. Anwar, and S. Hameed. "Review paper of gateway selection schemes for MANET of NEMO (MANEMO)." IOP Conference Series: Materials Science and Engineering 53 (December 20, 2013): 012047. http://dx.doi.org/10.1088/1757-899x/53/1/012047.

Full text
APA, Harvard, Vancouver, ISO, and other styles
28

Salama, Hatem Mahmoud, Mohamed Zaki Abd El Mageed, Gouda Ismail Mohamed Salama, and Khaled Mahmoud Badran. "CSMCSM." International Journal of Information Security and Privacy 15, no. 1 (January 2021): 44–64. http://dx.doi.org/10.4018/ijisp.2021010103.

Full text
Abstract:
Many MANET research works are based on the popular informal definition that MANET is a wireless ad-hoc network that has neither infrastructure nor backbone and every network node is autonomous and moves depending on its mobility. Unfortunately, this definition pays no attention to the network servers that are essential in core-based, mission-critical, and military MANETs. In core-based MANETs, external intrusion detection systems (IDS) cannot detect internal Byzantine attacks; in addition, internal Byzantine fault tolerant (BFT) systems are unqualified to detect typical external wireless attack. Therefore, there is a real need to combine both internal and external mobile ad-hoc network (MANET) ID systems. Here, CSMCSM is presented as a two-level client server model for comprehensive security in MANETs that integrates internal and external attack detectors in one device. The internal component is based on a BFT consensus algorithm while the external component employs decision tree to classify the MANET attacks.
APA, Harvard, Vancouver, ISO, and other styles
29

Kanellopoulos, Dimitris N. "Congestion Control for NDN-Based MANETs." Journal of Organizational and End User Computing 33, no. 5 (September 2021): 111–34. http://dx.doi.org/10.4018/joeuc.20210901.oa6.

Full text
Abstract:
A mobile ad hoc network (MANET) has several intrinsic features that create unique queuing dynamics, and thus congestion control inside a MANET must be achieved under time-critical conditions. Meanwhile, the Named Data Networking (NDN) architecture ensures traffic optimization and has attracted renewed attention as part of the future internet. The synergy between NDN and MANETs can be exploited in order to improve the performance of dynamic content routing and congestion control mechanisms. This overview identifies the key concepts involved in congestion control for NDN-based MANETs. It also proposes some criteria for categorising existing congestion control solutions for NDN-based MANETs and discusses the advantages and disadvantages of each category. Future challenges regarding congestion control for NDN-based MANETs are also highlighted.
APA, Harvard, Vancouver, ISO, and other styles
30

Goyal, Vincy, Sunil Kumar Jangir, and Naveen Hemrajani. "Analysis of Routing Protocols for Large Scale Multihop Multirate MANETs." INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 10, no. 3 (August 5, 2013): 1440–44. http://dx.doi.org/10.24297/ijct.v10i3.3274.

Full text
Abstract:
In this paper, we perform rigorous analysis of MANET routing protocols selected from different categories over various scenarios using a large set of performance evaluation metrics. The traffic that we model on source-destination pairs is the video streams that consist of varying sized data frames and the inter-packet time is very low. In this way, we can check the MANET routing protocols over varying data sets and can provide the analysis that among the existing MANET routing protocols which routing protocol is best suited for data transmission over MANETs. To analyze the behavior of various routing protocols during the data communication in MANETs, we generate simulation results over various MANET scenarios consists of varying number of nodes and source destination pairs. The simulation process is done by using the open source simulator NS-3. We generate and analyze the scenarios where the effects of data communication is evaluated and analyzed over the increase in network mobility and network data traffic. The work is helpful for the students working on the various issues on MANETs as attacks, Quality-of-Service etc to identify which protocol they should use for their work as a base routing protocol. Â
APA, Harvard, Vancouver, ISO, and other styles
31

Haglan, Hussein M., Salama A. Mostafa, Noor Zuraidin Mohd Safar, Aida Mustapha, Mohd Zainuri Saringatb, Hosam Alhakami, and Wajdi Alhakami. "Analyzing the impact of the number of nodes on the performance of the routing protocols in manet environment." Bulletin of Electrical Engineering and Informatics 10, no. 1 (February 1, 2021): 434–40. http://dx.doi.org/10.11591/eei.v10i1.2516.

Full text
Abstract:
Mobile Ad-hoc Networks (MANETs) are independent systems that can work without the requirement for unified controls, pre-setup to the paths/routes or advance communication structures. The nodes/hubs of a MANET are independently controlled, which permit them to behave unreservedly in a randomized way inside the MANET. The hubs can leave their MANET and join different MANETs whenever the need arises. These attributes, in any case, may contrarily influence the performance of the routing conventions (or protocols) and the general topology of the systems. Along these lines, MANETs include uniquely planned routing conventions that responsively as well as proactively carry out the routing. This paper assesses and looks at the effectiveness (or performance) of five directing conventions which are AOMDV, DSDV, AODV, DSR and OLSR in a MANET domain. The research incorporates executing a simulating environment to look at the operation of the routing conventions dependent on the variable number of hubs. Three evaluation indices are utilized: Throughput (TH), Packet Delivery Ratio (PDR), and End-to-End delay (E2E). The assessment outcomes indicate that the AODV beats other conventions in the majority of the simulated scenarios.
APA, Harvard, Vancouver, ISO, and other styles
32

Chen, Juan, Hong Shan, and Tao Ma. "A Study of Modeling Mobile Ad-Hoc Networks Attacks." Advanced Materials Research 546-547 (July 2012): 1217–22. http://dx.doi.org/10.4028/www.scientific.net/amr.546-547.1217.

Full text
Abstract:
Mobile ad-hoc networks (MANETs) are especially vulnerable to attacks because of lacking infrastructure and data transfer using radio communication. In the past various types of MANET attacks have been detected and analyzed. This paper presents the enhanced attack trees for MANET attacks, which is completed by extending the basic attack trees. The enhanced attack trees add the types between nodes and the attributes of nodes. Finally this paper shows how to represent the Block hole attacks in MANETs by means of the enhanced attack trees.
APA, Harvard, Vancouver, ISO, and other styles
33

Kanellopoulos, Dimitris N. "QoS Routing for Multimedia Communication over Wireless Mobile Ad Hoc Networks." International Journal of Multimedia Data Engineering and Management 8, no. 1 (January 2017): 42–71. http://dx.doi.org/10.4018/ijmdem.2017010103.

Full text
Abstract:
A lot of intensive research has been carried out in the direction of providing multimedia communication over wireless mobile ad hoc network (MANET). In MANET, various QoS problems exist such as inefficient routing, handling node mobility, power conservation, limited processing capabilities of network devices, high error rates. Wireless routing introduces new challenges as applying basic routing algorithms directly on MANET could lead to large power consumption, interference, and load-balancing problems. Many routing algorithms have been proposed as extensions to the basic routing algorithms to enhance their performance in MANETs. This paper summarizes existing solutions on QoS routing and resource reservation mechanisms in order to provide multimedia communication over MANET. It also considers the limitations of existing QoS models with regard to satisfying QoS in serving multimedia over MANET. The newest QoS architectures give much better results in providing QoS support. However, more refinements must be proposed in order to enhance further their performance in MANETs.
APA, Harvard, Vancouver, ISO, and other styles
34

R., Srividya, and Ramesh B. "Implementation of AES using biometric." International Journal of Electrical and Computer Engineering (IJECE) 9, no. 5 (October 1, 2019): 4266. http://dx.doi.org/10.11591/ijece.v9i5.pp4266-4276.

Full text
Abstract:
Mobile Adhoc network is the most advanced emerging technology in the field of wireless communication. MANETs mainly have the capacity of self-forming, self-healing, enabling peer to peer communication between the nodes, without relying on any centralized network architecture. MANETs are made applicable mainly to military applications, rescue operations and home networking. Practically, MANET could be attacked by several ways using multiple methods. Research on MANET emphasizes on data security issues, as the Adhoc network does not befit security mechanism associated with static networks. This paper focuses mainly on data security techniques incorporated in MANET. Also this paper proposes an implementation of Advanced Encryption Standard using biometric key for MANETs. AES implementation includes, the design of most robust Substitution-Box implementation which defines a nonlinear behavior and mitigates malicious attacks, with an extended security definition. The key for AES is generated using most reliable, robust and precise biometric processing. In this paper, the input message is encrypted by AES powered by secured nonlinear S-box using finger print biometric feature and is decrypted using the reverse process.
APA, Harvard, Vancouver, ISO, and other styles
35

Velagaleti, Sesha Bhargavi, Dr M. Seetha, and Dr S. Viswanadha Raju. "A Simulation and analysis of DSR Protocol in Mobile ad hoc Networks." INTERNATIONAL JOURNAL OF MANAGEMENT & INFORMATION TECHNOLOGY 8, no. 1 (November 25, 2013): 1279–86. http://dx.doi.org/10.24297/ijmit.v8i1.692.

Full text
Abstract:
A MANET can be treated as a network in which the nodes have the capability of self-configuring among themselves. These nodes are connected by wireless links to form an distributed topology without the help of any pre-existing infrastructure. Each node in a MANET can itself act as a router on its own. To perform effective routing operation in MANETS , several routing protocols were proposed, addressing several issues in MANETS. In this paper ,we tried to study the operation of DSDV protocol ,which is a proactive protocol and analyse the results obtained by simualting the DSDV protocol using NS-2 Simulator.
APA, Harvard, Vancouver, ISO, and other styles
36

A.Y., Prasad, and Balakrishna Rayanki. "A generic algorithmic protocol approaches to improve network life time and energy efficient using combined genetic algorithm with simulated annealing in MANET." International Journal of Intelligent Unmanned Systems 8, no. 1 (July 8, 2019): 23–42. http://dx.doi.org/10.1108/ijius-02-2019-0011.

Full text
Abstract:
Purpose In the present networking scenarios, MANETs mainly focus on reducing the consumed power of battery-operated devices. The transmission of huge data in MANETs is responsible for greater energy usage, thereby affecting the parameter metrics network performance, throughput, packet overhead, energy consumption in addition to end-to-end delay. The effective parameter metric measures are implemented and made to enhance the network lifetime and energy efficiency. The transmission of data for at any node should be more efficient and also the battery of sensor node battery usage should be proficiently applied to increase the network lifetime. The paper aims to discuss these issues. Design/methodology/approach In this research work for the MANETs, the improvement of energy-efficient algorithms in MANETs is necessary. The main aim of this research is to develop an efficient and accurate routing protocol for MANET that consumes less energy, with an increased network lifetime. Findings In this paper, the author has made an attempt to improve the genetic algorithm with simulated annealing (GASA) for MANET to minimize the energy consumption of 0.851 percent and to enhance the network lifetime of 61.35 percent. Originality/value In this paper, the author has made an attempt to improve the GASA for MANET to minimize the energy consumption of 0.851 percent and to enhance the network lifetime of 61.35 percent.
APA, Harvard, Vancouver, ISO, and other styles
37

Et. al., Suneetha Bulla,. "A Comprehensive Survey on Cryptography Evaluation in Mobile (MANETs)." Turkish Journal of Computer and Mathematics Education (TURCOMAT) 12, no. 2 (April 10, 2021): 3406–16. http://dx.doi.org/10.17762/turcomat.v12i2.2402.

Full text
Abstract:
With the rapid development in network technology new network types based on wireless communication have emerged. A large family of wireless communication networks is the Mobile Ad hoc Networks (MANETs). While MANETs mobile devices should be able to connect with each other at any time and place, the vulnerabilities of MANET structure also introduce a wide range of attacks and present new challenges for the design of security mechanism ranging from developing and implementing lightweight cryptographic primitives to designing and analyzing secure protocols. Numerous security solutions and key management schemes such as symmetric and asymmetric cryptography have been used to support MANET environment. This paper conducted survey to gain a quick knowledge of security design demand and cryptography solutions to secure MANET. This survey focused on security schemas and case studies of cryptography techniques on Ad Hoc networks. Finally, conclusions are discussed.
APA, Harvard, Vancouver, ISO, and other styles
38

Hanin, Moulay Hicham, Mohamed Amnai, and Youssef Fakhri. "New adaptation method based on cross layer and TCP over protocols to improve QoS in mobile ad hoc network." International Journal of Electrical and Computer Engineering (IJECE) 11, no. 3 (June 1, 2021): 2134. http://dx.doi.org/10.11591/ijece.v11i3.pp2134-2142.

Full text
Abstract:
Due to rapid growth of multimedia traffic used over the mobile ad-hoc networks (MANETs), to keep up with the progress of this constraints MANETs protocols becoming increasingly concerned with the quality of service. In view of the random mobility nodes in MANET, TCP becomes more unreliability in case of higher energy consumption and packet loss. In this paper we proposed a new optimization approach to enhance decision making of TCP based on some changes of IEEE 802.11 MAC uses cross layer approach. The aim is to minimize the impact of retransmissions of packet lost and energy consumption in order to analysed and chose the appropriate routing protocol for TCP that can be enhance QoS MANET. Our simulation results based QoS study using NS3 show that, our proposed achieves better performance of TCP in MANETs significantly, and also improved the throughput, energy consumption and facilitates the traffic transmission over routing protocol.
APA, Harvard, Vancouver, ISO, and other styles
39

Rath, Mamata, and Binod Kumar Pattanayak. "Security Protocol with IDS Framework Using Mobile Agent in Robotic MANET." International Journal of Information Security and Privacy 13, no. 1 (January 2019): 46–58. http://dx.doi.org/10.4018/ijisp.2019010104.

Full text
Abstract:
Nanotechnologies guarantee new potential outcomes for maintaining accessibility issues in versatile robots in an automated based Mobile Adhoc Networks (MANETs). In multi-robot frameworks, with a devastation situation, military applications, hunt and save operations and normal hardships, this issue is much more basic. Auspicious correspondence and sending control messages in a MANET which is reasonable for these intense circumstances starts with one robot then onto the next is a critical factor in every one of these operations. This makes it is a security issue in MANETs because of the auto-reconfiguration nature of the system which does not depend on any settled infrastructure-based foundation. There is dynamic change in its topology because of rapidly moving versatile nodes. This article features few security issues emerging because of network matter among robots and proposes a lively MANET-based automated convention called PD-ROBO with a committed Intrusion Detection System (IDS) structure that utilizations portable operator method to stay away from replay assault in mechanical based MANET.
APA, Harvard, Vancouver, ISO, and other styles
40

da Silva Rodrigues, Carlo Kleber, and Vladimir Emiliano Moreira Rocha. "BT-MANET: A Novel BitTorrent-Like Algorithm for Video On-Demand Streaming over MANETs." IEEE Latin America Transactions 17, no. 01 (January 2019): 78–84. http://dx.doi.org/10.1109/tla.2019.8826698.

Full text
APA, Harvard, Vancouver, ISO, and other styles
41

Hikal, Noha A., Mahmoud Y. Shams, Hanaa Salem, and Marwa M. Eid. "Detection of black-hole attacks in MANET using adaboost support vector machine." Journal of Intelligent & Fuzzy Systems 41, no. 1 (August 11, 2021): 669–82. http://dx.doi.org/10.3233/jifs-202471.

Full text
Abstract:
Mobile Ad hock Networks (MANETs) are currently used for developing the privacy and accuracy of modern networks. Furthermore, MANET applications are fit to be data-oriented systems, that introduce a secure and more robust data transmission protocol making it a topmost priority in the design. The lack of infrastructure in the existence of dynamic topology as well as limited resources of MANET is a major challenge facing those interested in the field. Further, the nonexistence of a formerly authorized trust relationship within the connected nodes produces instability of the detection process in MANETs. Basically, by adding adapted LEACH routing protocol to MANET, enhancement of the preserved nodes vitality will be achieved, moreover, the load balancing with data loss reduction provides MANET ability to tracks along with shortest and limited paths. This paper proposes a newly developed detection scheme for both active and passive black-hole attacks in MANETs. Moreover, the scheme deals with assessing a group of selected features for each node-based AdaBoost-SVM algorithm. These features are collected from cluster members nodes based on Ad hoc On-demand Multipath Distance Vector (OMDV) with LEACH routing protocol clustering approaches. Although SVM is considered a more stable classifier, there are great influences of the AdaBoost weight adaption algorithm to enhance the classification process in terms of strengthening the weights of extracted features. This hybrid algorithm is essential for active black-hole attacks as well as for identifying passive black-hole attacks in MANET. The proposed scheme is tested against the effect of mobility variation to determine the accuracy of the detection process including the routing overhead protocol. The experimental results investigated that the accuracy of detecting both active and passive black-holes attacks in MANET reached 97% with a promising time complexity for different mobility conditions. Moreover, the proposed scheme provides an accurate decision about malicious vs benign node dropping behavior using an adjustable threshold value.
APA, Harvard, Vancouver, ISO, and other styles
42

Al-Shehri, Salman, and Pavel Loskot. "Enhancing Reliability of Tactical MANETs by Improving Routing Decisions." Journal of Low Power Electronics and Applications 8, no. 4 (November 28, 2018): 49. http://dx.doi.org/10.3390/jlpea8040049.

Full text
Abstract:
Mobile ad-hoc networks (MANETs) have been primarily designed to enhance tactical communications in a battlefield. They provide dynamic connectivity without requiring any pre-existing infrastructure. Their multi-hop capabilities can improve radio coverage significantly. The nature of tactical MANET operations requires more specialized routing protocols compared to the ones which are used in commercial MANET. Routing decisions in MANETs are usually conditioned on signal-to-interference-plus-noise ratio (SINR) measurements. In order to improve routing decisions for use in highly dynamic tactical MANETs, this paper proposes to combine two different metrics to achieve reliable multicast in multi-hop ad hoc networks. The resulting protocol combining received signal strength (RSS) with SINR to make routing decisions is referred to as Link Quality Aware Ad-hoc On-Demand Distance Vector (LQA-AODV) routing. The proposed routing protocol can quickly adapt to dynamic changes in network topology and link quality variations often encountered in tactical field operations. Using computer simulations, the performance of proposed protocol is shown to outperform other widely used reactive routing protocols assuming several performance metrics.
APA, Harvard, Vancouver, ISO, and other styles
43

Ahirwal, Ramratan, Nitesh Kumar Chaurasiya, and Yogendra Kumar Jain. "An Algorithm to reduce End to End Delay AND Enhance the Quality of Service in Mobile Adhoc Network." INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 12, no. 1 (December 15, 2013): 3147–57. http://dx.doi.org/10.24297/ijct.v12i1.3368.

Full text
Abstract:
A mobile adhoc network (MANET) is formed by a group of wireless mobile hosts or nodes without any fixed infrastructure. As there is no inner control in a MANET, a mobile node itself acts as a router. Undoubtedly, MANETs plays a critical job in situations where a wired infrastructure is neither available nor easy to install. Wireless mesh networks have large round trip time variations and these variations are dependent on the number of hops. The end-to-end throughput degrades rapidly with increase in number of hops. This is one of the biggest problems in MANET.In this paper we introduce an algorithm for avoiding congestion in MANETs. The algorithm demonstrates fast response and superior stability with the controlled packet dropping rate, and reduces end-to-end delay in MANETs, while still fully utilizing the network resources. Analysis and simulation show the strength and robustness of the algorithm. This method is simple and easy to use. We also illustrate the advantages of our proposed approach by comparing its results with standard AODV with recommended parameter settings.
APA, Harvard, Vancouver, ISO, and other styles
44

Abdollahi Nami, A., and L. Rajabion. "Data replication techniques in the mobile ad hoc networks." International Journal of Pervasive Computing and Communications 15, no. 3/4 (November 4, 2019): 174–98. http://dx.doi.org/10.1108/ijpcc-06-2019-0051.

Full text
Abstract:
Purpose A mobile ad hoc network (MANET) enables providers and customers to communicate without a fixed infrastructure. Databases are extended on MANETs to have easy data access and update. As the energy and mobility limitations of both servers and clients affect the availability of data in MANETs, these data are replicated. The purpose of this paper is to provide a literature review of data replication issues and classify the available strategies based on the issues they addressed. Design/methodology/approach The selected articles are reviewed based on the defined criteria. Also, the differences, the advantages and disadvantages of these techniques are described. The methods in the literature can be categorized into three groups, including cluster-based, location-based and group-based mechanisms. Findings High flexibility and data consistency are the features of cluster-based mechanisms. The location-based mechanisms are also appropriate for replica allocation, and they mostly have low network traffic and delay. Also, the group-based mechanism has high data accessibility compared to other mechanisms. Data accessibility and time have got more attention to data replication techniques. Scalability as an important parameter must be considered more in the future. The reduction of storage cost in MANETs is the main goal of data replication. Researchers have to consider the cost parameter when another parameter will be influenced. Research limitations/implications Data replication in MANETs has been covered in different available sources such as Web pages, technical reports, academic publications and editorial notes. The articles published in national journals and conferences are ignored in this study. This study includes articles from academic main international journals to get the best capability. Originality/value The paper reviews the past and the state-of-the-art mechanisms in data replication in MANET. Exclusively, data replication’s main goal, existing challenges, research terminologies and mechanisms in MANET are summarized using the answers to the research questions. This method will help researchers in the future to develop more effective data replication method in MANET.
APA, Harvard, Vancouver, ISO, and other styles
45

Et. al., S. Arivarasan,. "An Energy Efficient Qos Routing Protocol Based On Red Deer Algorithm In MANET." Turkish Journal of Computer and Mathematics Education (TURCOMAT) 12, no. 5 (April 11, 2021): 1461–71. http://dx.doi.org/10.17762/turcomat.v12i5.2112.

Full text
Abstract:
MANETs (Mobile ad hoc networks) are overloaded with their heavy usage choking traffic. Recent studies have been attempting to find feasibility of routes in these networks. Most proposed schemes have failed to consider the network traffic or MANET requirements. MANET routing done by RPs (Routing Protocols) would perform better when they adhere to QoS (Quality of Service) or application requirements. As a result, RPs must satisfy numerous QoS metrics at a time where soft computing algorithm based RPs are a solution to QoS routing problems. Evolutionary algorithm based routing do not achieve enough energy efficiency which is a major drawback. To overcome this drawback, this work, proposes Red Deer algorithm (RDA) based energy efficient QoS routing for MANETs called (RDA-EQRP). The proposed RDA based routing algorithm discovers the shortest path from a source to a destination which can consumes less energy while supporting the metrics such of reliability, bandwidth, SRC (Static Resource Capacity), Quality and delay. Simulation results show that proposed rotting scheme RDA-EQRP consumes lesser energy in MANET routing.
APA, Harvard, Vancouver, ISO, and other styles
46

Mijanovic, Srdjan. "MANEVRO." ACM SIGPLAN Notices 27, no. 11 (November 1992): 85–89. http://dx.doi.org/10.1145/141018.141057.

Full text
APA, Harvard, Vancouver, ISO, and other styles
47

Jain, Ashish, and Vrinda Tokekar. "Security Enhancement of AODV Protocol using Fuzzy based Trust Computation in Mobile Ad Hoc Networks." Oriental journal of computer science and technology 10, no. 1 (March 25, 2017): 94–102. http://dx.doi.org/10.13005/ojcst/10.01.13.

Full text
Abstract:
Mobile ad hoc network (MANET) possess self-configuration, self-control and self-maintenance capabilities. Nodes of MANET are autonomous routers. Hence, they are vulnerable to security attacks. Collaborative attacks such as black hole and wormhole in MANET are difficult to be detected and prevented. Trust based routing decision is an effective approach for security enhancement in MANET. In this study, trust computing using fuzzy based max-product composition scheme is applied to compute aggregated trust values to determine malicious nodes and thereby safe route in MANETs. The results show performance improvement of proposed protocol over AODV protocol. Network metrics are analysed under different mobility conditions and different positions of black hole nodes.
APA, Harvard, Vancouver, ISO, and other styles
48

Chauhan, Naveen, Lalit K. Awasthi, Narottam Chand, R. C. Joshi, and Manoj Misra. "Cooperative Caching in Mobile Ad Hoc Networks." International Journal of Mobile Computing and Multimedia Communications 3, no. 3 (July 2011): 20–35. http://dx.doi.org/10.4018/jmcmc.2011070102.

Full text
Abstract:
Mobile ad hoc network (MANET) presents a constrained communication environment due to fundamental limitations of client’s resources, insufficient wireless bandwidth and users’ frequent mobility. MANETs have many distinct characteristics which distinguish them from other wireless networks. Due to frequent network disconnection, data availability is lower than traditional wired networks. Cooperative caching helps MANETs in alleviating the situation of non availability of data. In this paper, the authors present a scheme called global cluster cooperation (GCC) for caching in mobile ad hoc networks. In this scheme, network topology is partitioned into non-overlapping clusters based on the physical network proximity. This approach fully exploits the pull mechanism to facilitate cache sharing in a MANET. Simulation experiments show that GCC mechanism achieves significant improvements in cache hit ratio and average query latency in comparison with other caching strategies.
APA, Harvard, Vancouver, ISO, and other styles
49

Böse, Joos-Hendrik, and Jürgen Broß. "Reducing Blocking Risks of Atomic Transactions in MANETs Using a Backup Coordinator." International Journal of Ambient Computing and Intelligence 2, no. 4 (October 2010): 44–54. http://dx.doi.org/10.4018/jaci.2010100104.

Full text
Abstract:
In this paper, the authors present a probabilistic model to evaluate the reliability of the atomic commit for distributed transactions in mobile ad-hoc networks (MANETs). This model covers arbitrary MANET scenarios as well as strict and semantic transaction models. The authors evaluate the approach to integrate a backup coordinator to reduce blocking risks. For the purpose of showing an example of a MANET scenario, the authors illustrate how the considered blocking probability is very low.
APA, Harvard, Vancouver, ISO, and other styles
50

Gangwar, Sanjeev. "Mobile Ad Hoc Networks: Comparasion of Multipath Routing Protocols with Unipath Routing Protocols." INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 5, no. 3 (May 30, 2013): 193–99. http://dx.doi.org/10.24297/ijct.v5i3.3520.

Full text
Abstract:
The latest technology MANETs is being studied widely and attracting a large variety of applications. Due to varying network topology, The most common challenging factor in MANET is routing [1][2]. Future applications of MANETs are expected to be based on all-IP architecture and be capable of carrying multitude real-time multimedia applications such as voice and video as well as data. It is very necessary for MANETs to have an efficient routing and quality of service (QoS) mechanism to support diverse applications. In this research paper, we study the various unipath routing protocols such as DSDV, WRP,GSR,FSR,AODV,DSR,CBRP and various Multipath routing protocols such as AOMDV,SMR,AODVM,MSR.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography