Effect of Quality Parameters on Energy Efficient Routing Protocols in MANETs
Journal Title: International Journal on Computer Science and Engineering - Year 2011, Vol 3, Issue 7
Abstract
This paper presents a survey on energy efficient routing protocols for wireless Ad-Hoc networks. Survey focus on recent development and modifications in this widely used field. In this paper I present a number of ways of classification or categorization of these routing protocols and did Qualitative / Quantitative analysis of a dozen typical existing routing protocols. In qualitative analysis I compare their properties according to different criteria and in Quantitative analysis I used a Simulator NS2 to study their relative performance according to different criteria.
Authors and Affiliations
Dr. R. K Singh , Tanu Preet Singh , Jayant Vats
Nodes distribution and selection of accurate mobility Framework to systematically analyze its impact for improving performance of routing protocols for mobile ad hoc networks through Simulations
Research on mobile ad hoc routing protocols performance based on simulation relies on choice of realistic mobility model. However, in the absence of realistic data movement, Synthetic models may be used for generating mo...
Generalisation of RSA Scheme using fundamental groups and ZKIP
We address the problem of computation involved in RSA algorithm namely exponentiation under modulo arithmetic and various mathematical and timing attacks in RSA. The computation is made easy and quick by assigning elemen...
Colorectal Cancer MRI Image Segmentation Using Image Processing Techniques
Colorectal cancer is the third most commonly diagnosed cancer and the second leading cause of cancer death in men and women. Magnetic resonance imaging (MRI) established itself as the primary method for detection and sta...
Simultaneous Pattern and Data Clustering Using Modified K-Means Algorithm
In data mining and knowledge discovery, for finding the ignificant correlation among events Pattern discovery (PD) is used. PD typically produces an overwhelming number of patterns. Since there are too many patterns, it...
Two Factor Biometric Key for Secure Wireless Networks
The applications of wireless networks is steadily increasing through out the world. Wireless transactions are now appening in highly secure banking networks. To have more reliable networks, security of wireless networks...