Mobile Ad hoc networks in the Global system of Interconnected Computer Networks
Journal Title: International Journal of Science Engineering and Advance Technology - Year 2016, Vol 4, Issue 9
Abstract
Computers capable of attaching to the Internet from many places are likely to grow in popularity until they dominate the population of the Internet. Consequently, protocol research has shifted into high gear to develop appropriate network protocols for supporting mobility. This introductory article attempts to outline some of the many promising and interesting research directions. The papers in this special issue indicate the diversity of viewpoints within the research community, and it is part of the purpose of this introduction to frame their place within the overall research area.
Authors and Affiliations
Engr. Alamgir Safi| Centre for Emerging Sciences, Engineering & Technology (CESET) Islamabad, Pakistan, Alamgir_safi@yahoo.com, InamUllah Khan| Isra University, Islamabad Campus, School of Engineering and Applied Sciences (SEAS), inamullahkhan05@gmail.com, Muhammad Abul Hassan| Abdul Wali Khan University Mardan, KPK, Pakistan, abulhassan900@gmail.com, Engr. Muhammad Asghar| Hamdard University Islamabad, Khayyam2302@gmail.com
A Case Study of Clustering Algorithms for Categorical Data sets
The data clustering, an unsupervised pattern recognition process is the task of assigning a set of objects into groups called clusters so that the objects in the same cluster are more similar to each other than to tho...
The skyline query technology has pulled in much consideration as of late. This is for the most part because of the significance of horizon brings about numerous applications, for example, multi-criteria basic leaders...
A Novel Approach For Improve Reliability Using Secure Distributed De-duplication System In Cloud
Information De-duplication strategy is utilized for wiping out the copy duplicates of rehashed information in distributed storage and to diminish the information duplication. This method is utilized to enhance stockp...
A New Controlling Technique for Elimination Lower Order Harmonics In A Three Phase PV Inverter System
In this paper, a new controlling technique for elimination lower order harmonics in a three phase PV inverter system topology consisting of a boost section, a low-voltage three-phase inverter with an inductive filter,...
Mobile Ad Hoc Networks Authentication Using Npv Method
NPV (Neighbour Position Verification) method is companionable with security architectures counting the ones that have been projected for vehicular networks which symbolize a likely deployment environment for NPV. Suc...