Hello Message Scheme Enhancement in MANET based on Neighbor Mobility
Journal Title: Transactions on Machine Learning and Artificial Intelligence - Year 2017, Vol 5, Issue 4
Abstract
The key idea behind the routing protocols based in multi hope is to find the required path from the source node to the destination. Since those protocols does not consider the node mobility in their mechanism, we propose enhanced the routing protocols by benefit from localization node and predict the time needed for neighbors to go out of range for a node to increase the robustness of the protocols with the mobility. First, we propose an efficient scheme to predict the neighbor rang out. Second, we designed an enhanced version of OLSR (Optimized Link State Routing) based on the collected data. Third, we conduct an extensive set of simulations to compare the performance of our proposal against OLSR origin.
Authors and Affiliations
Berradi Halim, Habbani Ahmed
Pattern Based Melody Matching Approach to Music Information Retrieval
Digitization of music and advancements in information technology for sharing information on World Wide Web paved way for its availability in enormous quantities anywhere any time. Rather than retrieving annotated music i...
Data Cube Representation for patient Diagnosis System Using Fuzzy Object Oriented Database
In the current scenario, everyone wants to store and fetch the information in an easy and faster way. Therefore, the data cube is one of the leading tools in these days that facilitate the user to store and retrieve the...
Application of Hybrid Machine Learning to Detect and Remove Malware
Anti-malware software traditionally employ methods of signature-based and heuristic-based detection. These detection systems need to be manually updated with new behaviors to detect new, unknown, or adapted malware. Our...
Mobile Agent Life Cycle Demystified using Formal Method
Underlying technique for mobile agent development is often mystified. Existing research sometimes ignore unveiling the details of the mobility and autonomy of the agent system. This paper exposes using formal methods the...
Mitigating Economic Denial of Sustainability Attacks to Secure Cloud Computing Environments
In cloud computing environment where the infrastructure is shared by millions of users, attackers have the opportunity to ensure more damage to the compromised resources. The main aim of such attacks is to saturate and o...