ROUTE MAINTENANCE APPROACH FOR LINK BREAKAGE PREDICTION IN MOBILE AD HOC NETWORKS
Journal Title: International Journal of Advanced Computer Science & Applications - Year 2011, Vol 2, Issue 10
Abstract
Mobile Ad hoc Network (MANET) consists of a group of mobile nodes that can communicate with each other without the need of infrastructure. The movement of nodes in MANET is random; therefore MANETs have a dynamic topology. Because of this dynamic topology, the link breakages in these networks are something common. This problem causes high data loss and delay. In order to decrease these problems, the idea of link breakage prediction has appeared. In link breakage prediction, the availability of a link is evaluated, and a warning is issued if there is a possibility of soon link breakage. In this paper a new approach of link breakage prediction in MANETs is proposed. This approach has been implemented on the well known Dynamic Source Routing protocol (DSR). This new mechanism was able to decrease the packet loss and delay that occur in the original protocol.
Authors and Affiliations
Khalid Zahedi , Abdul Samad Ismail
A Posteriori Error Estimator for Mixed Approximation of the Navier-Stokes Equations with the Boundary Condition
In this paper, we introduce the Navier-Stokes equations with a new boundary condition. In this context, we show the existence and uniqueness of the solution of the weak formulation associated with the proposed problem. T...
Automated Extraction of Large Scale Scanned Document Images using Google Vision OCR in Apache Hadoop Environment
This Digitalization of documents is now being done in all fields to reduce paper usage. The availability of modern technology in the form of scanners and cameras supports the growth of multimedia data, especially documen...
Quantifying Integrity Impacts in Security Risk Scoring Models
Organizations are attacked daily by criminal hackers. Managers need to know what kinds of cyber-attacks they are exposed to, for taking defense activities. Attackers may cause several kinds of damages according to the kn...
Intrusion Detection System with Correlation Engine and Vulnerability Assessment
The proposed Intrusion Detection System (IDS) which is implemented with modern technologies to address certain prevailing problems in existing intrusion detection systems’ is capable of giving an advanced output to the s...
A Robust Algorithm of Forgery Detection in Copy-Move and Spliced Images
The paper presents a new method to detect forgery by copy-move, splicing or both in the same image. Multiscale, which limits the computational complexity, is used to check if there is any counterfeit in the image. By app...