Academic literature on the topic 'MANETs'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'MANETs.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "MANETs"
Sirajuddin, Mohammad, Ch Rupa, Celestine Iwendi, and Cresantus Biamba. "TBSMR: A Trust-Based Secure Multipath Routing Protocol for Enhancing the QoS of the Mobile Ad Hoc Network." Security and Communication Networks 2021 (April 21, 2021): 1–9. http://dx.doi.org/10.1155/2021/5521713.
Full textEltahlawy, Ahmed M., Heba K. Aslan, Eslam G. Abdallah, Mahmoud Said Elsayed, Anca D. Jurcut, and Marianne A. Azer. "A Survey on Parameters Affecting MANET Performance." Electronics 12, no. 9 (April 22, 2023): 1956. http://dx.doi.org/10.3390/electronics12091956.
Full textDivya, K., and B. Srinivasan. "Trust Based Secure Multipath Routing Protocol for MANET." International Journal of Computer Science and Mobile Computing 10, no. 5 (May 30, 2021): 72–80. http://dx.doi.org/10.47760/ijcsmc.2021.v10i05.008.
Full textDebnath, Sumon Kumar, Mousumi Saha, Md Manowarul Islam, Prodip Kumar Sarker, and Ileas Pramanik. "Evaluation of Multicast and Unicast Routing Protocols Performance for Group Communication with QoS Constraints in 802.11 Mobile Ad-hoc Networks." International Journal of Computer Network and Information Security 13, no. 1 (February 8, 2021): 1–15. http://dx.doi.org/10.5815/ijcnis.2021.01.01.
Full textKurni, Muralidhar, and Saritha K. "‘Power-as-a-Service’ – A Hierarchical On-Demand Charging Model for Recharging the Mobile Nodes of MANETs." International Journal of Interactive Mobile Technologies (iJIM) 15, no. 12 (June 18, 2021): 170. http://dx.doi.org/10.3991/ijim.v15i12.23081.
Full textKanellopoulos, Dimitris N. "Congestion Control for NDN-Based MANETs." Journal of Organizational and End User Computing 33, no. 5 (September 2021): 111–34. http://dx.doi.org/10.4018/joeuc.20210901.oa6.
Full textNourildean, Shayma Wail, Yousra Abd Mohammed, and Abdulkreem Mohammed Salih. "Mobile Ad Hoc Network Improvement against Jammers for Video Applications Using Riverbed Modeler (v17.5)." Webology 19, no. 1 (January 20, 2022): 1446–59. http://dx.doi.org/10.14704/web/v19i1/web19096.
Full textAl Sharah, Ashraf, Taiwo Oyedare, and Sachin Shetty. "Detecting and Mitigating Smart Insider Jamming Attacks in MANETs Using Reputation-Based Coalition Game." Journal of Computer Networks and Communications 2016 (2016): 1–13. http://dx.doi.org/10.1155/2016/4289176.
Full textSalama, Hatem Mahmoud, Mohamed Zaki Abd El Mageed, Gouda Ismail Mohamed Salama, and Khaled Mahmoud Badran. "CSMCSM." International Journal of Information Security and Privacy 15, no. 1 (January 2021): 44–64. http://dx.doi.org/10.4018/ijisp.2021010103.
Full textDeeptha, R. "A Comprehensive Survey of Routing Attacks and Defense Mechanisms in MANETs." Webology 18, Special Issue 04 (December 8, 2021): 1479–98. http://dx.doi.org/10.14704/web/v18si04/web18286.
Full textDissertations / Theses on the topic "MANETs"
Krichène, Mohamed Foued. "Contacts in MANETs." [S.l.] : Universität Stuttgart / Fakultät Informatik, Elektrotechnik und Informationstechnik, 2003. http://www.bsz-bw.de/cgi-bin/xvms.cgi?SWB11144239.
Full textUr-Rehman, Shoaib, and Irshan Ullah. "Analysis of Black Hole attack on MANETs Using different MANET routing protocol." Thesis, Blekinge Tekniska Högskola, Sektionen för datavetenskap och kommunikation, 2010. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-1151.
Full textULLAH, IRSHAD, and SHOAIB UR REHMAN. "Analysis of Black Hole Attack on MANETs Using Different MANET Routing Protocols." Thesis, Blekinge Tekniska Högskola, Sektionen för datavetenskap och kommunikation, 2010. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-2505.
Full textGironés, Quesada Luis. "A Routing Protocol for MANETs." Thesis, Norwegian University of Science and Technology, Department of Telematics, 2007. http://urn.kb.se/resolve?urn=urn:nbn:no:ntnu:diva-9513.
Full textIn this master thesis there has been a description of what MANETs are and why they are so interesting. Because of its characteristics, the tradicional routing protocols for wired networks are not advisable for them. A specific routing protocol for MANETs is necessary. In this thesis the main groups of these protocols have been explained and some of the most commonly used of them were studied. We saw that each protocol is better in a specific environment. None of them are perfect for all the ranges of nodes mobility, traffic, number of nodes, etc. The two main groups of protocols studied are the proactive and the reactive ones. The main characteristic of the proactive is that each node maintains a route to every node in the network. Besides, it periodically updates this information. No matter if there is communication between the nodes or not. As representative examples of proactive protocols, OLSR and DSDV were described here. On the other hand, in the reactive ones the nodes only calculate the routes between those nodes that want to communicate. This kind of protocols perform in a more efficient usage of the bandwith (which is very limited in the MANETs medium) and the resources of the nodes. However, as a drawback, when the route is not available yet, the delay to achieve it can be great. The reactive protocols choosen here to be studied were AODV and DSR. In the reactive, the main problem is the delay to achieve a new route. In the proactive, it is the high usage of resources and bandwith when it is not necessary. Both, reactive and proactive also have the problem of the scalability. To solve these problems, a new kind of protocols appeared: the hybrid ones. A hybrid routing protocol combines both, the proactive and reactive to achieve better performance. The most popular of them is ZRP and its operation was described here too. None of the existing protocols are suitable for a MANET with a large number of nodes, each one of them with a different velocity and traffic. ZRP solves in part the problem of the scalabilty, but under different patterns of traffic and nodes velocity performs worse than the OLSR, DSR and AODV. Understanding the strengths and weaknesses of each protocol, a new one was proposed. The objective of this new protocol was to be suitable to MANETs with nodes moving freely, with different ranges of speed and traffic. Also, another objective was to improve the scalability of the reactive and proactive protocols. The protocol proposed here was called Penaguila. As ZRP and other hybrid routing protocols, it is based on having some nodes working in proactive mode creating areas, and comunicating this areas with other nodes working in reactive mode. The difference between Penaguila and ZRP, is that Penaguila takes into acount the speed and traffic of each node. Therefore, Penaguila tries to have each node working in the mode more suitable for itself. Also, an evaluation of the OLSR, AODV, DSR, ZRP and Penaguila has been done. Since it was not possible to program Penaguila in NS-2 because of the short time to write the thesis, it was only feasible to do a qualitative study. In this study the advantages and disadvantages of each protocol were exposed and the concluision was that Penaguila can outperform the existing protocols when: A) The network is large, since it is a hierarchical routing protocol. B) The nodes have very different speeds and amount of traffic.
Pham, Vinh. "Performing Gateway Load Balancing in MANETs." Doctoral thesis, Norges teknisk-naturvitenskapelige universitet, Institutt for telematikk, 2012. http://urn.kb.se/resolve?urn=urn:nbn:no:ntnu:diva-15131.
Full textXu, Sanlin, and SanlinXu@yahoo com. "Mobility Metrics for Routing in MANETs." The Australian National University. Faculty of Engineering and Information Technology, 2007. http://thesis.anu.edu.au./public/adt-ANU20070621.212401.
Full textLüthy, Michael. "Bild und Blick in Manets Malerei /." Berlin : Gebr. Mann, 2003. http://catalogue.bnf.fr/ark:/12148/cb38990881x.
Full textXu, Sanlin. "Mobility metrics for routing in MANETs /." View thesis entry in Australian Digital Theses Program, 2007. http://thesis.anu.edu.au/public/adt-ANU20070621.212401/index.html.
Full textShariat, Shahin. "Spectrum-aware routing in cognitive radio MANETs." Thesis, University of Surrey, 2018. http://epubs.surrey.ac.uk/845510/.
Full textJazyah, Yahia Hasan. "Modified location aided routing protocol for UWB MANETs." Thesis, University of Salford, 2011. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.543508.
Full textBooks on the topic "MANETs"
Söntgen, Beate. Manets Pathos. Berlin: August, 2012.
Find full textStefan, Barmann, ed. Zeitgenossenschaft: Zur Malerei Edouard Manets. München: Sieveking, 2014.
Find full text1832-1883, Manet Edouard, ed. Bild und Blick in Manets Malerei. Berlin: Gebr. Mann, 2003.
Find full textZelinsky, Barbara. Pablo Picassos Paraphrasen auf Edouard Manets "Frühstück im Grünen": Tableau eines künstlerischen Prozesses. Ilmtal-Weinstrasse: VDG als Imprint von arts + science weimar GmbH, 2019.
Find full textGiōrgos kai Helenē Maneta: Yiorgos and Eleni Manetas. Athēna: Mouseio Benakē, 2010.
Find full textManets neue Kleider: Zur künstlerischen Rezeption der "Olympia", des "Frühstücks im Grünen" und der "Bar in den Folies-Bergère". Hildesheim: Olms, 2014.
Find full textWeiss, Stefan Arriaga. El manati (Trichechus manatus) en Tabasco: Informe técnico. Villahermosa, Tabasco, México: Universidad Juárez Autónoma de Tabasco, División Académica de Ciencias Biológicas, 1993.
Find full textManet: The paintings of Manet. London: Hamlyn, 1989.
Find full textManet. Tunbridge Wells: Ticktock, 2008.
Find full textManet. Mankato, MN: Newforest Press, 2010.
Find full textBook chapters on the topic "MANETs"
Li, Wenjia, James Parker, and Anupam Joshi. "Security through Collaboration in MANETs." In Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, 696–714. Berlin, Heidelberg: Springer Berlin Heidelberg, 2009. http://dx.doi.org/10.1007/978-3-642-03354-4_51.
Full textZhai, Jian, Qing Li, and Xiang Li. "Data Caching in Selfish MANETs." In Networking and Mobile Computing, 208–17. Berlin, Heidelberg: Springer Berlin Heidelberg, 2005. http://dx.doi.org/10.1007/11534310_24.
Full textYuste, Antonio J., Alicia Triviño, Fco David Trujillo, Eduardo Casilari, and Antonio Díaz-Estrella. "Connectivity Gateway Discovery in MANETs." In Wireless Systems and Mobility in Next Generation Internet, 128–41. Berlin, Heidelberg: Springer Berlin Heidelberg, 2008. http://dx.doi.org/10.1007/978-3-540-89183-3_11.
Full textObaid, Abdellatif, and Azzedine Khir. "Service Discovery Protocols for MANETs." In Wireless Ad Hoc and Sensor Networks, 143–63. London, UK: ISTE, 2010. http://dx.doi.org/10.1002/9780470610893.ch7.
Full textOliveira, Carlos A. S., and Panos M. Pardalos. "Power-Aware Routing in MANETs." In Springer Optimization and Its Applications, 163–75. New York, NY: Springer New York, 2011. http://dx.doi.org/10.1007/978-1-4614-0311-1_12.
Full textZhang, Dongsheng, and James P. G. Sterbenz. "Modelling Critical Node Attacks in MANETs." In Self-Organizing Systems, 127–38. Berlin, Heidelberg: Springer Berlin Heidelberg, 2014. http://dx.doi.org/10.1007/978-3-642-54140-7_11.
Full textGhassemi, Fatemeh, Saeide Ahmadi, Wan Fokkink, and Ali Movaghar. "Model Checking MANETs with Arbitrary Mobility." In Fundamentals of Software Engineering, 217–32. Berlin, Heidelberg: Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-40213-5_14.
Full textTschudin, Christian, Henrik Lundgren, and Erik Nordström. "Embedding MANETs in the Real World." In Personal Wireless Communications, 578–89. Berlin, Heidelberg: Springer Berlin Heidelberg, 2003. http://dx.doi.org/10.1007/978-3-540-39867-7_56.
Full textGohs, Rasmus Sidorovs, Sigurður Rafn Gunnarsson, and Arne John Glenstrup. "Beddernet: Application-Level Platform-Agnostic MANETs." In Distributed Applications and Interoperable Systems, 165–78. Berlin, Heidelberg: Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-21387-8_13.
Full textChandrakant, N. "Administrating MANETs Via Brain Computer Interface." In Advances in Intelligent Systems and Computing, 259–65. New Delhi: Springer India, 2014. http://dx.doi.org/10.1007/978-81-322-1771-8_23.
Full textConference papers on the topic "MANETs"
Lee, Seung-Hoon, Starsky H. Y. Wong, Chi-Kin Chau, Kang-Won Lee, Jon Crowcroft, and Mario Gerla. "InterMR: Inter-MANET routing in heterogeneous MANETs." In 2010 IEEE 7th International Conference on Mobile Ad-Hoc and Sensor Systems (MASS). IEEE, 2010. http://dx.doi.org/10.1109/mass.2010.5663948.
Full textFlores, Hector, Stephan Eidenbenz, Rudolf Riedi, and Nick Hengartner. "Describing MANETS." In the 3rd ACM international workshop. New York, New York, USA: ACM Press, 2006. http://dx.doi.org/10.1145/1163610.1163630.
Full textAmin, Rahul, and Greg Kuperman. "PIM-MANET: Extension to PIM for multicast routing in MANETs." In MILCOM 2015 - 2015 IEEE Military Communications Conference. IEEE, 2015. http://dx.doi.org/10.1109/milcom.2015.7357428.
Full textKargl, Frank, and Elmar Schoch. "Simulation of MANETs." In the 1st international workshop. New York, New York, USA: ACM Press, 2007. http://dx.doi.org/10.1145/1247721.1247730.
Full textBaccelli, E., and J. Schiller. "Towards scalable MANETs." In 2008 8th International Conference on ITS Telecommunications (ITST). IEEE, 2008. http://dx.doi.org/10.1109/itst.2008.4740243.
Full textFossa, C. E., and T. G. Macdonald. "Internetworking tactical MANETs." In MILCOM 2010 - 2010 IEEE Military Communications Conference. IEEE, 2010. http://dx.doi.org/10.1109/milcom.2010.5680456.
Full textSharma, Bharti, Rabinder Singh Bhatia, and Awadhesh Kumar Singh. "DMX in MANETs." In the International Conference. New York, New York, USA: ACM Press, 2011. http://dx.doi.org/10.1145/2007052.2007063.
Full textSadeghi, Mohammad, and Saadiah Yahya. "Analysis of Wormhole attack on MANETs using different MANET routing protocols." In 2012 Fourth International Conference on Ubiquitous and Future Networks (ICUFN). IEEE, 2012. http://dx.doi.org/10.1109/icufn.2012.6261716.
Full textKumar, Suresh, Gaurav Pruthi, Ashwani Yadav, and Mukesh Singla. "Security Protocols in MANETs." In Communication Technologies (ACCT). IEEE, 2012. http://dx.doi.org/10.1109/acct.2012.101.
Full textSingh, Prateek K., Koushik Kar, and Charles Kamhoua. "Reputation Routing in MANETs." In 2017 IEEE 86th Vehicular Technology Conference (VTC-Fall). IEEE, 2017. http://dx.doi.org/10.1109/vtcfall.2017.8288226.
Full textReports on the topic "MANETs"
Clausen, T., C. Dearlove, and B. Adamson. Jitter Considerations in Mobile Ad Hoc Networks (MANETs). RFC Editor, February 2008. http://dx.doi.org/10.17487/rfc5148.
Full textClausen, T., and C. Dearlove. Representing Multi-Value Time in Mobile Ad Hoc Networks (MANETs). RFC Editor, March 2009. http://dx.doi.org/10.17487/rfc5497.
Full textCardenas, Alvaro A., Vahid Ramezani, and John S. Baras. HMM Sequential Hypothesis Tests for Intrusion Detection in MANETs Extended Abstract. Fort Belvoir, VA: Defense Technical Information Center, January 2003. http://dx.doi.org/10.21236/ada439785.
Full textPeacock, Brent A. Connecting the Edge: Mobile Ad-Hoc Networks (MANETs) for Network Centric Warfare. Fort Belvoir, VA: Defense Technical Information Center, April 2007. http://dx.doi.org/10.21236/ada497761.
Full textHerberg, U., and T. Clausen. Integrity Check Value and Timestamp TLV Definitions for Mobile Ad Hoc Networks (MANETs). RFC Editor, May 2012. http://dx.doi.org/10.17487/rfc6622.
Full textHerberg, U., T. Clausen, and C. Dearlove. Integrity Check Value and Timestamp TLV Definitions for Mobile Ad Hoc Networks (MANETs). RFC Editor, April 2014. http://dx.doi.org/10.17487/rfc7182.
Full textFrazier, Gregory. The Common MANET Framework. Fort Belvoir, VA: Defense Technical Information Center, September 2008. http://dx.doi.org/10.21236/ada486164.
Full textAguilar Aguilar, Paula Andrea, Carlos Enrique Velásquez Arroyo, Cristian Dominguez Pulgarín, Michael Ángel Latorre Gonzalez, and Rosa Helen Mira Herrera. Manejo fitosanitario: Manejo de plagas. Corporación colombiana de investigación agropecuaria - AGROSAVIA, 2022. http://dx.doi.org/10.21930/agrosavia.infografia.2022.44.
Full textAguilar Aguilar, Paula Andrea, Carlos Enrique Velásquez Arroyo, Cristian Dominguez Pulgarín, Michael Ángel Latorre Gonzalez, and Rosa Helen Mira Herrera. Manejo fitosanitario: Manejo de arvenses. Corporación Colombiana de Investigación Agropecuaria - AGROSAVIA, 2022. http://dx.doi.org/10.21930/agrosavia.infografia.2022.27.
Full textAguilar Aguilar, Paula Andrea, Carlos Enrique Velásquez Arroyo, Cristian Dominguez Pulgarín, Michael Ángel Latorre Gonzalez, and Rosa Helen Mira Herrera. Manejo fitosanitario: Manejo de enfermedades. Corporación Colombiana de Investigación Agropecuaria - AGROSAVIA, 2022. http://dx.doi.org/10.21930/agrosavia.infografia.2022.26.
Full text