Routing Scheme for Exploring Opportunities in Ad Hoc Networks
Journal Title: International Journal of Research in Computer and Communication Technology - Year 2013, Vol 2, Issue 11
Abstract
OPPORTUNISTIC routing for multihop wireless ad hoc networks has seen recent research interest to overcome deficiencies of conventional routing. The proposed scheme utilizes a reinforcement learning framework to opportunistically route the packets even in the absence of reliable knowledge about channel statistics and network model. This scheme is optimal with zero knowledge regarding network topology and channel statistics.. The proposed routing scheme jointly addresses the issues of learning and routing in an opportunistic context. D-AdaptOR is exposed to achieve the performance of an optimal routing with perfect and centralized knowledge about network.
Authors and Affiliations
K. Santhipriya, N. Surya Prakash Raju
A Reliable implementation of Security-Enabled Architecture with area optimized symmetric Cryptography
My project specifies a symmetric Cryptography technique which provides same keys to Cipher and Decipher to transfer the information for reducing the design complexity and AES (Advanced Encryption Standard) which prov...
Identifying Misuse of Data In Cloud
Cloud Storage Enables Users To Store Their Data Offering strong data protection to cloud users while enabling rich applications is a challenging task. We explore a new cloud platform architecture called Data Protecti...
An approach of Regression testing for Service Oriented Architecture
Service Oriented Architecture (SOA) is an application architecture in which services are described using a description language. It has changed the way business enterprises with technology with a very fast demand of r...
Quality Of Service And Load Balancing For Data Center In Cloud
Cloud frameworks are not quite the same as normal dispersed frameworks. Above all else, they are branded by an extremely big numeral of resources that can distance different administrative domains. Presentation evalua...
A Survey Of Intrusion Detection Mechanisms In Multitier Web Applications
Today the usage of computer for web applications is increasing day by day. Most of the transactions such as banking, travel etc are done through web. So the targets of attacks towards web applications are also increa...