Artículos de revistas sobre el tema "ADHOC ON-DEMAND DISTANCE VECTOR"
Crea una cita precisa en los estilos APA, MLA, Chicago, Harvard y otros
Consulte los 50 mejores artículos de revistas para su investigación sobre el tema "ADHOC ON-DEMAND DISTANCE VECTOR".
Junto a cada fuente en la lista de referencias hay un botón "Agregar a la bibliografía". Pulsa este botón, y generaremos automáticamente la referencia bibliográfica para la obra elegida en el estilo de cita que necesites: APA, MLA, Harvard, Vancouver, Chicago, etc.
También puede descargar el texto completo de la publicación académica en formato pdf y leer en línea su resumen siempre que esté disponible en los metadatos.
Explore artículos de revistas sobre una amplia variedad de disciplinas y organice su bibliografía correctamente.
AmitMaheshbhai, Lathigara y K. H. Wandra. "Adhoc On-demand Distance Vector: Energy Efficient Approach". International Journal of Computer Applications 102, n.º 8 (18 de septiembre de 2014): 40–45. http://dx.doi.org/10.5120/17839-8725.
Texto completoG Patel, Vallabh y Nishant P. Makwana. "Optimized Adhoc On demand Distance Vector (O-AODV)". International Journal of Engineering Trends and Technology 35, n.º 1 (25 de mayo de 2016): 12–18. http://dx.doi.org/10.14445/22315381/ijett-v35p203.
Texto completodhao, A. P. Ja y Dr D. N. Chaudhari. "Security Aware Adhoc on Demand Distance Vector Routing Protocol in Vehicular Adhoc Network". International Journal of Innovative Research in Computer and Communication Engineering 02, n.º 12 (30 de diciembre de 2014): 7258–63. http://dx.doi.org/10.15680/ijircce.2014.0212019.
Texto completoGanpat Joshi, Gurpreet Singh,. "A Novel Statistical Adhoc On-Demand Distance Vector Routing Protocol Technique is using for Preventing the Mobile Adhoc Network from Flooding Attack". Turkish Journal of Computer and Mathematics Education (TURCOMAT) 12, n.º 6 (5 de abril de 2021): 1753–65. http://dx.doi.org/10.17762/turcomat.v12i6.3779.
Texto completoVeepin Kumar y Sanjay Singla. "A Performance Analysis of MANET Routing Protocols". international journal of engineering technology and management sciences 6, n.º 6 (28 de noviembre de 2022): 173–80. http://dx.doi.org/10.46647/ijetms.2022.v06i06.027.
Texto completoMano, Reji, P. C. Kishore Raja, Christeena Joseph y Radhika Baskar. "Hardware Implementation of Intrusion Detection System for Ad-Hoc Network". International Journal of Reconfigurable and Embedded Systems (IJRES) 5, n.º 3 (1 de noviembre de 2016): 158. http://dx.doi.org/10.11591/ijres.v5.i3.pp158-164.
Texto completoSoundararajan, S., B. R. Tapas Bapu, C. Kotteeswaran, S. Venkatasubramanian, P. J. Sathish Kumar y Ahmed Mudassar Ali. "Modified Adhoc On-Demand Distance Vector for Trust Evaluation And Attack Detection". Intelligent Automation & Soft Computing 36, n.º 2 (2023): 1227–40. http://dx.doi.org/10.32604/iasc.2023.025752.
Texto completoSultana, Jeenat y Tasnuva Ahmed. "Elliptic Curve Cryptography Based Data Transmission against Blackhole Attack in MANET". International Journal of Electrical and Computer Engineering (IJECE) 8, n.º 6 (1 de diciembre de 2018): 4412. http://dx.doi.org/10.11591/ijece.v8i6.pp4412-4422.
Texto completoGupta, Ekta y Akhilesh Tiwari. "BPAODV: Black Hole Prevention Using Trust Adhoc on Demand Distance Vector Routing Protocol". International Journal of Future Generation Communication and Networking 7, n.º 6 (31 de diciembre de 2014): 103–18. http://dx.doi.org/10.14257/ijfgcn.2014.7.6.11.
Texto completoPatel, Manoj, Dr Maneesh Shrivastava y Kavita Deshmukh. "Simulation And Auditing Of Network Security Based On Probabilistic Neural Network Approach". INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 3, n.º 1 (1 de agosto de 2012): 91–94. http://dx.doi.org/10.24297/ijct.v3i1b.2746.
Texto completoUmaparvathi, M. y Dharmishtan K. Varughese. "Secure Video Transmission Against Black Hole Attack in MANETs". International Journal of Business Data Communications and Networking 7, n.º 4 (octubre de 2011): 1–17. http://dx.doi.org/10.4018/jbdcn.2011100101.
Texto completoAhmed. "PERFORMANCE ANALYSIS OF ADHOC ON DEMAND DISTANCE VECTOR PROTOCOL WITH BLACKHOLE ATTACK IN WSN". Journal of Computer Science 10, n.º 8 (1 de agosto de 2014): 1466–72. http://dx.doi.org/10.3844/jcssp.2014.1466.1472.
Texto completoC, Mohanadevi y Sweatha Selvakumar. "An Effective Encryption Mechanism for Security Issues in Adhoc Networks". ECS Transactions 107, n.º 1 (24 de abril de 2022): 17465–74. http://dx.doi.org/10.1149/10701.17465ecst.
Texto completoAhmed, Shadab. "Ad_Hoc on Demand Distance Vector Routing using MANET". IJARCCE 6, n.º 3 (30 de marzo de 2017): 944–48. http://dx.doi.org/10.17148/ijarcce.2017.63220.
Texto completoPamungkas, Dimas W. L. y Radityo Anggoro. "An Improvement of Ant Colony Adhoc On-Demand Vector (ANT-AODV) with K-Means Clustering Nodes Method in Mobile Adhoc Network (MANET) Environment". Journal of Development Research 5, n.º 1 (31 de mayo de 2021): 1–6. http://dx.doi.org/10.28926/jdr.v5i1.133.
Texto completoSumathi. "EVALUATING AN AUTHENTICATED TRUST BASED ADHOC ON DEMAND DISTANCE VECTOR FOR MALICIOUS NODES ISOLATION IN MANET". Journal of Computer Science 10, n.º 9 (1 de septiembre de 2014): 1859–64. http://dx.doi.org/10.3844/jcssp.2014.1859.1864.
Texto completoRahman, Md Abdur, Md Mizanur Rahman y Md Abdul Alim. "Design and Performance Analysis of an In-Band Full-Duplex MAC Protocol for Ad Hoc Networks". Telecom 4, n.º 1 (18 de enero de 2023): 100–117. http://dx.doi.org/10.3390/telecom4010007.
Texto completoV. Rajesh, Kannan. "On-demand based wireless with hybrid cryptography in MANET". i-manager’s Journal on Wireless Communication Networks 10, n.º 2 (2022): 8. http://dx.doi.org/10.26634/jwcn.10.2.18937.
Texto completoDeepa, M. y P. Krishna Priya. "Secure Enhanced Reactive Routing Protocol for Manet Using Two Fish Algorithm". International Journal of Engineering & Technology 7, n.º 3.12 (20 de julio de 2018): 621. http://dx.doi.org/10.14419/ijet.v7i3.12.16441.
Texto completoRATNASIH, RATNASIH, RISKI MUKTIARTO NUGROHO AJINEGORO y DOAN PERDANA. "Analisis Kinerja Protokol Routing AOMDV pada VANET dengan Serangan Rushing". ELKOMIKA: Jurnal Teknik Energi Elektrik, Teknik Telekomunikasi, & Teknik Elektronika 6, n.º 2 (9 de julio de 2018): 232. http://dx.doi.org/10.26760/elkomika.v6i2.232.
Texto completoMurty, M. V. D. S. Krishna y Dr Lakshmi Rajamani. "Neighbour Node Ratio AODV (NNR-AODV) Routing Protocol for Wormhole Attack Detection in Manets". International Journal of Emerging Science and Engineering 11, n.º 4 (30 de marzo de 2023): 1–9. http://dx.doi.org/10.35940/ijese.d2547.0311423.
Texto completoAbul Hassan, Muhammad, Syed Irfan Ullah, Abdus Salam, Arbab Wajid Ullah, Muhammad Imad y Farhat Ullah. "Energy efficient hierarchical based fish eye state routing protocol for flying Ad-hoc networks". Indonesian Journal of Electrical Engineering and Computer Science 21, n.º 1 (1 de enero de 2021): 465. http://dx.doi.org/10.11591/ijeecs.v21.i1.pp465-471.
Texto completoBharadwaj, Priyanka y Surjeet Balhara. "A Bandwidth and Energy Aware QoS Routing Protocol for Enhanced Performance in Ad-hoc Networks". International Journal of Sensors, Wireless Communications and Control 9, n.º 2 (25 de octubre de 2019): 203–13. http://dx.doi.org/10.2174/2210327908666180801125735.
Texto completoVasundra, S. y D. Venkatesh. "Performance Evaluation of Routing Protocols for Voice and Video Traffics". Asian Journal of Computer Science and Technology 7, n.º 3 (5 de noviembre de 2018): 86–90. http://dx.doi.org/10.51983/ajcst-2018.7.3.1890.
Texto completoMakani, Ruchi y Busi V. Ramana Reddy. "Performance Evaluation of Cognitive Internet on Things Under Routing Attacks". International Journal of Sensors, Wireless Communications and Control 10, n.º 1 (7 de febrero de 2020): 15–24. http://dx.doi.org/10.2174/2210327909666181217122655.
Texto completoMurty, M. V. D. S. Krishna y Dr Lakshmi Rajamani. "Secure and Light Weight Aodv (Slw-Aodv) Routing Protocol for Resilience Against Blackhole Attack in Manets". International Journal of Soft Computing and Engineering 13, n.º 1 (30 de marzo de 2023): 1–9. http://dx.doi.org/10.35940/ijsce.a3592.0313123.
Texto completoS., Dr Smys y Dr Jennifer S. Raj. "Performance Improvement in Conventional AODV Using Energy Efficient, Manifold Route Discovery Scheme". Journal of ISMAC 2, n.º 2 (14 de mayo de 2020): 129–39. http://dx.doi.org/10.36548/jismac.2020.2.006.
Texto completoPrajapati, Meenakshi. "An Implementation and Modification of Routing Protocol Against Vehicular Adhoc Network". International Journal for Research in Applied Science and Engineering Technology 9, n.º 10 (31 de octubre de 2021): 1777–80. http://dx.doi.org/10.22214/ijraset.2021.38680.
Texto completoKumar Singh Yadav, Ajit y Rajesh K. Yadav. "A Reliable and Secure AODV Protocol for MANETs". International Journal of Engineering & Technology 7, n.º 4.38 (3 de diciembre de 2018): 893. http://dx.doi.org/10.14419/ijet.v7i4.38.27603.
Texto completoGeetha, M. "Performance and analysis of Adhoc On Demand Multipath Distance Vector Routing Protocol ( AOMDV) and Enhanced Multipath MPR AODV Routing Protocol(EMMDV) in MANET". International Journal of Computer Sciences and Engineering 6, n.º 7 (31 de julio de 2018): 413–18. http://dx.doi.org/10.26438/ijcse/v6i7.413418.
Texto completoAldabbagh, Ghadah, Peer Azmat Shah, Halabi B. Hasbullah, Farhan Aadil, Khalid Mahmood Awan y Farman Marwat. "Fuzzy Logic Based Enhanced AOMDV with Link Status Classification for Efficient Multi-Path Routing in Multi-Hop Wireless Networks". Journal of Computational and Theoretical Nanoscience 14, n.º 1 (1 de enero de 2017): 620–30. http://dx.doi.org/10.1166/jctn.2017.6252.
Texto completoAsha Latha, S. y A. Sivabalan. "Efficient Security Authentication Protocol in Wireless Sensor Networks". Applied Mechanics and Materials 573 (junio de 2014): 418–23. http://dx.doi.org/10.4028/www.scientific.net/amm.573.418.
Texto completoRaghavendar Raju, L. y C. R. K. Reddy. "Security Improvisation through Node Trust Prediction Approach in Mobile Ad Hoc Networks". International Journal of Interactive Mobile Technologies (iJIM) 13, n.º 09 (5 de septiembre de 2019): 40. http://dx.doi.org/10.3991/ijim.v13i09.9329.
Texto completoFatima, Lubna Naaz, Syeda Hajra Mahin y Fahmina Taranum. "Efficient strategies to reduce power consumption in MANETs". PeerJ Computer Science 5 (18 de noviembre de 2019): e228. http://dx.doi.org/10.7717/peerj-cs.228.
Texto completoRath, Mamata, Binod Kumar Pattanayak y Bibudhendu Pati. "Energy Competent Routing Protocol Design in MANET with Real Time Application Provision". International Journal of Business Data Communications and Networking 11, n.º 1 (enero de 2015): 50–60. http://dx.doi.org/10.4018/ijbdcn.2015010105.
Texto completoBhardwaja, Manish y Anil Ahlawat. "Evaluation of Maximum Lifetime Power Efficient Routing in Ad hoc Network Using Magnetic Resonance Concept". Recent Patents on Engineering 13, n.º 3 (19 de septiembre de 2019): 256–60. http://dx.doi.org/10.2174/1872212112666180815120447.
Texto completoYoon Khang, Adam Wong, Arnidza Ramli, Shamsul J. Elias, J. Pusppanathan, Jamil Abedalrahim Jamil Alsayaydeh, Fatin Hamimi Mustafa, Win Adiyansyah Indra y Johar Akbar Mohamat Gani. "Self-configuration and self-optimization process with taguchi method in hybrid optical wireless network". Indonesian Journal of Electrical Engineering and Computer Science 19, n.º 2 (1 de agosto de 2020): 870. http://dx.doi.org/10.11591/ijeecs.v19.i2.pp870-878.
Texto completoJoseph, Abin John, R. Asaletha, V. J. Manoj y R. Nishanth. "Enhancing the network lifetime of a wireless sensor network using modified k-means Firefly Optimization". Journal of Physics: Conference Series 2466, n.º 1 (1 de marzo de 2023): 012019. http://dx.doi.org/10.1088/1742-6596/2466/1/012019.
Texto completoMartinaa, M., B. Santhi y A. Raghunathan. "An energy-efficient and novel populated cluster aware routing protocol (PCRP) for wireless sensor networks (WSN)". Journal of Intelligent & Fuzzy Systems 39, n.º 6 (4 de diciembre de 2020): 8529–42. http://dx.doi.org/10.3233/jifs-189170.
Texto completoSharma, Sharad, Shakti Kumar y Brahmjit Singh. "AntMeshNet". International Journal of Applied Metaheuristic Computing 5, n.º 1 (enero de 2014): 20–45. http://dx.doi.org/10.4018/ijamc.2014010102.
Texto completoJuneja, Kapil. "DRI Table Based Traffic-Behaviour Analysis Approach for Detection of Blackhole Attack". International Journal of Sensors, Wireless Communications and Control 10, n.º 1 (7 de febrero de 2020): 79–93. http://dx.doi.org/10.2174/2210327909666190208154847.
Texto completoPrashanthi, V., D. Suresh Babu y C. V. Guru Rao. "Network Coding aware Routing for Efficient Communication in Mobile Ad-hoc Networks". International Journal of Engineering & Technology 7, n.º 3 (11 de julio de 2018): 1474. http://dx.doi.org/10.14419/ijet.v7i3.12928.
Texto completoM, Thebiga y Suji Pramila. "A Survey on Assorted Subsisting Approaches to Recognize and Preclude Black Hole Attacks in Mobile Adhoc Networks". International Journal of Interactive Mobile Technologies (iJIM) 14, n.º 01 (20 de enero de 2020): 96. http://dx.doi.org/10.3991/ijim.v14i01.11329.
Texto completoMarina, Mahesh K. y Samir R. Das. "Ad hoc on-demand multipath distance vector routing". ACM SIGMOBILE Mobile Computing and Communications Review 6, n.º 3 (junio de 2002): 92–93. http://dx.doi.org/10.1145/581291.581305.
Texto completoLee, Sung-Ju, Elizabeth M. Belding-Royer y Charles E. Perkins. "Ad hoc on-demand distance-vector routing scalability". ACM SIGMOBILE Mobile Computing and Communications Review 6, n.º 3 (junio de 2002): 94–95. http://dx.doi.org/10.1145/581291.581306.
Texto completoZapata, Manel Guerrero. "Secure ad hoc on-demand distance vector routing". ACM SIGMOBILE Mobile Computing and Communications Review 6, n.º 3 (junio de 2002): 106–7. http://dx.doi.org/10.1145/581291.581312.
Texto completoMarina, Mahesh K. y Samir R. Das. "Ad hoc on-demand multipath distance vector routing". Wireless Communications and Mobile Computing 6, n.º 7 (2006): 969–88. http://dx.doi.org/10.1002/wcm.432.
Texto completoLalwani, Praveen, Mahesh Motwani y Piyush Kumar Shukla. "Optimized Ad-hoc on Demand Distance Vector Routing Protocol". International Journal of Computer Applications 55, n.º 4 (20 de octubre de 2012): 13–17. http://dx.doi.org/10.5120/8742-2614.
Texto completoSingh, Virendra y Dhanroop Mal. "Modified Ad Hoc On-Demand Distance Vector Routing Protocols". International Journal of Computer Applications 130, n.º 12 (17 de noviembre de 2015): 1–6. http://dx.doi.org/10.5120/ijca2015907111.
Texto completoSingh, Meeta y Sudeep Kumar. "A Survey: Ad-hoc on Demand Distance Vector (AODV) Protocol". International Journal of Computer Applications 161, n.º 1 (15 de marzo de 2017): 38–44. http://dx.doi.org/10.5120/ijca2017913109.
Texto completo