ScienceGate
Advanced Search
Author Search
Journal Finder
Blog
Sign in / Sign up
ScienceGate
Search
Author Search
Journal Finder
Blog
Sign in / Sign up
Ad Hoc Networks Based on Rough Set Distance Leaming Method
Information Technology Journal
◽
10.3923/itj.2011.1038.1043
◽
2011
◽
Vol 10
(5)
◽
pp. 1038-1043
◽
Cited By ~ 5
Author(s):
Yang Hui
Keyword(s):
Ad Hoc Networks
◽
Rough Set
◽
Ad Hoc
◽
Hoc Networks
◽
Set Distance
Download Full-text
Related Documents
Cited By
References
RoVAN: A Rough Set-based Scheme for Cluster Head Selection in Vehicular Ad-hoc Networks
2018 IEEE Global Communications Conference (GLOBECOM)
◽
10.1109/glocom.2018.8647576
◽
2018
◽
Cited By ~ 7
Author(s):
Amit Dua
◽
Prateek Sharma
◽
Shivesh Ganju
◽
Anish Jindal
◽
Gagangeet Singh Aujla
◽
...
Keyword(s):
Ad Hoc Networks
◽
Rough Set
◽
Vehicular Ad Hoc Networks
◽
Ad Hoc
◽
Cluster Head
◽
Cluster Head Selection
◽
Hoc Networks
Download Full-text
A rough set calibration scheme for energy effective routing protocol in mobile ad hoc networks
Cluster Computing
◽
10.1007/s10586-018-2156-5
◽
2018
◽
Vol 22
(S6)
◽
pp. 13957-13963
◽
Cited By ~ 1
Author(s):
S. Sathish Kumar
◽
P. Manimegalai
◽
S. Karthik
Keyword(s):
Ad Hoc Networks
◽
Mobile Ad Hoc Networks
◽
Rough Set
◽
Routing Protocol
◽
Ad Hoc
◽
Calibration Scheme
◽
Mobile Ad Hoc
◽
Hoc Networks
Download Full-text
A Rough Set Based Approach To Classify Node Behavior In Mobile Ad Hoc Networks
Journal of Mathematics and Computer Science
◽
10.22436/jmcs.011.01.07
◽
2014
◽
Vol 11
(01)
◽
pp. 64-78
Author(s):
M. Jain
◽
M.p.s. Bhatia
Keyword(s):
Ad Hoc Networks
◽
Mobile Ad Hoc Networks
◽
Rough Set
◽
Ad Hoc
◽
Mobile Ad Hoc
◽
Hoc Networks
Download Full-text
A Novel Source Based Min-Max Battery Cost Routing Protocol for Mobile Ad Hoc Networks
CVR Journal of Science & Technology
◽
10.32377/cvrjst0408
◽
2013
◽
Vol 4
(1)
◽
pp. 41-44
Author(s):
Humaira Nishat
◽
Keyword(s):
Ad Hoc Networks
◽
Mobile Ad Hoc Networks
◽
Routing Protocol
◽
Ad Hoc
◽
Mobile Ad Hoc
◽
Hoc Networks
Download Full-text
Proposing Disaster Management System based on Vehicular Ad hoc Networks
10.33329/aus.2019.n26.4.3
◽
2019
◽
Vol 26
(4)
◽
pp. 16-25
Keyword(s):
Ad Hoc Networks
◽
Disaster Management
◽
Management System
◽
Vehicular Ad Hoc Networks
◽
Ad Hoc
◽
Hoc Networks
◽
Disaster Management System
Download Full-text
Proposing Disaster Management System based on Vehicular Ad hoc Networks
10.33329/jaus.19.264.3
◽
2019
◽
Vol 264
(1)
◽
pp. 16-25
Keyword(s):
Ad Hoc Networks
◽
Disaster Management
◽
Management System
◽
Vehicular Ad Hoc Networks
◽
Ad Hoc
◽
Hoc Networks
◽
Disaster Management System
Download Full-text
Challenges in Mobile Ad Hoc Networks: Security Threats and its Solutions
Indian Journal Of Applied Research
◽
10.15373/2249555x/jan2013/29
◽
2011
◽
Vol 3
(1)
◽
pp. 72-74
Author(s):
Dhara N Darji
◽
◽
Nita B Thakkar
Keyword(s):
Ad Hoc Networks
◽
Mobile Ad Hoc Networks
◽
Ad Hoc
◽
Security Threats
◽
Mobile Ad Hoc
◽
Hoc Networks
Download Full-text
Secure Routing Protocols in Wireless Ad-Hoc Networks – A Survey
PARIPEX-INDIAN JOURNAL OF RESEARCH
◽
10.15373/22501991/june2014/11
◽
2012
◽
Vol 3
(6)
◽
pp. 32-34
Author(s):
Dr. Banta Singh Jangra
◽
◽
Manish Kumar Naga
Keyword(s):
Ad Hoc Networks
◽
Wireless Ad Hoc Networks
◽
Routing Protocols
◽
Ad Hoc
◽
Secure Routing
◽
Secure Routing Protocols
◽
Hoc Networks
Download Full-text
Classification of Attacks Against the Mobile AD Hoc Networks
International Journal of Scientific Research
◽
10.15373/22778179/mar2013/26
◽
2012
◽
Vol 2
(3)
◽
pp. 77-80
Author(s):
V. Karamchand Gandhi
◽
◽
D.P.Jeyabalan D.P.Jeyabalan
Keyword(s):
Ad Hoc Networks
◽
Mobile Ad Hoc Networks
◽
Ad Hoc
◽
Mobile Ad Hoc
◽
Hoc Networks
Download Full-text
Black Hole Attack Detection in Vehicular Ad Hoc Networks Using Statistical Process Control
International Journal on Communications Antenna and Propagation (IRECAP)
◽
10.15866/irecap.v7i3.12259
◽
2017
◽
Vol 7
(3)
◽
pp. 208
Author(s):
Badreddine Cherkaoui
◽
Abderrahim Beni-hssane
◽
Mohammed Erritali
Keyword(s):
Black Hole
◽
Process Control
◽
Ad Hoc Networks
◽
Statistical Process Control
◽
Vehicular Ad Hoc Networks
◽
Ad Hoc
◽
Attack Detection
◽
Black Hole Attack
◽
Statistical Process
◽
Hoc Networks
Download Full-text
Sign in / Sign up
Close
Export Citation Format
Close
Share Document
Close