Probabilistic: A Fuzzy Logic-Based Distance Broadcasting Scheme For Mobile Ad Hoc Networks
Journal Title: International Journal of Advanced Computer Science & Applications - Year 2012, Vol 3, Issue 9
Abstract
An on-demand route discovery method in mobile ad hoc networks (MANET) uses simple flooding method, whereas a mobile node blindly rebroadcasts received route request (RREQ) packets until a route to a particular destination is established. Thus, this leads to broadcast storm problem. This paper presents a novel algorithm for broadcasting scheme in wireless ad hoc networks using a fuzzy logic system at each node to determine its capability to broadcast route request packets, based on the node location. Our simulation analysis shows a significant improvement in performance in terms of routing overhead, MAC collisions and end-to-end delay while still achieving a good throughput compared to the traditional AODV.
Authors and Affiliations
Tasneem Bano, Jyoti Singhai
Towards Implementing Framework to Generate Myopathic Signals
In this paper, we describe a simulation system of myopathicsurface electromyography (sEMG) signals. The architecture of the proposed system consists of two cascading modules. SEMG signals of three pathological skeletal m...
OFW-ITS-LSSVM: Weighted Classification by LS-SVM for Diabetes diagnosis
In accordance to the fast developing technology now a days, every field is gaining it’s benefit through machines other than human involvement. Many changes are being made much advancement is possible by this develo...
Artificial Intelligence in Bio-Medical Domain
In this era and in the future, artificially intelligent machines are replacing and playing a key role to enhance human capabilities in many areas. It is also making life style better by providing convenience to all inclu...
Detection of Routing Misbehavior in MANETs with 2ACK scheme
The Routing misbehavior in MANETs (Mobile Ad Hoc Networks) is considered in this paper. Commonly routing protocols for MANETs [1] are designed based on the assumption that all participating nodes are fully cooperative. R...
A Survey on Tor Encrypted Traffic Monitoring
Tor (The Onion Router) is an anonymity tool that is widely used worldwide. Tor protect its user privacy against surveillance and censorship using strong encryption and obfuscation techniques which makes it extremely diff...