Detecting Good Neighbor Nodes and Finding Reliable Routing Path Based on AODV Protocol
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2014, Vol 16, Issue 1
Abstract
Wireless operations allow services, such as long-range communications, that are impossible or impractical to implement with the use of wires. It is supported by well-liked technique known as Adhoc Protocol [1]. The term is commonly used in the telecommunications industry to refer to telecommunications systems e.g. radio transmitters and receivers, remote controls etc. which use some form of energy e.g. radio waves, acoustic energy, etc. to transfer information without the use of wires. [1] Information is transferred in this manner over both short and long distances.In this, routes may be detached due to lively movement of nodes. So route assortment and topology grouping is not easy and demanding issue. This type of networks is more vulnerable to both internal and external attacks due to presence of wicked neighbour nodes[1][2s. Paper see the sights new method using AODV protocol to find out good neighbour node and finding reliable path according to their signal strength, flow capacity relative position of node in network
Authors and Affiliations
Supriya Bamane
Classification of Micro Array Gene Expression Proposed using Statistical Approaches
Classification analysis of microarray gene expression data has been performed widely to find out the biological features and to differentiate intimately related cell types that usually appear in the diagnosis of can...
A Survey on Machine Learning And Data Mining Methods And Applications
In This paper we have a tendency to describe a centered literature Survey of machine learning (ML) and data processing (DM) ways and applications .Under this analysis paper explanations of every machine learning and data...
Improving the Security Layer logic for a Health Care Information System
Abstract: In a previous paper we suggested an information system to store, manage and treat millions of the gathered patient’s information. We were able to propose a reliable application, which is able to fulfill the mos...
Finger Vein Based Licensing And Authentication Scheme Using GSM
Finger vein authentication scheme is a non imitable biometric authentication scheme. By using this biometric authentication, we can prevent the non license from driving. So we will avoid accidents. The proposed &...
An Analytical Study of Genetic Algorithm for Generating Frequent Itemset and Framing Association Rules At Various Support Levels
Abstract: In customary, frequent itemsets are propogated from large data sets by employing association rule mining algorithms like Apriori, Partition, Pincer-Search, Incremental and Border algorithm etc., which gains ino...