Heuristic Clustering Algorithms in Ad hoc Networks
نویسندگان
چکیده
منابع مشابه
Assessment of DSACC and QPART Algorithms in Ad Hoc Networks
The rapid advancement in wireless over wired has augmented the need for improving theQuality of Service (QoS) over such wireless links. However, the wireless ad hoc networkshave too low bandwidth, and establishing a QoS in these networks is a difficult issue. So,support of quality of service in ad hoc networks is the topical issue among the networkscience researchers. In this research we are go...
متن کاملImproving Vehicular Ad-Hoc Network Stability Using Meta-Heuristic Algorithms
Vehicular ad-hoc network (VANET) is an important component of intelligent transportation systems, in which vehicles are equipped with on-board computing and communication devices which enable vehicle-to-vehicle communication. Consequently, with regard to larger communication due to the greater number of vehicles, stability of connectivity would be a challenging problem. Clustering technique as ...
متن کاملClustering Algorithms for Ad Hoc Wireless Networks
An ad hoc network is a multihop wireless communication network supporting mobile users without any existing infrastructure. To become commercially successful, the technology must allow networks to support many users. A complication is that addressing and routing in ad hoc networks does not scale up as easily as in the Internet. By introducing hierarchical addresses to ad hoc networks, we can ef...
متن کاملimproving vehicular ad-hoc network stability using meta-heuristic algorithms
vehicular ad-hoc network (vanet) is an important component of intelligent transportation systems, in which vehicles are equipped with on-board computing and communication devices which enable vehicle-to-vehicle communication. consequently, with regard to larger communication due to the greater number of vehicles, stability of connectivity would be a challenging problem. clustering technique as ...
متن کاملReputation-Based Clustering Algorithms in Mobile Ad Hoc Networks
Clustering is one of the main techniques that are used to increase the scalability of MANETs, but without any security considerations clustering is prone to various security attacks. Some cryptographic-based schemes have been proposed to secure the clustering process, but they are unable to handle the internal attacks. Trust-based clustering schemes have combined the trust management systems wi...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: EMAJ: Emerging Markets Journal
سال: 2014
ISSN: 2158-8708,2159-242X
DOI: 10.5195/emaj.2014.39