ElePSO: energy aware elephant swarm optimization for Mobile Adhoc Network
The high pace increase in wireless mobile communication based applications have made Mobile Adhoc Network (MANET) an essential communication paradigm to ensure Quality of Service (QoS) provisioning. MANET characterizes itself with its decentralized network establishment nature and architectural dyna...
| Main Authors: | Khan, Burhan ul Islam, Olanrewaju, Rashidah Funke, Ali , Nor'ashikin, Shah, Asadullah |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
penseejournal.com
2014
|
| Subjects: | |
| Online Access: | http://irep.iium.edu.my/36536/ http://irep.iium.edu.my/36536/1/ElePSO_Energy_Aware_Elephant_Swarm_Optimization_for_Mobile_Adhoc_Network.pdf |
Similar Items
EloPSO: energy aware elephant swarm optimization for mobile adhoc networks
by: Khan , Burhan ul Islam, et al.
Published: (2014)
by: Khan , Burhan ul Islam, et al.
Published: (2014)
Manifestation and mitigation of node misbehaviour in adhoc networks
by: Khan, Burhan ul Islam, et al.
Published: (2014)
by: Khan, Burhan ul Islam, et al.
Published: (2014)
STCM: Secured trust-based communication method in vulnerable mobile adhoc network
by: Khan, Burhan Ul Islam, et al.
Published: (2017)
by: Khan, Burhan Ul Islam, et al.
Published: (2017)
STCM: secured trust-based communication method in vulnerable mobile adhoc network
by: Khan, Burhan ul Islam, et al.
Published: (2016)
by: Khan, Burhan ul Islam, et al.
Published: (2016)
DTASR: Dual Threshold-based authentication for secure routing in mobile adhoc network
by: Khan, Burhan ul Islam, et al.
Published: (2015)
by: Khan, Burhan ul Islam, et al.
Published: (2015)
DTASR: Dual Threshold-based authentication for secure routing in mobile adhoc network
by: Khan, Burhan ul Islam, et al.
Published: (2015)
by: Khan, Burhan ul Islam, et al.
Published: (2015)
Game theoretic approach for exhaustive tactical modelling of node misbehavior in adhoc networking based IOT paradigm/P-RIGS18-020-0020
by: Olanrewaju, Rashidah Funke Olanrewaju, et al.
Published: (2019)
by: Olanrewaju, Rashidah Funke Olanrewaju, et al.
Published: (2019)
A game theory-based strategic approach to ensure reliable data transmission with optimized network operations in futuristic Mobile Adhoc Networks
by: Khan, Burhan ul Islam, et al.
Published: (2020)
by: Khan, Burhan ul Islam, et al.
Published: (2020)
JIR2TA: Joint Invocation of Resource-Based Thresholding and Trust-Oriented Authentication in mobile adhoc network
by: Khan, Burhan Ul Islam, et al.
Published: (2017)
by: Khan, Burhan Ul Islam, et al.
Published: (2017)
Strategic Profiling and Analytic Modelling of Node Misbehaviour in Adhoc Networks via Game Theory
by: Olanrewaju, Rashidah Funke, et al.
Published: (2018)
by: Olanrewaju, Rashidah Funke, et al.
Published: (2018)
Particle swarm optimization (PSO) for CNC route problem
by: Nur Azia Azwani, Ismail
Published: (2002)
by: Nur Azia Azwani, Ismail
Published: (2002)
Rehashing system security solutions in e-banking
by: Khan, Burhan ul Islam, et al.
Published: (2018)
by: Khan, Burhan ul Islam, et al.
Published: (2018)
Throughput efficient AODV for improving QoS routing in energy aware mobile adhoc network
by: A. D., Usman, et al.
Published: (2018)
by: A. D., Usman, et al.
Published: (2018)
QoS oriented mapReduce optimization for hadoop based
bigData application
by: Olanrewaju, Rashidah Funke, et al.
Published: (2014)
by: Olanrewaju, Rashidah Funke, et al.
Published: (2014)
An adaptive and viable face identification for Android mobile devices
by: Mehraj, Tehseen, et al.
Published: (2019)
by: Mehraj, Tehseen, et al.
Published: (2019)
Applying Area Extension PSO in Robotic Swarm
by: Atyabi, Adham, et al.
Published: (2010)
by: Atyabi, Adham, et al.
Published: (2010)
Hardware Software Partitioning Using Particle Swarm Optimization (PSO) In Image Processing Application
by: Tan, Jia Zheng
Published: (2018)
by: Tan, Jia Zheng
Published: (2018)
Secure annihilation of out-of-band authorization for
online transactions
by: Hussain, Sabahat, et al.
Published: (2018)
by: Hussain, Sabahat, et al.
Published: (2018)
Minimization of tool path length of drilling process using particle swarm optimization (PSO)
by: Abdullah, Haslina, et al.
Published: (2020)
by: Abdullah, Haslina, et al.
Published: (2020)
Four Different Methods to Hybrid Simulated Kalman Filter (SKF) with Particle Swarm Optimization (PSO)
by: Badaruddin, Muhammad, et al.
Published: (2016)
by: Badaruddin, Muhammad, et al.
Published: (2016)
Banner : Share ADHOC Workshop
by: ISITI, -CoERI
Published: (2013)
by: ISITI, -CoERI
Published: (2013)
Critical insight for MAPReduce optimization in Hadoop
by: Khan, Burhan ul Islam, et al.
Published: (2014)
by: Khan, Burhan ul Islam, et al.
Published: (2014)
Evaluating the effect of IP and IGP on
the ICMP throughput of a WAN
by: Khan , Burhan ul Islam, et al.
Published: (2013)
by: Khan , Burhan ul Islam, et al.
Published: (2013)
Internet of things security vulnerabilities and recommended solutions
by: Olanrewaju, Rashidah Funke, et al.
Published: (2018)
by: Olanrewaju, Rashidah Funke, et al.
Published: (2018)
Maximum Power Point Tracking (MPPT) Based Particle Swarm Optimization (PSO) for hydrokinetic energy harnessing
by: Wan Ismail, Ibrahim, et al.
Published: (2024)
by: Wan Ismail, Ibrahim, et al.
Published: (2024)
An empirical study of the evolution of PHP MVC framework
by: Olanrewaju, Rashidah Funke, et al.
Published: (2015)
by: Olanrewaju, Rashidah Funke, et al.
Published: (2015)
Behaviour visualization for malicious-attacker node collusion in MANET based on probabilistic approach
by: Olanrewaju, Rashidah Funke, et al.
Published: (2015)
by: Olanrewaju, Rashidah Funke, et al.
Published: (2015)
A New Approach of Optimal Search Solution in Particle Swarm Optimization (PSO) Algorithm for Object Detection Method
by: Zalili, Musa, et al.
Published: (2018)
by: Zalili, Musa, et al.
Published: (2018)
Critical challenges in access management schemes for smartphones: an appraisal
by: Mehraj, Tehseen, et al.
Published: (2019)
by: Mehraj, Tehseen, et al.
Published: (2019)
ECM-GT: design of efficient computational modelling based on game theoretical approach towards enhancing the security solutions in MANET
by: Khan, Burhan Ul Islam, et al.
Published: (2019)
by: Khan, Burhan Ul Islam, et al.
Published: (2019)
Dynamic timetable generator using particle swarm optimization (PSO) method
by: Chuen, Teh Yung
Published: (2013)
by: Chuen, Teh Yung
Published: (2013)
Conquest XHTML: a programers guide to extensible HyperText Markup Language
by: Olanrewaju, Rashidah Funke, et al.
Published: (2013)
by: Olanrewaju, Rashidah Funke, et al.
Published: (2013)
Malicious behaviour of node and its significant security techniques in MANET- a review
by: Khan, Burhan ul Islam, et al.
Published: (2013)
by: Khan, Burhan ul Islam, et al.
Published: (2013)
A critical insight into the effectiveness of research
methods evolved to secure IoT ecosystem
by: Khan, Burhan ul Islam, et al.
Published: (2018)
by: Khan, Burhan ul Islam, et al.
Published: (2018)
DFAM: A distributed feedback analysis mechanism for knowledge based educational big data
by: Olanrewaju, Rashidah Funke, et al.
Published: (2016)
by: Olanrewaju, Rashidah Funke, et al.
Published: (2016)
An online story of electronics 1 (ELE232) utilizing MOOC / Norizan Ahmed ...[et al.]
by: Ahmed, Norizan, et al.
Published: (2018)
by: Ahmed, Norizan, et al.
Published: (2018)
Simulation of identifying shortest path walkway using particle swarm optimization (PSO)
by: Kae Shin, Yong
Published: (2012)
by: Kae Shin, Yong
Published: (2012)
Topologi kejiranan gabungan rangkaian kohonen dan particle swarm optimization (pso)
by: Forkan, Fadni, et al.
Published: (2006)
by: Forkan, Fadni, et al.
Published: (2006)
Particle swarm optimization (PSO)-based clustering algorithm for handwritten digits recognition
by: Sahel Ba-Karait, Nasser Omer
Published: (2007)
by: Sahel Ba-Karait, Nasser Omer
Published: (2007)
A novel multi-agent and multilayered game formulation for Intrusion Detection in Internet of Things (IoT)
by: Khan, Burhan Ul Islam, et al.
Published: (2020)
by: Khan, Burhan Ul Islam, et al.
Published: (2020)
Similar Items
-
EloPSO: energy aware elephant swarm optimization for mobile adhoc networks
by: Khan , Burhan ul Islam, et al.
Published: (2014) -
Manifestation and mitigation of node misbehaviour in adhoc networks
by: Khan, Burhan ul Islam, et al.
Published: (2014) -
STCM: Secured trust-based communication method in vulnerable mobile adhoc network
by: Khan, Burhan Ul Islam, et al.
Published: (2017) -
STCM: secured trust-based communication method in vulnerable mobile adhoc network
by: Khan, Burhan ul Islam, et al.
Published: (2016) -
DTASR: Dual Threshold-based authentication for secure routing in mobile adhoc network
by: Khan, Burhan ul Islam, et al.
Published: (2015)