136 Hits in 3.9 sec

A Fuzzy Petri Nets QoS Model for Wireless AD Hoc Networks [chapter]

Lyes Khoukhi, Soumaya Cherkaoui
Intelligence in Communication Systems  
In this paper, we explore the use of Fuzzy Petri Nets for QoS support in wireless ad hoc networks.  ...  We propose a fiizzy Petri nets technique for modeling and analyzing the QoS decision making for traffic regulation.  ...  CONCLUSION hl this paper, we proposed FPWIM which is a fuzzy Petri nets technique for modeling and analyzing the QoS decision making for traffic regulation in wireless ad hoc networks.  ... 
doi:10.1007/0-387-32015-6_14 dblp:conf/intellcomm/KhoukhiC05 fatcat:jgodlyiuwfggfdmxxkkfifasaa


2015 Procedia Computer Science  
for Path Duration in Vehicular Ad Hoc Networks under Greedy Forwarding Strategy S.  ...  Hoc Networks A.  ... 
doi:10.1016/s1877-0509(15)00778-4 fatcat:3hgiebfmzjhdrfaldkmwh5ujse

2012 TMC Annual Index

2013 IEEE Transactions on Mobile Computing  
Yang, Jie, +, TMC Sept. 2012 1426-1440 Ad hoc networks A Novel MAC Scheme for Multichannel Cognitive Radio Ad Hoc Net- works.  ...  Li, Pan, +, TMC March 2012 427-438 Stochastic Vector Mobility Model for Mobile and Vehicular Ad Hoc Net- work Simulation.  ... 
doi:10.1109/tmc.2013.1 fatcat:qp57tpkfx5gbrc3dvtetebm3ui

Using Symbolic Techniques and Algebraic Petri Nets to Model Check Security Protocols for Ad Hoc Networks

Mihai-Lica Pura, Didier Buchs
2014 Applications and Theory of Petri Nets  
To our knowledge this work is also the first successful attempt to use Petri nets for model checking the security properties of ad hoc networks protocols.  ...  We have used it successfully for modeling ad hoc networks and for verifying security protocols designed for this type of networks.  ...  Modeling for Quantitative evaluation The research presented in [7] uses Fuzzy Petri Nets for modeling and analyzing the QoS dimension in order to evaluate how to manage congestion in wireless ad hoc  ... 
dblp:conf/apn/PuraB14 fatcat:oc24pw3wk5aundn5n4lluuckua

Analysis of QoS based Routing Algorithm in MANET Using Fuzzy logic

V. Seethalakshmi, et. al.
2014 International Journal of Computing and Digital Systems  
Therefore, an effort has been done to create a new QOS based Stable Energy Aware Ad hoc Routing protocol (QSEAAR).  ...  A mobile adhoc network (MANET) is a self-configuring infra-structure less network.  ...  Vamsee Mohan [22] propose a novel Reliable Routing Algorithm (RRA) in mobile ad hoc network using fuzzy Petri net and its reasoning mechanism. Dhafer R.  ... 
doi:10.12785/ijcds/030205 fatcat:lgcgmtyuezbthbtmyfgfjbvzwe

A Novel QoS Trust Computation in MANETs Using Fuzzy Petri Nets

Nageswara Sirisala, C Bindu
2017 International Journal of Intelligent Engineering and Systems  
The proposed method "A Novel QoS Trust computation in MANETs using Fuzzy Petri Nets-QTFPN", evaluates node trust value based on its quality of service (QoS) parameters.  ...  Here the MANET is represented as Dynamic Adaptive Fuzzy Petri Nets (DAFPN) model with concurrent reasoning algorithm (CRA).  ...  Yu, "Applying trust enhancements to reactive routing protocols in mobile ad hoc networks", Journal of Wireless Networks, Vol.22, pp. 2239-2257, 2016. [2] M.S. Khan, and M.I.  ... 
doi:10.22266/ijies2017.0430.13 fatcat:4thv2rox6fh37h5mjbtphn4tce

Optimal QoS Constraint Service Composition in Mobile Ad Hoc Networks [article]

P Veeresh, R Praveen Sam, Mohammad Riyaz Belgaum
2018 arXiv   pre-print
Implementation of services in Mobile Ad Hoc Networks (MANETs) increases the flexibility of using mobile devices for running a wide variety of applications.  ...  These four QoS parameters are optimized using a mathematical model Hammerstein model to generate a single output.  ...  In the paper [11] , the FPN is extended as a DFPN ("Dynamic Fuzzy Petri Net") where each transition has input and output weights to implement the dynamic nature.  ... 
arXiv:1802.08818v1 fatcat:y354bajukvhkxgm3if56k2kcim

Reliability modeling and analysis of communication networks

Waqar Ahmad, Osman Hasan, Usman Pervez, Junaid Qadir
2017 Journal of Network and Computer Applications  
In this paper, we study various modeling and analysis techniques that can aid in the study of reliability of communication networks.  ...  Apart from providing the necessary background, we also critically evaluate the pros and cons of different approaches, and provide a detailed survey of their applications in communication networks.  ...  For instance, in a wireless ad-hoc network whose functionality is defined by the Trust Levels Routing Protocol (TLR), the wireless transmission nodes of the network are redundant [191] .  ... 
doi:10.1016/j.jnca.2016.11.008 fatcat:3ly4sqppj5hergujxlbqmv3e3q

Table of Contents

2018 2018 International Conference on Advances in Big Data, Computing and Data Communication Systems (icABCD)  
and Elias Willemse 090: Optimal sink-node placement and routing for an energy efficient two-tier wireless sensor network Tebello Nd Mathaba 091: 'Firing Sequence' as a Tool for the Analysis of Petri Nets  ...  Reggie Davidrajuh and Chunming Rong 092: Comparative Study on Routing Protocols for Vehicular Ad-hoc Networks (VANETs) Elias Khoza, Chunling Du and Pius Owolawi 093 : Representation of Pose Invariant  ... 
doi:10.1109/icabcd.2018.8465424 fatcat:cjghzmjejjgplht2rvkauaumrq

Trust Routing Protocol Based on Cloud-based Fuzzy Petri Net and Trust Entropy for Mobile Ad Hoc Network

Xiaoliang Wang, Peng Zhang, Yuyue Du, Mei Qi
2020 IEEE Access  
INDEX TERMS Cloud model, fuzzy Petri net, mobile ad hoc network, trust entropy, TUE-OLSR.  ...  Specifically, a trust reasoning model based on cloud model and fuzzy Petri net (FPN) is presented to evaluate the credibility of nodes. Then we propose a routing algorithm based on trust entropy.  ...  His current research interests are fuzzy Petri nets, trust management, and mobile ad hoc network routing protocol.  ... 
doi:10.1109/access.2020.2978143 fatcat:pjnyvgvlpzcgxkyu54xb3dpgpm

Review Of Trust Models In Wireless Sensor Networks

V. Uma Rani, K. Soma Sundaram
2014 Zenodo  
To solve this issue, a trust model is required to find malicious, selfish and compromised insiders by evaluating trust worthiness sensors from the network.  ...  It describes the major design issues and their countermeasures of building trust model. It also discusses existing trust models used in various decision making process of wireless sensor networks.  ...  CORE [22] , OCEAN [40] are responsible for cooperation among nodes in Ad-hoc Network.  ... 
doi:10.5281/zenodo.1092174 fatcat:u5kvi6ozhzg6xivywxyasytawy

Computational Intelligence in Multimedia Networking and Communications: Trends and Future Directions [chapter]

Parthasarathy Guturu
2008 Studies in Computational Intelligence  
This paper presents a review of the current literature on computational intelligence based approaches to various problems in multimedia networking and communications such as call admission control, management  ...  In [70] , Mao et al. present a genetic algorithmic approach to multi-path routing of multi description (actually double description) video in wireless ad hoc networks.  ...  In [83] , Zhou and Murata adopt a CI approach to the media synchronization problem, and propose a fuzzy timing Petri Net model (FTPNM) for handling uncertain or fuzzy temporal requirements, such as imprecisely  ... 
doi:10.1007/978-3-540-76827-2_2 fatcat:7pat2jzdezcu5jxa5g52qj4fnq

Table of Contents

2008 2008 Second Asia International Conference on Modelling & Simulation (AMS)  
____________ 265 Adel Ali Ahmed, Liza Abdul Latiff, and Norsheila Fisal Towards Identifying Features of Trust in Mobile Ad Hoc Network __________________________________ 271 Normalia Samian, Mohd Aizaini  ...  New Petri Net Tool for Simulation of Discrete Event Systems ___________________________ 861 Reggie Davidrajuh Low Bandwidth Self-Healing Key Distribution for Broadcast Encryption ____________________  ... 
doi:10.1109/ams.2008.8 fatcat:l7kc7in4fjd27kc6k5bomgifre

A Review of the Energy Efficient and Secure Multicast Routing Protocols for Mobile Ad Hoc Networks

Busola S. Olagbegi, Natarajan Meghanathan
2010 International Journal on Applications of Graph Theory In wireless Ad Hoc Networks And sensor Networks  
There are so many issues and solutions which witness the need of energy management and security in ad hoc wireless networks.  ...  This paper presents a thorough survey of recent work addressing energy efficient multicast routing protocols and secure multicast routing protocols in Mobile Ad hoc Networks (MANETs).  ...  The Sequence and Topology encoding for Multicast Protocol (STMP) [14] represents multicast routing a using fuzzy Petri-net model in wireless ad hoc networks wherein all nodes are equipped with GPS units  ... 
doi:10.5121/jgraphoc.2010.2201 fatcat:iuvltpmdh5ek5n2trvwwudqa2y


K. Divya, Ph.D Research Scholar Department of Computer Science Gobi Arts & Science College Gobichettipalayam, India
2021 International Journal of Advanced Research in Computer Science  
Although a number of mechanisms have been proposed for protecting MANETs, most of the solutions are only effective for a particular kind of attacks or provide security at the cost of sacrificing QoS.  ...  In this paper, we propose a trust-based secure QoS routing scheme by combining social and QoS trust.  ...  The proposed method used an algorithm based on Dynamic Adaptive Fuzzy Petri Net (DAFPN) with concurrent reasoning.  ... 
doi:10.26483/ijarcs.v12i3.6740 fatcat:dmpbswxchfg3davayk5jxguyla
« Previous Showing results 1 — 15 out of 136 results