Filters








36 Hits in 13.2 sec

Standardisation advancements in the area of routing for mobile ad-hoc networks

Tipu Arvind Ramrekha, Emmanouil Panaousis, Christos Politis
2011 Journal of Supercomputing  
In this paper, we provide a background on the possibility to use MANETs for enabling future pervasive internet and innovative ubiquitous services.  ...  It is mainly observed that there is a need for adaptive hybrid routing approaches in order to support future ubiquitous and pervasive applications. Consequently, we finally present our conclusions.  ...  In such a case, in order to update routes in a timely manner, the intervals have to decreased in order to have faster route update periods as described in Table 2 .  ... 
doi:10.1007/s11227-011-0705-2 fatcat:3p5cvff3bfcanalpd3t3kxt7tq

Communication and networking technologies for UAVs: A survey [article]

Abhishek Sharma, Pankhuri Vanjani, Nikhil Paliwal, Chathuranga M.Wijerathna Basnayaka, Dushantha Nalin K. Jayakody, Hwang-Cheng Wang, P. Muthuchidambaranathane
2020 arXiv   pre-print
With the advancement in drone technology, in just a few years, drones will be assisting humans in every domain. But there are many challenges to be tackled, communication being the chief one.  ...  Encryption and optimization techniques for ensuring long lasting and secure communications, as well as for power management, are discussed.  ...  Field trials were performed by a number of telecommunication companies to analyze the performance of a cellular-connected UAV in a commercial cellular network and to compare handover and link reliability  ... 
arXiv:2009.02280v1 fatcat:fx7hr332qbbfble6rbyuxirrn4

Active Queue Management: A Survey

Richelle Adams
2013 IEEE Communications Surveys and Tutorials  
Since its formal introduction to IP networks in 1993 as a viable complementary approach for congestion control, there has been a steady stream of research output with respect to Active Queue Management  ...  This survey attempts to travel the trajectory of AQM research from 1993 with the first algorithm, Random Early Detection (RED), to current work in 2011.  ...  In a MANET a mobile node may simultaneously connect with other mobile nodes and other networks (i.e., acting as a gateway).  ... 
doi:10.1109/surv.2012.082212.00018 fatcat:r3yhuadtoffoflpjw527ztn3rq

Sensor Networks for High-Confidence Cyber-Physical Systems

Feng Xia, Tridib Mukherjee, Yan Zhang, Ye-Qiong Song
2011 International Journal of Distributed Sensor Networks  
Chen et al. propose a model to predict link interruption and route interruption in UASNs by the historical link information and channel state obtained by periodic detection.  ...  In the paper "Link prediction and route selection based on channel state detection in UASNs," J.  ...  Acknowledgments It has been a great pleasure for us to organize this special issue.  ... 
doi:10.1155/2011/245734 fatcat:lswungc2orda5pcqvpyqu7vrna

A layered security approach for cooperation enforcement in MANETs

S Abbas
2017
Work therefore needs to be done in order to develop a distributed detection mechanism for identity spoof detection in MANET environments.  ...  One is the base station that is directly connected to a computer or a laptop via a wired link, in order to collect data from the transmitting sensors.  ...  In the case where the packet has no established route, the decision path from box 2 in Figure B . 1 will be No. " In box 3, a check is made to establish whether it is a broadcast packet, in this case,  ... 
doi:10.24377/ljmu.t.00006091 fatcat:oaivc54gjnaz5kabw6hnktow6i

Trust-based recommendation systems in Internet of Things: a systematic literature review

Venus Mohammadi, Amir Masoud Rahmani, Aso Mohammed Darwesh, Amir Sahafi
2019 Human-Centric Computing and Information Sciences  
Taking into account the dynamic-heterogeneous characteristic of interconnected devices in IoT, demand for a trust model to guarantee security, authentication, authorization, and confidentiality of connected  ...  This creates the possibility for physical objects present in a self-organized manner without a central administration and leads to meaningful human-machine interaction in IoT scenario [3] .  ...  Then, data can either routed to a principal node called sink or be to collected and analyzed prior to sending to the sink node.  ... 
doi:10.1186/s13673-019-0183-8 fatcat:ckozm3ixungbvpc37agoxc5arm

Surveillance on Manycasting Over Optical Burst Switching (OBS) Networks under Secure Sparse Regeneration

C.Veera lakshmi
2013 IOSR Journal of Electronics and Communication Engineering  
Each application requires its own QoS threshold attributes like physical layer properties, delay as a result of transmission and reliability of the link.  ...  There are two algorithms MCM-SPT and MCM-DM required for manycasting to resolve the multiconstraint QoS drawback.  ...  Also the author would like to thank reviewers for their valuable comments to improve the quality of the paper.  ... 
doi:10.9790/2834-0460108 fatcat:5qasfbq4n5cbpln42h3pa3cucq

Exploratory Research Opportunities Of Computing In Life Sciences

Guest Editor Dr.Vignesh Ramamoorthy H
2022 International Journal of Life Science and Pharma Research  
As a result, one of the most important tasks for this study in the next years will be to extract relevant statistics from enormous amounts of data and to build larger computer models to examine the more  ...  Computers are employed in lifestyle science in a variety of ways, including the usage of sensors and other devices that only a laptop can comprehend, as well as computers' incredible ability to do complex  ...  DEBH (Detecting and Eliminating Black Holes) for sensing and detaching the cooperative black hole nodes in MANET.  ... 
doi:10.22376/ijpbs/ijlpr/sp20/march.2022.5-200 fatcat:vowymyh3mzc6nmm4im4dvlpm7a

MDP-based Vehicular Network Connectivity Model for VCC Management

Abubakar Saad, Robson E. De Grande
2020 2020 IEEE/ACM 24th International Symposium on Distributed Simulation and Real Time Applications (DS-RT)  
Vehicular Cloud computing is a new paradigm in which vehicles collaboratively exchange data and resources to support services and problem-solving in urban environments.  ...  Also, from analyses, we observed that higher vehicle connectivity presents a trace of repeated connection patterns.  ...  Moreover, in the peculiar case of V2V connections, a vehicle observes a multihop, on or more hops, connection.  ... 
doi:10.1109/ds-rt50469.2020.9213698 dblp:conf/dsrt/SaadG20 fatcat:uohxphn5azevfgw54l7i4sdwmi

Implicit Sleep Mode Determination in Power Management of Event-Driven Deeply Embedded Systems [chapter]

André Sieber, Karsten Walther, Stefan Nürnberger, Jörg Nolte
2009 Lecture Notes in Computer Science  
These effects and memory limitations require a balanced neighborhood management to ensure agility, stability, symmetry, and connectivity.  ...  , and hence, ensures memory safety for TinyOS based applications.  ...  The authors of [8] adapt ADMR (Adaptive Demand-driven Multicast Routing), a multicast protocol for MANETS, on a real wireless sensor node (MICAz).  ... 
doi:10.1007/978-3-642-02118-3_2 fatcat:prjsfyqcojcnpcetw7vfnvqwpy

A Survey on Security and Privacy of 5G Technologies: Potential Solutions, Recent Advancements and Future Directions

Rabia Khan, Pardeep Kumar, Dushantha Nalin K. Jayakody, Madhusanka Liyanage
2019 IEEE Communications Surveys and Tutorials  
., access control, authentication and encryption) have been considered for the SDN, NFV, and network slicing. 5G is set to be a faster broadband that is connected with Internet and Intranet protocols,  ...  The proposed protocol detects more attacks than IEEE 802.11s/i and Authenticated Routing for Ad hoc Networks (ARAN).  ... 
doi:10.1109/comst.2019.2933899 fatcat:bulfng6levdelgmel7oxoi6pna

Investigations for the improvement of the Cyber Security using Cloud Computing methods and Architecture

Dr. Sai Manoj Kudavaralli
2021 Zenodo  
Investigations for the improvement of the Cyber Security using Cloud Computing methods and Architecture: D.Sc. Thesis  ...  Failure to honor this agreement can lead to denial of service for the consumer or legal liability for the service provider.  ...  For example, the connected network that interconnects the internal systems in a cloud has to be secure within existing environment.  ... 
doi:10.5281/zenodo.5148421 fatcat:lzanqvxdlre2dh3hdhjxibdrim

COREnect D3.3. Initial COREnect industry roadmap [article]

AUSTRALO
2021 Zenodo  
Therefore, technologies to cope with untrusted third-party IP (EG1), telecommunication hardware and software (EG2) and failure detection and security technologies (EG3) are contributing to the question  ...  This could help to ensure that Europe plays a sufficient role on this topic.  ...  Appendix The COREnect roadmap activities strongly rely on interactions with experts in the field.  ... 
doi:10.5281/zenodo.5075317 fatcat:ww7icphzfjcdjlxbsbo2qekghy

ADVANCES IN MANAGEMENT, IT, EDUCATION, SOCIAL SCIENCES MANEGMA 2019

Dr. P S Aithal, Prof. Amith Menezes
2019 Zenodo  
I would also like to acknowledge our thanks to our parents for their valuable support and encouragement during the period of our study.  ...  Acknowledgement We would like to express our gratitude towards our guide Mrs.Shifana Begum, Assistant Professor, Dept. of CSE, Srinivas School of Engineering, Mukka for her support, guidance and encouragement  ...  Link Stability Factor (LSF) can be defined as: LSF = ∑Link -failure /cost (TLC): Tree Link cost (TLC) is the cost which is required to maintain a tree link and it can be derived as, TLC = (rB + rq B) /  ... 
doi:10.5281/zenodo.3250779 fatcat:rgrz3gtqhnfolkur7bsi7xyzue

VEHICULAR 2017 Committee VEHICULAR Steering Committee VEHICULAR 2017 Technical Program Committee

Khalil El-Khatib, Markus Ullmann, Carlos Calafate, Khalil El-Khatib, Markus Ullmann, Carlos Calafate, Khalil El-Khatib, Clément Zinoune, Renault, France Wetterwald, France Ding, Ali Abedi (+121 others)
2017 unpublished
We are grateful to the members of the VEHICULAR 2017 organizing committee for their help in handling the logistics and for their work to make this professional meeting a success.  ...  Subliminally delivered information, unobtrusive techniques for driver's state detection, and mitigation or regulation interfaces enlarge the spectrum of challenges in vehicular systems.  ...  ACKNOWLEDGEMENT The authors would like to thank our colleague Thomas Strubbe for detailed discussions. Also thanks to the anonymous reviewers for the valuable comments.  ... 
fatcat:e7rotypi3jabtfh52gqbmfinxe
« Previous Showing results 1 — 15 out of 36 results