Open Access   Article Go Back

Intelligent Routing Algorithms Assess Mobile Network

Mohsen Davoudi Monfared1 , Shadie Zeinali2

  1. Computer Group, Islamic Azad University of Tafresh, Tafresh, Iran.
  2. Computer Group, Islamic Azad University of Tafresh, Tafresh, Iran.

Correspondence should be addressed to: davoudi60@gmail.com .

Section:Review Paper, Product Type: Journal Paper
Volume-5 , Issue-6 , Page no. 335-339, Jun-2017

Online published on Jun 30, 2017

Copyright © Mohsen Davoudi Monfared, Shadie Zeinali . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: Mohsen Davoudi Monfared, Shadie Zeinali, “Intelligent Routing Algorithms Assess Mobile Network,” International Journal of Computer Sciences and Engineering, Vol.5, Issue.6, pp.335-339, 2017.

MLA Style Citation: Mohsen Davoudi Monfared, Shadie Zeinali "Intelligent Routing Algorithms Assess Mobile Network." International Journal of Computer Sciences and Engineering 5.6 (2017): 335-339.

APA Style Citation: Mohsen Davoudi Monfared, Shadie Zeinali, (2017). Intelligent Routing Algorithms Assess Mobile Network. International Journal of Computer Sciences and Engineering, 5(6), 335-339.

BibTex Style Citation:
@article{Monfared_2017,
author = {Mohsen Davoudi Monfared, Shadie Zeinali},
title = {Intelligent Routing Algorithms Assess Mobile Network},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {6 2017},
volume = {5},
Issue = {6},
month = {6},
year = {2017},
issn = {2347-2693},
pages = {335-339},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=1352},
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=1352
TI - Intelligent Routing Algorithms Assess Mobile Network
T2 - International Journal of Computer Sciences and Engineering
AU - Mohsen Davoudi Monfared, Shadie Zeinali
PY - 2017
DA - 2017/06/30
PB - IJCSE, Indore, INDIA
SP - 335-339
IS - 6
VL - 5
SN - 2347-2693
ER -

VIEWS PDF XML
516 445 downloads 533 downloads
  
  
           

Abstract

The use of wireless networks is widely increasing. One of these networks, ad hoc mobile networks (Mobile ad hoc networks) is. Mobile Ad hoc Network known as network short-lived. Nature-inspired algorithms (swarm intelligence) such as ant nest optimization algorithms and genetic algorithms to solve the routing problem in recent years have introduced mobile-specific networks.

Key-Words / Index Term

Mobile Ad hoc networks, genetic algorithms, algorithms ant nest

References

[1] C.-C. Chiang, Routing in Clustered Multihop, Mobile Wireless Networks with Fading Channel, Proc. IEEE SICON’97, April 1997, pp.197-211.
[2] K. Subramanian, R. Gnanakumaran , "Analysis of Power Complexity in Existing Algorithms Against Ad-Hoc On demand Distance Vector Routing Protocol (AODV)", International Journal of Computer Sciences and Engineering, Vol.4, Issue.12, pp.36-45, 2016.
[3] Umesh Kumar Singh, Jalaj Patidar and Kailash Chandra Phuleriya, "On Mechanism to Prevent Cooperative Black Hole Attack in Mobile Ad Hoc Networks", International Journal of Scientific Research in Computer Science and Engineering, Vol.3, Issue.1, pp.11-15, 2015.
[4] Abhinav Gupta and Prabhdeep Singh, "Improving the performance of Mobile Wireless Sensor Networks using modified DBSCAN", International Journal of Computer Sciences and Engineering, Vol.3, Issue.8, pp.6-10, 2015.
[5] Kritika Sood and Payal Kaushal, "Client Adaptive Load Balancing in DSR", International Journal of Scientific Research in Network Security and Communication, Vol.1, Issue.1, pp.26-28, 2013.
[6] Pradeep Kumar Sharma, Shivlal Mewada and Pratiksha Nigam, "Investigation Based Performance of Black and Gray Hole Attack in Mobile Ad-Hoc Network", International Journal of Scientific Research in Network Security and Communication, Vol.1, Issue.4, pp.8-11, 2013.
[7] J. Amol B.Suryawanshi, Baljit Kaur Saini, "Survey on Various Routing Protocols in Ad-hoc Networks", International Journal of Scientific Research in Network Security and Communication, Vol.5, Issue.3, pp.174-178, 2017.
[8] Pradeep Sharma, Shivlal Mewada and Aruna Bilavariya, "Group Rekeying Management Scheme for Mobile Ad-hoc Network", International Journal of Scientific Research in Network Security and Communication, Vol.1, Issue.5, pp.5-12, 2013.
[9] Leena Pal, Pradeep Sharma, Netram Kaurav and Shivlal Mewada, "Performance Analysis of Reactive and Proactive Routing Protocols for Mobile Ad-hoc –Networks", International Journal of Scientific Research in Network Security and Communication, Vol.1, Issue.5, pp.1-4, 2013.
[10] Deepesh Tamrakar, Sreshtha Bhattacharya and Shitanshu Jain, "A Scheme to Eliminate Redundant Rebroadcast and Reduce Transmission Delay Using Binary Exponential Algorithm in Ad-Hoc Wireless Networks", International Journal of Scientific Research in Network Security and Communication, Vol.2, Issue.2, pp.1-5, 2014.
[11] R. Kachal, S. Suri, "Comparative Study and Analysis of DSR, DSDVAND ZRP in Mobile Ad-Hoc Networks", International Journal of Computer Sciences and Engineering, Vol.2, Issue.5, pp.148-152, 2014.
[12] P. R. Gundalwar and Bhaskar Y. Kathane, "A Comprehensive Analysis on Route Discovery and Maintenance Features of DSDV, AODV and IERF Ad-hoc Routing Protocols", International Journal of Computer Sciences and Engineering, Vol.4, Issue.2, pp.75-78, 2016.