Author:
Samantra Asish,Panda Abhijit,Das Santosh Kumar,Debnath Sourabh
Reference38 articles.
1. Moamen, A. A., Hamza, H. S., & Saroit, I. A. (2014). Secure multicast routing protocols in mobile ad-hoc networks. International Journal of Communication Systems, 27(11), 2808–2831.
2. Gautam, S. K., & Om, H. (2016). Computational neural network regression model for host based intrusion detection system. Perspectives in Science, 8, 93–95.
3. Das, S. K., & Tripathi, S. (2018). Adaptive and intelligent energy efficient routing for transparent heterogeneous ad-hoc network by fusion of game theory and linear programming. Applied Intelligence, 48(7), 1825–1845.
https://doi.org/10.1007/s10489-017-1061-6
.
4. Das, S. K., & Tripathi, S. (2017). Energy efficient routing formation technique for hybrid ad hoc network using fusion of artificial intelligence techniques. International Journal of Communication Systems, 30(16).
https://doi.org/10.1002/dac.3340
.
5. Chowdhuri, S., et al. (2014). Recent research on multi input multi output (MIMO) based mobile ad hoc network: A review. International Journal of Service Science, Management, Engineering, and Technology (IJSSMET), 5(3), 54–65.
Cited by
3 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Automatic Extraction of Petri Nets from RFC Protocol Texts;2024 27th International Conference on Computer Supported Cooperative Work in Design (CSCWD);2024-05-08
2. Multi mode Selection Sending Messages to Prioritize Nodes using WiFi Direct in Post Disaster Situation;2022 IEEE 2nd International Symposium on Sustainable Energy, Signal Processing and Cyber Security (iSSSC);2022-12-15
3. Modeling, reasoning, and application of fuzzy Petri net model: a survey;Artificial Intelligence Review;2022-03-11